IOC Report
Eae0KTw4m1.exe

loading gif

Files

File Path
Type
Category
Malicious
Eae0KTw4m1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\CBAKJKJJJECFIEBFHIEG
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DBKFHCFB
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DGHDHIDGHIDGIECBKKJJJEHCFC
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\EHJJKFCBGIDGHIECGCBKFHIEBG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\FHCAEGCBFHJDGCBFHDAF
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\KECBGCGCGIEGCBFHIIEBFCAFHI
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KFBAECBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KKJKKJJKJEGIECAKJJEB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Eae0KTw4m1.exe
"C:\Users\user\Desktop\Eae0KTw4m1.exe"
malicious

URLs

Name
IP
Malicious
http://178.63.215.77/a43eb2d9880da9a6/mozglue.dll
178.63.215.77
malicious
http://178.63.215.77/a43eb2d9880da9a6/nss3.dll
178.63.215.77
malicious
http://178.63.215.77/a43eb2d9880da9a6/vcruntime140.dll
178.63.215.77
malicious
http://178.63.215.77/a43eb2d9880da9a6/softokn3.dll
178.63.215.77
malicious
http://178.63.215.77/a43eb2d9880da9a6/sqlite3.dll
178.63.215.77
malicious
http://178.63.215.77/a43eb2d9880da9a6/msvcp140.dll
178.63.215.77
malicious
http://178.63.215.77
unknown
malicious
http://178.63.215.77/
178.63.215.77
malicious
http://178.63.215.77/a43eb2d9880da9a6/freebl3.dll
178.63.215.77
malicious
http://178.63.215.77/031d77089be01fd8.php
178.63.215.77
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17WdsYWhtbmRlZHwxfDB8MHxab2hvIF
unknown
https://duckduckgo.com/ac/?q=
unknown
http://178.63.215.77/031d77089be01fd8.phpmin
unknown
http://178.63.215.77/031d77089be01fd8.phpwser
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://178.63.215.77/031d77089be01fd8.php3
unknown
http://178.63.215.77/a5
unknown
http://178.63.215.77/a43eb2d9880da9a6/mozglue.dll/u
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://178.63.215.77/a43eb2d9880da9a6/nss3.dllN
unknown
http://178.63.215.77/a43eb2d9880da9a6/nss3.dlli
unknown
http://178.63.215.77/031d77089be01fd8.phpic
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://www.sqlite.org/copyright.html.
unknown
http://178.63.215.77/031d77089be01fd8.phpPRO
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rosoft
unknown
http://178.63.215.77/a43eb2d9880da9a6/softokn3.dllCu
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK201621kbG1nY
unknown
http://178.63.215.77/031d77089be01fd8.phpition:
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://178.63.215.77/031d77089be01fd8.phpVB
unknown
http://178.63.215.77/031d77089be01fd8.phpBR:p
unknown
http://178.63.215.77CAKFI
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Ed1aWxkV
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://178.63.215.77/031d77089be01fd8.phpPRNqW
unknown
http://178.63.215.77/a43eb2d9880da9a6/freebl3.dllut
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://178.63.215.77/a43eb2d9880da9a6/sqlite3.dllUu
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17mluIFdhbGxldHxmbmpobWtoaG1rYm
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://178.63.215.77/031d77089be01fd8.phpdus.wallet
unknown
http://178.63.215.77/a43eb2d9880da9a6/sqlite3.dll)
unknown
http://178.63.215.77/031d77089be01fd8.phpv
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://178.63.215.77/031d77089be01fd8.php:
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://178.63.215.77/a43eb2d9880da9a6/freebl3.dllUu
unknown
https://support.mozilla.org
unknown
http://178.63.215.77/a43eb2d9880da9a6/vcruntime140.dll~
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://178.63.215.77/031d77089be01fd8.phpW
unknown
There are 52 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
178.63.215.77
unknown
Germany
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
721000
unkown
page execute and write copy
malicious
15EE000
heap
page read and write
malicious
721000
unkown
page execute and write copy
malicious
1B44E000
stack
page read and write
6C7FF000
unkown
page readonly
21A27000
heap
page read and write
21A43000
heap
page read and write
21A27000
heap
page read and write
1390000
heap
page read and write
1B980000
heap
page read and write
61E00000
direct allocation
page execute and read and write
21A25000
heap
page read and write
77A000
unkown
page read and write
21A43000
heap
page read and write
21A1F000
heap
page read and write
15CE000
stack
page read and write
21A02000
heap
page read and write
21A2A000
heap
page read and write
21A0B000
heap
page read and write
6C83F000
unkown
page write copy
2EA50000
heap
page read and write
27D81000
heap
page read and write
27A70000
heap
page read and write
21A27000
heap
page read and write
97C000
unkown
page readonly
21A27000
heap
page read and write
6C661000
unkown
page execute read
21A19000
heap
page read and write
14BE000
stack
page read and write
21A27000
heap
page read and write
21A25000
heap
page read and write
21A27000
heap
page read and write
1B40E000
stack
page read and write
21A0B000
heap
page read and write
21A25000
heap
page read and write
21A27000
heap
page read and write
61ED4000
direct allocation
page readonly
169F000
heap
page read and write
6C660000
unkown
page readonly
27D7F000
heap
page read and write
21A3B000
heap
page read and write
21A4A000
heap
page read and write
6C652000
unkown
page readonly
83E000
unkown
page read and write
21A25000
heap
page read and write
21A27000
heap
page read and write
21A27000
heap
page read and write
21A25000
heap
page read and write
21AB5000
heap
page read and write
1470000
heap
page read and write
1B7CD000
stack
page read and write
21A25000
heap
page read and write
1B68E000
stack
page read and write
21A22000
heap
page read and write
21A22000
heap
page read and write
21A1C000
heap
page read and write
82F000
unkown
page read and write
21A23000
heap
page read and write
27D79000
heap
page read and write
21A36000
heap
page read and write
27B1C000
heap
page read and write
96A000
unkown
page read and write
21A27000
heap
page read and write
21A23000
heap
page read and write
1BA96000
heap
page read and write
21A25000
heap
page read and write
7A8000
unkown
page read and write
21A25000
heap
page read and write
27BDE000
stack
page read and write
1BA90000
trusted library allocation
page read and write
73E000
unkown
page readonly
21A1A000
heap
page read and write
1B6CE000
stack
page read and write
1B54F000
stack
page read and write
21A25000
heap
page read and write
21A43000
heap
page read and write
27CDF000
stack
page read and write
1B1CF000
stack
page read and write
8E5000
unkown
page read and write
195C000
heap
page read and write
1B58E000
stack
page read and write
6C63D000
unkown
page readonly
1B991000
heap
page read and write
27D87000
heap
page read and write
21A1A000
heap
page read and write
80F000
unkown
page read and write
76A000
unkown
page read and write
21A21000
heap
page read and write
61ECD000
direct allocation
page readonly
21A36000
heap
page read and write
21A27000
heap
page read and write
74B000
unkown
page write copy
21A27000
heap
page read and write
6C840000
unkown
page read and write
21A1A000
heap
page read and write
802000
unkown
page read and write
21A17000
heap
page read and write
21A27000
heap
page read and write
21A27000
heap
page read and write
21A27000
heap
page read and write
21A1F000
heap
page read and write
21A1A000
heap
page read and write
21A1F000
heap
page read and write
21A36000
heap
page read and write
21A41000
heap
page read and write
7B2000
unkown
page read and write
720000
unkown
page readonly
21A43000
heap
page read and write
2EF5D000
heap
page read and write
14F7000
heap
page read and write
6C5C0000
unkown
page readonly
1B30E000
stack
page read and write
21B05000
heap
page read and write
16A4000
heap
page read and write
7DD000
unkown
page read and write
21A1A000
heap
page read and write
21A1E000
heap
page read and write
8EB000
unkown
page read and write
61E01000
direct allocation
page execute read
21A4A000
heap
page read and write
21A17000
heap
page read and write
61ECC000
direct allocation
page read and write
21A27000
heap
page read and write
61ED0000
direct allocation
page read and write
2EA40000
heap
page read and write
21A0B000
heap
page read and write
21A25000
heap
page read and write
6C64E000
unkown
page read and write
21A25000
heap
page read and write
133D000
stack
page read and write
21A27000
heap
page read and write
1570000
heap
page read and write
21A43000
heap
page read and write
21A22000
heap
page read and write
21A1E000
heap
page read and write
21A25000
heap
page read and write
1B990000
heap
page read and write
21A0B000
heap
page read and write
7AF000
unkown
page read and write
1B91C000
stack
page read and write
21AB4000
heap
page read and write
21A24000
heap
page read and write
21A24000
heap
page read and write
153D000
stack
page read and write
21A1A000
heap
page read and write
164D000
heap
page read and write
21A27000
heap
page read and write
2E86A000
heap
page read and write
21A25000
heap
page read and write
21A49000
heap
page read and write
21A43000
heap
page read and write
21A25000
heap
page read and write
21AC4000
heap
page read and write
14F5000
heap
page read and write
21A3B000
heap
page read and write
6C5C1000
unkown
page execute read
6C845000
unkown
page readonly
27D87000
heap
page read and write
21A36000
heap
page read and write
161E000
heap
page read and write
21A27000
heap
page read and write
73E000
unkown
page readonly
21A27000
heap
page read and write
21A27000
heap
page read and write
21A27000
heap
page read and write
1333000
stack
page read and write
1B2CF000
stack
page read and write
21A43000
heap
page read and write
21A3B000
heap
page read and write
21A1F000
heap
page read and write
1950000
heap
page read and write
21A21000
heap
page read and write
8C5000
unkown
page read and write
1B991000
heap
page read and write
18DE000
stack
page read and write
27A90000
heap
page read and write
15E0000
heap
page read and write
61EB4000
direct allocation
page read and write
1B81D000
stack
page read and write
1338000
stack
page read and write
21A36000
heap
page read and write
7A5000
unkown
page read and write
1692000
heap
page read and write
21A1A000
heap
page read and write
21A4F000
heap
page read and write
21A22000
heap
page read and write
21A25000
heap
page read and write
2E860000
heap
page read and write
27CE0000
trusted library allocation
page read and write
1660000
heap
page read and write
21A1A000
heap
page read and write
123B000
stack
page read and write
21A43000
heap
page read and write
15EA000
heap
page read and write
14F7000
heap
page read and write
21A27000
heap
page read and write
21A17000
heap
page read and write
83B000
unkown
page read and write
21A25000
heap
page read and write
7D1000
unkown
page read and write
720000
unkown
page readonly
21A27000
heap
page read and write
74B000
unkown
page write copy
21A36000
heap
page read and write
21A25000
heap
page read and write
21A00000
heap
page read and write
6C83E000
unkown
page read and write
21A1C000
heap
page read and write
21A27000
heap
page read and write
21A0B000
heap
page read and write
1698000
heap
page read and write
61EB7000
direct allocation
page readonly
17DF000
stack
page read and write
21A43000
heap
page read and write
21A28000
heap
page read and write
21A23000
heap
page read and write
1631000
heap
page read and write
21A27000
heap
page read and write
21A28000
heap
page read and write
14F0000
heap
page read and write
21A27000
heap
page read and write
168D000
heap
page read and write
21A44000
heap
page read and write
191E000
stack
page read and write
97C000
unkown
page readonly
61ED3000
direct allocation
page read and write
1953000
heap
page read and write
21A49000
heap
page read and write
There are 218 hidden memdumps, click here to show them.