IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\CAAAFCAK
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DHJECFCGHIDGHIDHDHIE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\EBFBFBFI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\ECGDHIDAAFHIIDGDBFIECFCFHI
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GDBAKKKFBGDHJKFHJJJJ
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\JJDBAAEGDBKKECBGIJEB
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KJJKEBGHJKFIDGCAAFCAFCBAKF
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\chrome.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
Chrome Cache Entry: 76
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 77
ASCII text, with very long lines (2287)
downloaded
Chrome Cache Entry: 78
ASCII text, with very long lines (8698)
downloaded
Chrome Cache Entry: 79
ASCII text
downloaded
Chrome Cache Entry: 80
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 81
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 82
SVG Scalable Vector Graphics image
downloaded
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 --field-trial-handle=2196,i,3722478039892456965,13615675496999425299,262144 /prefetch:8
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/msvcp140.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/vcruntime140.dll
185.215.113.206
malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/softokn3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/freebl3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/mozglue.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/nss3.dll
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/746f34465cf17784/sqlite3.dll
185.215.113.206
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.broofa.com
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
http://185.215.113.206/746f34465cf17784/msvcp140.dlleh
unknown
http://185.215.113.206/6c4adf523b719729.phpm
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.206/6c4adf523b719729.phprowser
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://workspace.google.com/:session_prefix:marketplace/appfinder?usegapi=1
unknown
http://185.215.113.206/6c4adf523b719729.phptware
unknown
https://www.google.com
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.206/746f34465cf17784/nss3.dllQ
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.185.228
https://apis.google.com
unknown
http://185.215.113.206/746f34465cf17784/vcruntime140.dllq
unknown
https://domains.google.com/suggest/flow
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://www.sqlite.org/copyright.html.
unknown
http://185.215.113.206/6c4adf523b719729.phpX
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK201621kbG1nY
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Ed1aWxkV
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://185.215.113.206/6c4adf523b719729.php3
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.google.com/async/newtab_promos
142.250.185.228
http://185.215.113.206GDB
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://185.215.113.206/6c4adf523b719729.php9
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.215.113.206/6c4adf523b719729.php5
unknown
http://185.215.113.206/746f34465cf17784/freebl3.dllRP
unknown
https://plus.google.com
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.185.228
https://play.google.com/log?format=json&hasfast=true
142.250.186.46
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.185.228
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
142.250.185.78
http://185.215.113.206/6c4adf523b719729.phpion:
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Java
unknown
http://185.215.113.206/746f34465cf17784/nss3.dllrQ7
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://clients6.google.com
unknown
There are 54 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
plus.l.google.com
142.250.185.78
play.google.com
142.250.186.46
www.google.com
142.250.185.228
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
142.250.186.46
play.google.com
United States
142.250.185.78
plus.l.google.com
United States
142.250.185.228
www.google.com
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
D1000
unkown
page execute and read and write
malicious
EFE000
heap
page read and write
malicious
4B00000
direct allocation
page read and write
malicious
4681000
heap
page read and write
4681000
heap
page read and write
1D157000
heap
page read and write
3EFF000
stack
page read and write
D44000
heap
page read and write
23221000
heap
page read and write
EE0000
direct allocation
page read and write
4CA0000
direct allocation
page execute and read and write
D44000
heap
page read and write
D44000
heap
page read and write
4681000
heap
page read and write
1D153000
heap
page read and write
D44000
heap
page read and write
4780000
trusted library allocation
page read and write
D44000
heap
page read and write
4681000
heap
page read and write
38BF000
stack
page read and write
4681000
heap
page read and write
651000
unkown
page execute and write copy
2D7F000
stack
page read and write
FC9000
heap
page read and write
4C40000
direct allocation
page execute and read and write
D44000
heap
page read and write
4681000
heap
page read and write
61EB7000
direct allocation
page readonly
1D165000
heap
page read and write
D44000
heap
page read and write
33E000
unkown
page execute and read and write
61ECC000
direct allocation
page read and write
EF8000
heap
page read and write
6C76F000
unkown
page readonly
EE0000
direct allocation
page read and write
1CFCE000
stack
page read and write
6CF49000
unkown
page readonly
338000
unkown
page execute and read and write
1D16E000
heap
page read and write
4C3F000
stack
page read and write
1C97E000
stack
page read and write
4681000
heap
page read and write
4B3C000
stack
page read and write
1B6000
unkown
page execute and read and write
1D156000
heap
page read and write
A7C000
stack
page read and write
6F870000
unkown
page readonly
D44000
heap
page read and write
6CEA0000
unkown
page readonly
3C7F000
stack
page read and write
33BF000
stack
page read and write
6C5D0000
unkown
page readonly
23229000
heap
page read and write
26B000
unkown
page execute and read and write
4681000
heap
page read and write
61ED0000
direct allocation
page read and write
EE0000
direct allocation
page read and write
1D158000
heap
page read and write
1D153000
heap
page read and write
6CEA1000
unkown
page execute read
1D146000
heap
page read and write
FD4000
heap
page read and write
23393000
heap
page read and write
231C0000
heap
page read and write
BD0000
heap
page read and write
63A000
unkown
page execute and read and write
42FE000
stack
page read and write
4681000
heap
page read and write
FB8000
heap
page read and write
6C7AF000
unkown
page write copy
1D146000
heap
page read and write
EE0000
direct allocation
page read and write
1D15A000
heap
page read and write
4681000
heap
page read and write
D40000
heap
page read and write
D44000
heap
page read and write
42BF000
stack
page read and write
537000
unkown
page execute and read and write
4681000
heap
page read and write
443E000
stack
page read and write
1D146000
heap
page read and write
FBD000
heap
page read and write
EE0000
direct allocation
page read and write
4C70000
direct allocation
page execute and read and write
D44000
heap
page read and write
618000
unkown
page execute and read and write
4C50000
direct allocation
page execute and read and write
D44000
heap
page read and write
1D15D000
heap
page read and write
4C70000
direct allocation
page execute and read and write
2A3E000
heap
page read and write
1D179000
heap
page read and write
1D146000
heap
page read and write
D44000
heap
page read and write
6CF47000
unkown
page read and write
4681000
heap
page read and write
4C60000
direct allocation
page execute and read and write
33FE000
stack
page read and write
1D15F000
heap
page read and write
D44000
heap
page read and write
D44000
heap
page read and write
61E01000
direct allocation
page execute read
4681000
heap
page read and write
417F000
stack
page read and write
4681000
heap
page read and write
6C5D1000
unkown
page execute read
1CA7F000
stack
page read and write
24B000
unkown
page execute and read and write
4681000
heap
page read and write
D44000
heap
page read and write
ED0000
heap
page read and write
FC2000
heap
page read and write
6F902000
unkown
page readonly
1D132000
heap
page read and write
363F000
stack
page read and write
6F8ED000
unkown
page readonly
29CB000
stack
page read and write
6CF01000
unkown
page readonly
4681000
heap
page read and write
4681000
heap
page read and write
1D174000
heap
page read and write
61ECD000
direct allocation
page readonly
4681000
heap
page read and write
EE0000
direct allocation
page read and write
1D176000
heap
page read and write
1D250000
trusted library allocation
page read and write
4681000
heap
page read and write
3B3F000
stack
page read and write
6C7B5000
unkown
page readonly
4681000
heap
page read and write
467F000
stack
page read and write
61ED3000
direct allocation
page read and write
1D16E000
heap
page read and write
367E000
stack
page read and write
327F000
stack
page read and write
4C80000
direct allocation
page execute and read and write
D44000
heap
page read and write
4696000
heap
page read and write
3A3E000
stack
page read and write
D44000
heap
page read and write
303E000
stack
page read and write
407E000
stack
page read and write
4681000
heap
page read and write
2A37000
heap
page read and write
6C7B0000
unkown
page read and write
1D15A000
heap
page read and write
4681000
heap
page read and write
2B3F000
stack
page read and write
FC000
unkown
page execute and read and write
1D175000
heap
page read and write
FB5000
heap
page read and write
D0000
unkown
page readonly
1D16E000
heap
page read and write
D44000
heap
page read and write
1D0CD000
stack
page read and write
1D15A000
heap
page read and write
1D13B000
heap
page read and write
1D15F000
heap
page read and write
1D177000
heap
page read and write
2A30000
heap
page read and write
4681000
heap
page read and write
4681000
heap
page read and write
1D16E000
heap
page read and write
4690000
heap
page read and write
41BE000
stack
page read and write
46D3000
heap
page read and write
1CCFF000
stack
page read and write
1CF8C000
stack
page read and write
1D157000
heap
page read and write
4681000
heap
page read and write
23300000
trusted library allocation
page read and write
1D154000
heap
page read and write
43FF000
stack
page read and write
D44000
heap
page read and write
1D15A000
heap
page read and write
EE0000
direct allocation
page read and write
2339F000
heap
page read and write
1D165000
heap
page read and write
2A20000
direct allocation
page read and write
23230000
heap
page read and write
B78000
stack
page read and write
D44000
heap
page read and write
1CBFE000
stack
page read and write
2EFE000
stack
page read and write
4681000
heap
page read and write
298F000
stack
page read and write
3BA000
unkown
page execute and read and write
32BE000
stack
page read and write
61EB4000
direct allocation
page read and write
1D130000
heap
page read and write
EE0000
direct allocation
page read and write
6F8FE000
unkown
page read and write
4681000
heap
page read and write
377F000
stack
page read and write
D44000
heap
page read and write
1D15C000
heap
page read and write
61ED4000
direct allocation
page readonly
D1000
unkown
page execute and write copy
F70000
heap
page read and write
1D178000
heap
page read and write
2FFF000
stack
page read and write
2338B000
heap
page read and write
4681000
heap
page read and write
1D15F000
heap
page read and write
1D160000
heap
page read and write
4681000
heap
page read and write
6F871000
unkown
page execute read
1D13D000
heap
page read and write
D1E000
stack
page read and write
1D153000
heap
page read and write
1D16E000
heap
page read and write
4681000
heap
page read and write
D0000
unkown
page read and write
2328B000
heap
page read and write
453F000
stack
page read and write
23E000
unkown
page execute and read and write
1D160000
heap
page read and write
EE0000
direct allocation
page read and write
23397000
heap
page read and write
FD6000
heap
page read and write
4681000
heap
page read and write
4681000
heap
page read and write
6C7AE000
unkown
page read and write
4681000
heap
page read and write
1CBBF000
stack
page read and write
4681000
heap
page read and write
ECE000
stack
page read and write
D44000
heap
page read and write
4681000
heap
page read and write
1D15A000
heap
page read and write
4681000
heap
page read and write
EE0000
direct allocation
page read and write
EE0000
direct allocation
page read and write
D44000
heap
page read and write
7EB000
unkown
page execute and write copy
E8D000
stack
page read and write
D44000
heap
page read and write
2A3B000
heap
page read and write
1CABE000
stack
page read and write
4681000
heap
page read and write
39FF000
stack
page read and write
23224000
heap
page read and write
1CD3E000
stack
page read and write
1D157000
heap
page read and write
F56000
heap
page read and write
3DFE000
stack
page read and write
4681000
heap
page read and write
2C7E000
stack
page read and write
1D15F000
heap
page read and write
D44000
heap
page read and write
233A5000
heap
page read and write
1CE8D000
stack
page read and write
231E0000
heap
page read and write
1D163000
heap
page read and write
1D179000
heap
page read and write
1D149000
heap
page read and write
1CE3F000
stack
page read and write
EE0000
direct allocation
page read and write
403F000
stack
page read and write
1D16E000
heap
page read and write
2A0E000
stack
page read and write
4681000
heap
page read and write
D44000
heap
page read and write
1D158000
heap
page read and write
4681000
heap
page read and write
4681000
heap
page read and write
1D146000
heap
page read and write
4681000
heap
page read and write
651000
unkown
page execute and read and write
318000
unkown
page execute and read and write
D44000
heap
page read and write
4681000
heap
page read and write
D44000
heap
page read and write
D44000
heap
page read and write
D44000
heap
page read and write
46A0000
heap
page read and write
4C90000
direct allocation
page execute and read and write
317E000
stack
page read and write
1D16E000
heap
page read and write
27A000
unkown
page execute and read and write
D44000
heap
page read and write
4681000
heap
page read and write
3B7E000
stack
page read and write
643000
unkown
page execute and read and write
1D161000
heap
page read and write
4681000
heap
page read and write
4681000
heap
page read and write
4B2B000
direct allocation
page read and write
4681000
heap
page read and write
1D159000
heap
page read and write
1D146000
heap
page read and write
F41000
heap
page read and write
2DBE000
stack
page read and write
61E00000
direct allocation
page execute and read and write
231C0000
trusted library allocation
page read and write
B7D000
stack
page read and write
EF0000
heap
page read and write
457E000
stack
page read and write
1D16F000
heap
page read and write
1D159000
heap
page read and write
D44000
heap
page read and write
2EBF000
stack
page read and write
1D146000
heap
page read and write
FD1000
heap
page read and write
7EA000
unkown
page execute and read and write
4681000
heap
page read and write
FCF000
heap
page read and write
4681000
heap
page read and write
FAF000
heap
page read and write
B72000
stack
page read and write
EE0000
direct allocation
page read and write
1D157000
heap
page read and write
D44000
heap
page read and write
4AE0000
heap
page read and write
D44000
heap
page read and write
1D160000
heap
page read and write
D44000
heap
page read and write
4681000
heap
page read and write
4681000
heap
page read and write
353E000
stack
page read and write
4681000
heap
page read and write
219000
unkown
page execute and read and write
313F000
stack
page read and write
D44000
heap
page read and write
1D156000
heap
page read and write
1D163000
heap
page read and write
3F3E000
stack
page read and write
4681000
heap
page read and write
4C70000
direct allocation
page execute and read and write
1D160000
heap
page read and write
4681000
heap
page read and write
4681000
heap
page read and write
231C0000
trusted library allocation
page read and write
4681000
heap
page read and write
10EE000
stack
page read and write
2323D000
heap
page read and write
1D15D000
heap
page read and write
1D156000
heap
page read and write
1D140000
heap
page read and write
2A20000
direct allocation
page read and write
4681000
heap
page read and write
4681000
heap
page read and write
1D252000
heap
page read and write
34FF000
stack
page read and write
4681000
heap
page read and write
3DBF000
stack
page read and write
4680000
heap
page read and write
1D16E000
heap
page read and write
1D160000
heap
page read and write
CB0000
heap
page read and write
3CBE000
stack
page read and write
EE0000
direct allocation
page read and write
37BE000
stack
page read and write
1D15A000
heap
page read and write
4681000
heap
page read and write
2C3F000
stack
page read and write
1E4000
unkown
page execute and read and write
652000
unkown
page execute and write copy
38FE000
stack
page read and write
277000
unkown
page execute and read and write
D44000
heap
page read and write
E4E000
stack
page read and write
23236000
heap
page read and write
There are 353 hidden memdumps, click here to show them.