IOC Report
zVp8cG4riO.exe

loading gif

Files

File Path
Type
Category
Malicious
zVp8cG4riO.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\AAKEGDAKEHJDHIDHJJDAECFBKF
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BJZFPPWAPT.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\BJZFPPWAPT.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\BQJUWOYRTO.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\BQJUWOYRTO.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\CFHDHIJDGCBAKFIEGHCB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DAEGIIECGHCBFHJKEHDB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DUUDTUBZFW.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ECGHCBGC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\EFOYFBOLXA.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EFOYFBOLXA.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EIVQSAOTAQ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\FCAAAAFBKFIECAAKECGCAAKJEC
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\FCFBAKJDBKJJKFIDBGHCAEGHJE
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\FGAWOVZUJP.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\GHDBKFHIJKJKECAAAECAECFBFI
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GNJEVOXLLS.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\GRXZDKKVDB.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_zVp8cG4riO.exe_a824a48da1fde744cf016a5c8f6a1dde186d8fc_f708881b_5419a0ed-648f-4f3d-bc2b-46268c99bec6\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE138.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 17 07:17:39 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE233.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE262.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\NVWZAPQSQL.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ZGGKNSUKOP.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\zVp8cG4riO.exe
"C:\Users\user\Desktop\zVp8cG4riO.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5720 -s 2128

URLs

Name
IP
Malicious
http://185.172.128.23/f9
unknown
malicious
http://185.172.128.23/8e6d9db21fb63946/softokn3.dll
185.172.128.23
malicious
http://185.172.128.23/8e6d9db21fb63946/nss3.dll
185.172.128.23
malicious
http://185.172.128.23/8e6d9db21fb63946/vcruntime140.dll
185.172.128.23
malicious
http://185.172.128.23
unknown
malicious
http://185.172.128.23/8e6d9db21fb63946/freebl3.dll
185.172.128.23
malicious
185.172.128.23/f993692117a3fda2.php
malicious
http://185.172.128.23/f993692117a3fda2.php
185.172.128.23
malicious
http://185.172.128.23/8e6d9db21fb63946/msvcp140.dll
185.172.128.23
malicious
http://185.172.128.23/8e6d9db21fb63946/mozglue.dll
185.172.128.23
malicious
http://185.172.128.23/f993692117
unknown
malicious
http://185.172.1
unknown
malicious
http://185.172.128.23/8e6d9db21fb63946/sqlite3.dll
185.172.128.23
malicious
http://185.172.128.23/f993692117a3fda2.p
unknown
malicious
http://185.172.128.23/f993692117a3fda2.phpft
unknown
http://185.172.128.23/f993692117a3fda2.phpt
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://185.172.128.23/f993692117a3fda2.phpA3
unknown
https://mozilla.org0/
unknown
http://185.172.128.23/8e6d9db21fb63946/freebl3.dllW
unknown
http://185.172.128.23/8e6d9db21fb63946/sqlite3.dllK
unknown
http://upx.sf.net
unknown
http://185.172.128.23/f993692117a3fda2.phph
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
http://185.172.128.23/f993692117a3fda2.phpM2
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.172.128.23/f993692117a3fda2.phpq
unknown
http://185.172.128.23/f993692117a3fda2.phpe3
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.172.128.23/f993692117a3fda2.php%2
unknown
http://185.172.128.23/8e6d9db21fb63946/softokn3.dll7
unknown
http://185.172.128.23/f993692117a3fda2.phpee1f731494c6c219f33099b430b44
unknown
http://185.172.128.23/8e6d9db21fb63946/msvcp140.dll/
unknown
http://185.172.128.23/8e6d9db21fb63946/softokn3.dllA
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.172.128.23/f993692117a3fda2.phpY2
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://support.mozilla.org
unknown
http://185.172.128.23/f993692117a3fda2.phpL
unknown
http://185.172.128.23/8e6d9db21fb63946/vcruntime140.dll7
unknown
http://www.sqlite.org/copyright.html.
unknown
There are 32 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.172.128.23
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{dfa186f6-64c4-613f-7cba-c4404a096e15}\Root\InventoryApplicationFile\zvp8cg4rio.exe|1a465c58cc62db9f
ProgramId
\REGISTRY\A\{dfa186f6-64c4-613f-7cba-c4404a096e15}\Root\InventoryApplicationFile\zvp8cg4rio.exe|1a465c58cc62db9f
FileId
\REGISTRY\A\{dfa186f6-64c4-613f-7cba-c4404a096e15}\Root\InventoryApplicationFile\zvp8cg4rio.exe|1a465c58cc62db9f
LowerCaseLongPath
\REGISTRY\A\{dfa186f6-64c4-613f-7cba-c4404a096e15}\Root\InventoryApplicationFile\zvp8cg4rio.exe|1a465c58cc62db9f
LongPathHash
\REGISTRY\A\{dfa186f6-64c4-613f-7cba-c4404a096e15}\Root\InventoryApplicationFile\zvp8cg4rio.exe|1a465c58cc62db9f
Name
\REGISTRY\A\{dfa186f6-64c4-613f-7cba-c4404a096e15}\Root\InventoryApplicationFile\zvp8cg4rio.exe|1a465c58cc62db9f
OriginalFileName
\REGISTRY\A\{dfa186f6-64c4-613f-7cba-c4404a096e15}\Root\InventoryApplicationFile\zvp8cg4rio.exe|1a465c58cc62db9f
Publisher
\REGISTRY\A\{dfa186f6-64c4-613f-7cba-c4404a096e15}\Root\InventoryApplicationFile\zvp8cg4rio.exe|1a465c58cc62db9f
Version
\REGISTRY\A\{dfa186f6-64c4-613f-7cba-c4404a096e15}\Root\InventoryApplicationFile\zvp8cg4rio.exe|1a465c58cc62db9f
BinFileVersion
\REGISTRY\A\{dfa186f6-64c4-613f-7cba-c4404a096e15}\Root\InventoryApplicationFile\zvp8cg4rio.exe|1a465c58cc62db9f
BinaryType
\REGISTRY\A\{dfa186f6-64c4-613f-7cba-c4404a096e15}\Root\InventoryApplicationFile\zvp8cg4rio.exe|1a465c58cc62db9f
ProductName
\REGISTRY\A\{dfa186f6-64c4-613f-7cba-c4404a096e15}\Root\InventoryApplicationFile\zvp8cg4rio.exe|1a465c58cc62db9f
ProductVersion
\REGISTRY\A\{dfa186f6-64c4-613f-7cba-c4404a096e15}\Root\InventoryApplicationFile\zvp8cg4rio.exe|1a465c58cc62db9f
LinkDate
\REGISTRY\A\{dfa186f6-64c4-613f-7cba-c4404a096e15}\Root\InventoryApplicationFile\zvp8cg4rio.exe|1a465c58cc62db9f
BinProductVersion
\REGISTRY\A\{dfa186f6-64c4-613f-7cba-c4404a096e15}\Root\InventoryApplicationFile\zvp8cg4rio.exe|1a465c58cc62db9f
AppxPackageFullName
\REGISTRY\A\{dfa186f6-64c4-613f-7cba-c4404a096e15}\Root\InventoryApplicationFile\zvp8cg4rio.exe|1a465c58cc62db9f
AppxPackageRelativeId
\REGISTRY\A\{dfa186f6-64c4-613f-7cba-c4404a096e15}\Root\InventoryApplicationFile\zvp8cg4rio.exe|1a465c58cc62db9f
Size
\REGISTRY\A\{dfa186f6-64c4-613f-7cba-c4404a096e15}\Root\InventoryApplicationFile\zvp8cg4rio.exe|1a465c58cc62db9f
Language
\REGISTRY\A\{dfa186f6-64c4-613f-7cba-c4404a096e15}\Root\InventoryApplicationFile\zvp8cg4rio.exe|1a465c58cc62db9f
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2EB0000
direct allocation
page execute and read and write
malicious
2EE0000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
2F85000
heap
page read and write
malicious
6CF5E000
unkown
page read and write
23530000
heap
page read and write
23530000
heap
page read and write
23522000
heap
page read and write
23530000
heap
page read and write
23510000
heap
page read and write
2352D000
heap
page read and write
1CB8F000
stack
page read and write
233D1000
heap
page read and write
6CF60000
unkown
page read and write
1CE0E000
stack
page read and write
2F50000
heap
page read and write
429000
unkown
page write copy
2353B000
heap
page read and write
2D1B000
unkown
page readonly
23525000
heap
page read and write
2354C000
heap
page read and write
1CF0F000
stack
page read and write
235B9000
heap
page read and write
2D1B000
unkown
page readonly
1CF4E000
stack
page read and write
1D360000
heap
page read and write
6CCE1000
unkown
page execute read
23525000
heap
page read and write
6CF1F000
unkown
page readonly
4A8E000
stack
page read and write
23525000
heap
page read and write
401000
unkown
page execute read
23530000
heap
page read and write
400000
unkown
page readonly
23528000
heap
page read and write
6CCE0000
unkown
page readonly
6CD81000
unkown
page execute read
362FA000
heap
page read and write
2F2B000
heap
page read and write
197000
stack
page read and write
1D04E000
stack
page read and write
2352F000
heap
page read and write
549000
unkown
page execute and read and write
9B000
stack
page read and write
2353E000
heap
page read and write
29601000
heap
page read and write
2354B000
heap
page read and write
2352A000
heap
page read and write
2F800000
heap
page read and write
23523000
heap
page read and write
29658000
heap
page read and write
636000
unkown
page execute and read and write
61EB4000
direct allocation
page read and write
2353C000
heap
page read and write
1D22E000
stack
page read and write
23548000
heap
page read and write
23528000
heap
page read and write
2D30000
heap
page read and write
2354C000
heap
page read and write
1D46D000
heap
page read and write
2354B000
heap
page read and write
23524000
heap
page read and write
23523000
heap
page read and write
23525000
heap
page read and write
2354C000
heap
page read and write
1D460000
trusted library allocation
page read and write
4A4E000
stack
page read and write
295A0000
heap
page read and write
1CCCE000
stack
page read and write
295C1000
heap
page read and write
23527000
heap
page read and write
23516000
heap
page read and write
23523000
heap
page read and write
2D87000
heap
page read and write
44B000
unkown
page execute and read and write
6CD5D000
unkown
page readonly
23516000
heap
page read and write
4AB0000
heap
page read and write
61E00000
direct allocation
page execute and read and write
61EB7000
direct allocation
page readonly
2D80000
heap
page read and write
36902000
heap
page read and write
23514000
heap
page read and write
1D19D000
stack
page read and write
6CF65000
unkown
page readonly
2352A000
heap
page read and write
2965C000
heap
page read and write
1CDCF000
stack
page read and write
362F0000
heap
page read and write
29605000
heap
page read and write
2F5E000
heap
page read and write
2354C000
heap
page read and write
35840000
trusted library allocation
page read and write
23523000
heap
page read and write
23530000
heap
page read and write
2353B000
heap
page read and write
61E01000
direct allocation
page execute read
2354C000
heap
page read and write
2D1A000
unkown
page read and write
192000
stack
page read and write
2354C000
heap
page read and write
23518000
heap
page read and write
23530000
heap
page read and write
2FD7000
heap
page read and write
314F000
stack
page read and write
2F7E0000
heap
page read and write
1F0000
heap
page read and write
61ED4000
direct allocation
page readonly
2EAE000
stack
page read and write
1D32E000
stack
page read and write
23524000
heap
page read and write
1D361000
heap
page read and write
624000
unkown
page execute and read and write
61ECD000
direct allocation
page readonly
36400000
heap
page read and write
295E1000
heap
page read and write
61ED0000
direct allocation
page read and write
1D361000
heap
page read and write
2353B000
heap
page read and write
6CD72000
unkown
page readonly
2F20000
heap
page read and write
61ED3000
direct allocation
page read and write
49F0000
heap
page read and write
23530000
heap
page read and write
1D350000
heap
page read and write
23544000
heap
page read and write
2F7FA000
heap
page read and write
23536000
heap
page read and write
49EF000
stack
page read and write
2F75F000
stack
page read and write
448000
unkown
page execute and read and write
23530000
heap
page read and write
23530000
heap
page read and write
2D85000
heap
page read and write
23618000
heap
page read and write
23518000
heap
page read and write
2351A000
heap
page read and write
23530000
heap
page read and write
2352C000
heap
page read and write
23530000
heap
page read and write
23525000
heap
page read and write
23526000
heap
page read and write
423000
unkown
page write copy
2D7E000
stack
page read and write
6CD80000
unkown
page readonly
2353A000
heap
page read and write
2F806000
heap
page read and write
23530000
heap
page read and write
23530000
heap
page read and write
23526000
heap
page read and write
29655000
heap
page read and write
2354C000
heap
page read and write
2352C000
heap
page read and write
1D09E000
stack
page read and write
23530000
heap
page read and write
235BA000
heap
page read and write
1CC8F000
stack
page read and write
23530000
heap
page read and write
23473000
heap
page read and write
2F65E000
stack
page read and write
2F70000
heap
page execute and read and write
23523000
heap
page read and write
2353B000
heap
page read and write
61ECC000
direct allocation
page read and write
6CF5F000
unkown
page write copy
2F5A000
heap
page read and write
23529000
heap
page read and write
6CD6E000
unkown
page read and write
2F7F2000
heap
page read and write
19B000
stack
page read and write
23536000
heap
page read and write
41A000
unkown
page readonly
23526000
heap
page read and write
23525000
heap
page read and write
2FB8000
heap
page read and write
23542000
heap
page read and write
2F80E000
heap
page read and write
295F0000
heap
page read and write
29580000
heap
page read and write
23521000
heap
page read and write
2964C000
heap
page read and write
2D87000
heap
page read and write
There are 172 hidden memdumps, click here to show them.