IOC Report
4JgB4mYxvJ.exe

loading gif

Files

File Path
Type
Category
Malicious
4JgB4mYxvJ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\AEBKKECBGIIJJKECGIJECGDHIE
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\AKFIDHDGIEGCAKFIIJKF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CFIEGDAEHIEHIDHJDAAKKEHCAF
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\EEGWXUHVUG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EFOYFBOLXA.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EGCFIDAFBFBAKFHJEGIJKJDGII
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GCGIDGCGIEGDGDGDGHJKKKJKEC
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GRXZDKKVDB.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\HDAFBGIJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\HIJEGDBGDBFIJKECBAKF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JEHIDHDA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\MOCYNWGDZO.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_4JgB4mYxvJ.exe_b64a5fdcffb7bffe686b275d79b578e70faef_ff9ba42b_0ac1a85f-d86d-438f-a611-b5a6c3d95bcb\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6CF7.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Apr 23 07:33:21 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6DE3.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6E03.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\NVWZAPQSQL.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\NVWZAPQSQL.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\PALRGUCVEH.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\PWZOQIFCAN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\VWDFPKGDUF.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ZGGKNSUKOP.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ZIPXYXWIOY.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ZIPXYXWIOY.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\4JgB4mYxvJ.exe
"C:\Users\user\Desktop\4JgB4mYxvJ.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 2176

URLs

Name
IP
Malicious
http://185.172.128.76/15f649199f40275b/nss3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/softokn3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/mozglue.dll
185.172.128.76
malicious
http://185.172.128.76/3cd2b41cbde8fc9c.php
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/freebl3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/msvcp140.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/vcruntime140.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/sqlite3.dll
185.172.128.76
malicious
http://185.172.128.76
unknown
malicious
http://185.172.128.761
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://duckduckgo.com/ac/?q=
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpH
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpK
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://185.172.128.76/15f649199f40275b/sqlite3.dll0
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php26773f16987dca9d650aa36aa0d0e-release019f0ad33803541e5352f
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpt
unknown
https://www.ecosia.org/newtab/
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpft
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php7
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpnts
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.172.128.76/15f649199f40275b/softokn3.dllP
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php;
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpa
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php-fulluser-l1-1-0
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php#
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php(F
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
http://185.172.128.76/15f649199f40275b/nss3.dllc/
unknown
https://support.mozilla.org
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpS
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.sqlite.org/copyright.html.
unknown
There are 32 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.172.128.76
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{cc9ba5ed-8d03-1086-2811-a9fc07360ab0}\Root\InventoryApplicationFile\4jgb4myxvj.exe|4861be09db881648
ProgramId
\REGISTRY\A\{cc9ba5ed-8d03-1086-2811-a9fc07360ab0}\Root\InventoryApplicationFile\4jgb4myxvj.exe|4861be09db881648
FileId
\REGISTRY\A\{cc9ba5ed-8d03-1086-2811-a9fc07360ab0}\Root\InventoryApplicationFile\4jgb4myxvj.exe|4861be09db881648
LowerCaseLongPath
\REGISTRY\A\{cc9ba5ed-8d03-1086-2811-a9fc07360ab0}\Root\InventoryApplicationFile\4jgb4myxvj.exe|4861be09db881648
LongPathHash
\REGISTRY\A\{cc9ba5ed-8d03-1086-2811-a9fc07360ab0}\Root\InventoryApplicationFile\4jgb4myxvj.exe|4861be09db881648
Name
\REGISTRY\A\{cc9ba5ed-8d03-1086-2811-a9fc07360ab0}\Root\InventoryApplicationFile\4jgb4myxvj.exe|4861be09db881648
OriginalFileName
\REGISTRY\A\{cc9ba5ed-8d03-1086-2811-a9fc07360ab0}\Root\InventoryApplicationFile\4jgb4myxvj.exe|4861be09db881648
Publisher
\REGISTRY\A\{cc9ba5ed-8d03-1086-2811-a9fc07360ab0}\Root\InventoryApplicationFile\4jgb4myxvj.exe|4861be09db881648
Version
\REGISTRY\A\{cc9ba5ed-8d03-1086-2811-a9fc07360ab0}\Root\InventoryApplicationFile\4jgb4myxvj.exe|4861be09db881648
BinFileVersion
\REGISTRY\A\{cc9ba5ed-8d03-1086-2811-a9fc07360ab0}\Root\InventoryApplicationFile\4jgb4myxvj.exe|4861be09db881648
BinaryType
\REGISTRY\A\{cc9ba5ed-8d03-1086-2811-a9fc07360ab0}\Root\InventoryApplicationFile\4jgb4myxvj.exe|4861be09db881648
ProductName
\REGISTRY\A\{cc9ba5ed-8d03-1086-2811-a9fc07360ab0}\Root\InventoryApplicationFile\4jgb4myxvj.exe|4861be09db881648
ProductVersion
\REGISTRY\A\{cc9ba5ed-8d03-1086-2811-a9fc07360ab0}\Root\InventoryApplicationFile\4jgb4myxvj.exe|4861be09db881648
LinkDate
\REGISTRY\A\{cc9ba5ed-8d03-1086-2811-a9fc07360ab0}\Root\InventoryApplicationFile\4jgb4myxvj.exe|4861be09db881648
BinProductVersion
\REGISTRY\A\{cc9ba5ed-8d03-1086-2811-a9fc07360ab0}\Root\InventoryApplicationFile\4jgb4myxvj.exe|4861be09db881648
AppxPackageFullName
\REGISTRY\A\{cc9ba5ed-8d03-1086-2811-a9fc07360ab0}\Root\InventoryApplicationFile\4jgb4myxvj.exe|4861be09db881648
AppxPackageRelativeId
\REGISTRY\A\{cc9ba5ed-8d03-1086-2811-a9fc07360ab0}\Root\InventoryApplicationFile\4jgb4myxvj.exe|4861be09db881648
Size
\REGISTRY\A\{cc9ba5ed-8d03-1086-2811-a9fc07360ab0}\Root\InventoryApplicationFile\4jgb4myxvj.exe|4861be09db881648
Language
\REGISTRY\A\{cc9ba5ed-8d03-1086-2811-a9fc07360ab0}\Root\InventoryApplicationFile\4jgb4myxvj.exe|4861be09db881648
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5CD0000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
42C2000
heap
page read and write
malicious
5CA0000
direct allocation
page execute and read and write
malicious
1E0DF000
stack
page read and write
24836000
heap
page read and write
24845000
heap
page read and write
4127000
heap
page read and write
24865000
heap
page read and write
24850000
heap
page read and write
400000
unkown
page readonly
24856000
heap
page read and write
2486C000
heap
page read and write
24836000
heap
page read and write
4023000
unkown
page readonly
24850000
heap
page read and write
2485A000
heap
page read and write
4021000
unkown
page read and write
429E000
heap
page read and write
61ED0000
direct allocation
page read and write
1E26E000
stack
page read and write
24845000
heap
page read and write
432C000
heap
page read and write
2A917000
heap
page read and write
2486B000
heap
page read and write
1E670000
heap
page read and write
1E21F000
stack
page read and write
4125000
heap
page read and write
6CD2E000
unkown
page read and write
24848000
heap
page read and write
3096E000
stack
page read and write
24830000
heap
page read and write
6CD60000
unkown
page readonly
6CEFF000
unkown
page readonly
1F0000
heap
page read and write
1E681000
heap
page read and write
6CF3E000
unkown
page read and write
2A8CD000
heap
page read and write
24930000
heap
page read and write
37C31000
heap
page read and write
2486C000
heap
page read and write
24850000
heap
page read and write
6CF3F000
unkown
page write copy
6CF40000
unkown
page read and write
5D40000
heap
page read and write
24845000
heap
page read and write
30B0B000
heap
page read and write
1DE9E000
stack
page read and write
1DFDE000
stack
page read and write
6CF45000
unkown
page readonly
2A8C4000
heap
page read and write
1E681000
heap
page read and write
6CD32000
unkown
page readonly
61E00000
direct allocation
page execute and read and write
24850000
heap
page read and write
43B0000
heap
page read and write
4344000
heap
page read and write
2A975000
heap
page read and write
192000
stack
page read and write
197000
stack
page read and write
24850000
heap
page read and write
42AC000
heap
page execute and read and write
5D00000
heap
page read and write
42F7000
heap
page read and write
1E64E000
stack
page read and write
1E36E000
stack
page read and write
24850000
heap
page read and write
24856000
heap
page read and write
416000
unkown
page write copy
61ED3000
direct allocation
page read and write
437C000
heap
page read and write
4290000
heap
page read and write
24844000
heap
page read and write
2485B000
heap
page read and write
1E3BE000
stack
page read and write
2486C000
heap
page read and write
30A6F000
stack
page read and write
2A8F0000
heap
page read and write
24841000
heap
page read and write
2485B000
heap
page read and write
2A8D0000
heap
page read and write
2A8B5000
heap
page read and write
1E11E000
stack
page read and write
41C000
unkown
page write copy
1DF9F000
stack
page read and write
38140000
heap
page read and write
24849000
heap
page read and write
2A8B1000
heap
page read and write
2484C000
heap
page read and write
24850000
heap
page read and write
1E680000
heap
page read and write
2485B000
heap
page read and write
24843000
heap
page read and write
61ED4000
direct allocation
page readonly
1E4BD000
stack
page read and write
4330000
heap
page read and write
624000
unkown
page execute and read and write
248D1000
heap
page read and write
2A8B3000
heap
page read and write
4331000
heap
page read and write
24845000
heap
page read and write
429A000
heap
page read and write
24843000
heap
page read and write
1E78D000
heap
page read and write
61E01000
direct allocation
page execute read
2A890000
heap
page read and write
2486C000
heap
page read and write
24850000
heap
page read and write
24850000
heap
page read and write
6CCA0000
unkown
page readonly
2485C000
heap
page read and write
246F4000
heap
page read and write
24842000
heap
page read and write
2A8B0000
heap
page read and write
2486C000
heap
page read and write
427E000
stack
page read and write
43BB000
heap
page read and write
2479C000
heap
page read and write
61ECD000
direct allocation
page readonly
24837000
heap
page read and write
36B40000
trusted library allocation
page read and write
4337000
heap
page read and write
24850000
heap
page read and write
636000
unkown
page execute and read and write
24846000
heap
page read and write
2485B000
heap
page read and write
61EB4000
direct allocation
page read and write
30B1B000
heap
page read and write
24850000
heap
page read and write
61EB7000
direct allocation
page readonly
19B000
stack
page read and write
1E780000
trusted library allocation
page read and write
432A000
heap
page read and write
2484C000
heap
page read and write
24846000
heap
page read and write
6CCA1000
unkown
page execute read
417E000
stack
page read and write
24846000
heap
page read and write
24850000
heap
page read and write
1E54E000
stack
page read and write
2484D000
heap
page read and write
24845000
heap
page read and write
4130000
heap
page read and write
36BEA000
heap
page read and write
30B13000
heap
page read and write
4120000
heap
page read and write
30B19000
heap
page read and write
549000
unkown
page execute and read and write
9B000
stack
page read and write
24850000
heap
page read and write
1DD5E000
stack
page read and write
24838000
heap
page read and write
2A8BB000
heap
page read and write
43FE000
stack
page read and write
433E000
heap
page read and write
2485E000
heap
page read and write
36C80000
heap
page read and write
24847000
heap
page read and write
30B13000
heap
page read and write
40F000
unkown
page readonly
44FF000
stack
page read and write
2484A000
heap
page read and write
2A8C7000
heap
page read and write
24844000
heap
page read and write
24867000
heap
page read and write
2486C000
heap
page read and write
24835000
heap
page read and write
61ECC000
direct allocation
page read and write
1DE5F000
stack
page read and write
2484A000
heap
page read and write
4315000
heap
page read and write
24843000
heap
page read and write
447000
unkown
page execute and read and write
24848000
heap
page read and write
4127000
heap
page read and write
2483A000
heap
page read and write
2A910000
heap
page read and write
2A94D000
heap
page read and write
401000
unkown
page execute read
6CD1D000
unkown
page readonly
248D2000
heap
page read and write
2486C000
heap
page read and write
36BE0000
heap
page read and write
24850000
heap
page read and write
24850000
heap
page read and write
2484F000
heap
page read and write
4023000
unkown
page readonly
2486C000
heap
page read and write
6CD61000
unkown
page execute read
There are 179 hidden memdumps, click here to show them.