IOC Report
3R18jv6iGv.exe

loading gif

Files

File Path
Type
Category
Malicious
3R18jv6iGv.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\tiktok[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ECAFHDBGHJ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AAKJEGCFBGDHJJJJJKJE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\EEGWXUHVUG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EFOYFBOLXA.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\FIDGDAKFHIEHJKFHDHDBGIIDAE
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GCBGCGHD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\GRXZDKKVDB.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\HCBFIJJECFIEBGDGCFIJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HIEHDHCFIJDBFHJJDBFHJKJDHI
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\HJDBAFIECGHCBFIDGDAAAKEBFH
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KJJJDHDGDAAKECAKJDAEGCBKEH
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\MOCYNWGDZO.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_3R18jv6iGv.exe_78d159cbfcf361dfcc9330b4c413dcc3cccd9718_a6216e97_48e2a6aa-e8d2-44c3-a25a-a4585caec47d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER331F.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Apr 26 08:27:46 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3552.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3573.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\NVWZAPQSQL.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\NVWZAPQSQL.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\PALRGUCVEH.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\PWZOQIFCAN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\VWDFPKGDUF.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ZGGKNSUKOP.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ZIPXYXWIOY.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ZIPXYXWIOY.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 31 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\3R18jv6iGv.exe
"C:\Users\user\Desktop\3R18jv6iGv.exe"
malicious
C:\Users\user\AppData\Local\Temp\ECAFHDBGHJ.exe
"C:\Users\user\AppData\Local\Temp\ECAFHDBGHJ.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\ECAFHDBGHJ.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6468 -s 2144

URLs

Name
IP
Malicious
http://185.172.128.111/8e6d9db21fb63946/nss3.dll
185.172.128.111
malicious
http://185.172.128.111/8e6d9db21fb63946/mozglue.dll
185.172.128.111
malicious
http://185.172.128.111/8e6d9db21fb63946/softokn3.dll
185.172.128.111
malicious
http://185.172.128.203/tiktok.exe
185.172.128.203
malicious
http://185.172.128.111/8e6d9db21fb63946/freebl3.dll
185.172.128.111
malicious
http://185.172.128.111/8e6d9db21fb63946/msvcp140.dll
185.172.128.111
malicious
185.172.128.111/f993692117a3fda2.php
malicious
http://185.172.128.111
unknown
malicious
http://185.172.128.111/f993692117a3fda2.php
185.172.128.111
malicious
http://185.172.128.111/8e6d9db21fb63946/sqlite3.dll
185.172.128.111
malicious
http://185.172.128.111/8e6d9db21fb63946/vcruntime140.dll
185.172.128.111
malicious
http://www.mozilla.com/en-US/blocklist/
unknown
https://duckduckgo.com/ac/?q=
unknown
https://mozilla.org0/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://185.172.128.111/f993692117a3fda2.php8201ef2d28344ab9b66173bd59bc-release7dc3320254d2ae7170ac4
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.172.128.203/tiktok.exe00
unknown
http://185.172.128.111/8e6d9db21fb63946/nss3.dllo
unknown
http://185.172.128.111/8e6d9db21fb63946/msvcp140.dllX
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
http://185.172.128.203/tiktok.exet-Disposition:
unknown
http://185.172.128.111/f993692117a3fda2.phpive
unknown
http://185.172.128.111/f993692117a3fda2.php_l
unknown
https://support.mozilla.org
unknown
http://185.172.128.111/8e6d9db21fb63946/mozglue.dll%
unknown
http://www.sqlite.org/copyright.html.
unknown
http://185.172.128.111/8e6d9db21fb63946/freebl3.dllI
unknown
There are 22 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.172.128.111
unknown
Russian Federation
malicious
185.172.128.203
unknown
Russian Federation

Registry

Path
Value
Malicious
\REGISTRY\A\{3293ffb6-698b-15e3-b759-61f0cb9d15bd}\Root\InventoryApplicationFile\3r18jv6igv.exe|4c47078515f453ef
ProgramId
\REGISTRY\A\{3293ffb6-698b-15e3-b759-61f0cb9d15bd}\Root\InventoryApplicationFile\3r18jv6igv.exe|4c47078515f453ef
FileId
\REGISTRY\A\{3293ffb6-698b-15e3-b759-61f0cb9d15bd}\Root\InventoryApplicationFile\3r18jv6igv.exe|4c47078515f453ef
LowerCaseLongPath
\REGISTRY\A\{3293ffb6-698b-15e3-b759-61f0cb9d15bd}\Root\InventoryApplicationFile\3r18jv6igv.exe|4c47078515f453ef
LongPathHash
\REGISTRY\A\{3293ffb6-698b-15e3-b759-61f0cb9d15bd}\Root\InventoryApplicationFile\3r18jv6igv.exe|4c47078515f453ef
Name
\REGISTRY\A\{3293ffb6-698b-15e3-b759-61f0cb9d15bd}\Root\InventoryApplicationFile\3r18jv6igv.exe|4c47078515f453ef
OriginalFileName
\REGISTRY\A\{3293ffb6-698b-15e3-b759-61f0cb9d15bd}\Root\InventoryApplicationFile\3r18jv6igv.exe|4c47078515f453ef
Publisher
\REGISTRY\A\{3293ffb6-698b-15e3-b759-61f0cb9d15bd}\Root\InventoryApplicationFile\3r18jv6igv.exe|4c47078515f453ef
Version
\REGISTRY\A\{3293ffb6-698b-15e3-b759-61f0cb9d15bd}\Root\InventoryApplicationFile\3r18jv6igv.exe|4c47078515f453ef
BinFileVersion
\REGISTRY\A\{3293ffb6-698b-15e3-b759-61f0cb9d15bd}\Root\InventoryApplicationFile\3r18jv6igv.exe|4c47078515f453ef
BinaryType
\REGISTRY\A\{3293ffb6-698b-15e3-b759-61f0cb9d15bd}\Root\InventoryApplicationFile\3r18jv6igv.exe|4c47078515f453ef
ProductName
\REGISTRY\A\{3293ffb6-698b-15e3-b759-61f0cb9d15bd}\Root\InventoryApplicationFile\3r18jv6igv.exe|4c47078515f453ef
ProductVersion
\REGISTRY\A\{3293ffb6-698b-15e3-b759-61f0cb9d15bd}\Root\InventoryApplicationFile\3r18jv6igv.exe|4c47078515f453ef
LinkDate
\REGISTRY\A\{3293ffb6-698b-15e3-b759-61f0cb9d15bd}\Root\InventoryApplicationFile\3r18jv6igv.exe|4c47078515f453ef
BinProductVersion
\REGISTRY\A\{3293ffb6-698b-15e3-b759-61f0cb9d15bd}\Root\InventoryApplicationFile\3r18jv6igv.exe|4c47078515f453ef
AppxPackageFullName
\REGISTRY\A\{3293ffb6-698b-15e3-b759-61f0cb9d15bd}\Root\InventoryApplicationFile\3r18jv6igv.exe|4c47078515f453ef
AppxPackageRelativeId
\REGISTRY\A\{3293ffb6-698b-15e3-b759-61f0cb9d15bd}\Root\InventoryApplicationFile\3r18jv6igv.exe|4c47078515f453ef
Size
\REGISTRY\A\{3293ffb6-698b-15e3-b759-61f0cb9d15bd}\Root\InventoryApplicationFile\3r18jv6igv.exe|4c47078515f453ef
Language
\REGISTRY\A\{3293ffb6-698b-15e3-b759-61f0cb9d15bd}\Root\InventoryApplicationFile\3r18jv6igv.exe|4c47078515f453ef
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
unkown
page execute and read and write
malicious
41F0000
direct allocation
page execute and read and write
malicious
409A000
heap
page read and write
malicious
5CA0000
direct allocation
page read and write
malicious
5DB000
unkown
page write copy
6D095000
unkown
page readonly
24835000
heap
page read and write
2A8B0000
heap
page read and write
3096E000
stack
page read and write
636000
unkown
page execute and read and write
2484B000
heap
page read and write
44FF000
stack
page read and write
24832000
heap
page read and write
30B0D000
heap
page read and write
6CEB1000
unkown
page execute read
550000
heap
page read and write
4040000
heap
page read and write
377E6000
heap
page read and write
4227000
heap
page read and write
248C1000
heap
page read and write
37AAC000
stack
page read and write
1E5FD000
stack
page read and write
24833000
heap
page read and write
41F000
unkown
page write copy
2484B000
heap
page read and write
43FE000
stack
page read and write
24840000
heap
page read and write
2A8D0000
heap
page read and write
3770C000
stack
page read and write
36C30000
heap
page read and write
401000
unkown
page execute read
4FA000
stack
page read and write
24826000
heap
page read and write
24840000
heap
page read and write
5DE000
unkown
page readonly
24838000
heap
page read and write
1E4AE000
stack
page read and write
24835000
heap
page read and write
560000
unkown
page readonly
5CF0000
heap
page read and write
61E01000
direct allocation
page execute read
2484C000
heap
page read and write
2483C000
heap
page read and write
61EB4000
direct allocation
page read and write
24828000
heap
page read and write
2484B000
heap
page read and write
36B40000
trusted library allocation
page read and write
377AA000
heap
page read and write
6CE11000
unkown
page execute read
61ED4000
direct allocation
page readonly
4227000
heap
page read and write
2A94D000
heap
page read and write
1E660000
heap
page read and write
24840000
heap
page read and write
30A6F000
stack
page read and write
40D6000
heap
page read and write
24835000
heap
page read and write
4060000
heap
page read and write
6CEB0000
unkown
page readonly
24840000
heap
page read and write
5D5B000
heap
page read and write
5D4E000
stack
page read and write
24840000
heap
page read and write
24833000
heap
page read and write
2A8F0000
heap
page read and write
1E671000
heap
page read and write
24840000
heap
page read and write
1E777000
heap
page read and write
1DC000
stack
page read and write
2485C000
heap
page read and write
412000
unkown
page readonly
377D9000
heap
page read and write
4020000
unkown
page read and write
24840000
heap
page read and write
7E0000
heap
page read and write
24840000
heap
page read and write
24840000
heap
page read and write
30B13000
heap
page read and write
624000
unkown
page execute and read and write
24831000
heap
page read and write
24828000
heap
page read and write
24840000
heap
page read and write
24846000
heap
page read and write
24833000
heap
page read and write
549000
unkown
page execute and read and write
6CE9E000
unkown
page read and write
5DE000
unkown
page readonly
24835000
heap
page read and write
2A945000
heap
page read and write
561000
unkown
page execute read
5DB000
unkown
page read and write
24855000
heap
page read and write
40F7000
heap
page read and write
24834000
heap
page read and write
2482A000
heap
page read and write
1E4FE000
stack
page read and write
24840000
heap
page read and write
24833000
heap
page read and write
447000
unkown
page execute and read and write
2484E000
heap
page read and write
1E35D000
stack
page read and write
37CB8000
heap
page read and write
1E10E000
stack
page read and write
24826000
heap
page read and write
1E0AF000
stack
page read and write
24837000
heap
page read and write
407E000
heap
page read and write
2485C000
heap
page read and write
40BE000
heap
page read and write
1E770000
trusted library allocation
page read and write
24840000
heap
page read and write
24835000
heap
page read and write
61E00000
direct allocation
page execute and read and write
24834000
heap
page read and write
5D50000
heap
page read and write
2484B000
heap
page read and write
377A0000
heap
page read and write
2483A000
heap
page read and write
2A913000
heap
page read and write
560000
unkown
page readonly
1E25E000
stack
page read and write
5CC000
unkown
page readonly
820000
heap
page read and write
1E670000
heap
page read and write
2485B000
heap
page read and write
4084000
heap
page execute and read and write
2483F000
heap
page read and write
419000
unkown
page write copy
24840000
heap
page read and write
2483D000
heap
page read and write
2483C000
heap
page read and write
61ECD000
direct allocation
page readonly
24838000
heap
page read and write
24820000
heap
page read and write
2485C000
heap
page read and write
1E20F000
stack
page read and write
24788000
heap
page read and write
1DE6E000
stack
page read and write
1DE2F000
stack
page read and write
730000
heap
page read and write
2485B000
heap
page read and write
2485C000
heap
page read and write
6D08E000
unkown
page read and write
9B000
stack
page read and write
24840000
heap
page read and write
1E3AE000
stack
page read and write
6D090000
unkown
page read and write
6CEA2000
unkown
page readonly
82A000
heap
page read and write
24840000
heap
page read and write
1F0000
heap
page read and write
61ECC000
direct allocation
page read and write
24926000
heap
page read and write
6CE8D000
unkown
page readonly
4022000
unkown
page readonly
24846000
heap
page read and write
1DFAE000
stack
page read and write
4070000
heap
page read and write
2A910000
heap
page read and write
400000
unkown
page readonly
1DF6F000
stack
page read and write
61EB7000
direct allocation
page readonly
24836000
heap
page read and write
30B05000
heap
page read and write
36B8C000
stack
page read and write
61ED0000
direct allocation
page read and write
24853000
heap
page read and write
4225000
heap
page read and write
248C2000
heap
page read and write
2A8FA000
heap
page read and write
197000
stack
page read and write
2485C000
heap
page read and write
82E000
heap
page read and write
2485C000
heap
page read and write
30B15000
heap
page read and write
24836000
heap
page read and write
24826000
heap
page read and write
61ED3000
direct allocation
page read and write
5CC000
unkown
page readonly
24836000
heap
page read and write
376CB000
stack
page read and write
41EE000
stack
page read and write
6D04F000
unkown
page readonly
561000
unkown
page execute read
2483A000
heap
page read and write
191000
stack
page read and write
407A000
heap
page read and write
540000
heap
page read and write
4022000
unkown
page readonly
2484B000
heap
page read and write
4220000
heap
page read and write
2485C000
heap
page read and write
246E7000
heap
page read and write
377B0000
heap
page read and write
6CE10000
unkown
page readonly
30B0D000
heap
page read and write
2484A000
heap
page read and write
1E671000
heap
page read and write
6D08F000
unkown
page write copy
41AE000
stack
page read and write
24839000
heap
page read and write
2A890000
heap
page read and write
There are 192 hidden memdumps, click here to show them.