IOC Report
VY2A7p8dtl.exe

loading gif

Files

File Path
Type
Category
Malicious
VY2A7p8dtl.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
malicious
C:\ProgramData\BKECFIIEHCFHIECAFBAKJJDGDA
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\CAFIJKFHIJKKEBGCFBFH
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\ECBGHCGCBKFIECBFHIDG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FBGCAAAA
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 5, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 5
dropped
C:\ProgramData\FIIIIDGHJEBFBGDHDGII
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GCFBAKKJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 9, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 9
dropped
C:\ProgramData\IIJJDGHJKKJEBFHJDBGHDBKFIE
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\41fd5e0f-5073-4881-bee1-53b9b99808ae.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\6601de03-659d-4548-a621-ea80b6e7ead1.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-67D46376-924.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-67D46377-11A0.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF237df.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF237ee.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF24414.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF24423.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\bb33ce4a-ba2e-47c1-86dc-9b2f6b5f2472.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\bca6fac2-64d9-4afc-8b69-d1f22d6ce749.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\cd73b082-a257-4da2-bbde-50a089fc45c0.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
Chrome Cache Entry: 132
ASCII text
downloaded
Chrome Cache Entry: 133
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 134
ASCII text, with very long lines (873)
downloaded
There are 31 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\VY2A7p8dtl.exe
"C:\Users\user\Desktop\VY2A7p8dtl.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2200,i,15006735606665546718,6053182466451153558,262144 --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2272 /prefetch:3
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=printing.mojom.UnsandboxedPrintBackendHost --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2200,i,15006735606665546718,6053182466451153558,262144 --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=5176 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2652 --field-trial-handle=2272,i,5846702112820281288,10336162213954718596,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2280 --field-trial-handle=2060,i,14463373682066098468,3696267290981563366,262144 /prefetch:3
malicious

URLs

Name
IP
Malicious
http://195.10.205.117/
195.10.205.117
malicious
http://195.10.205.117/3d3d9476182c2057.php
195.10.205.117
malicious
http://195.10.205.117/d308e86880289517/sqlite3.dll
195.10.205.117
malicious
http://195.10.205.117/d308e86880289517/freebl3.dll
195.10.205.117
malicious
http://195.10.205.117/d308e86880289517/softokn3.dll
195.10.205.117
malicious
http://195.10.205.117/d308e86880289517/vcruntime140.dll
195.10.205.117
malicious
http://195.10.205.117/d308e86880289517/nss3.dll
195.10.205.117
malicious
http://195.10.205.117/d308e86880289517/msvcp140.dll
195.10.205.117
malicious
http://195.10.205.117/d308e86880289517/mozglue.dll
195.10.205.117
malicious
http://195.10.205.117
unknown
malicious
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
http://195.10.205.117/3d3d9476182c2057.phpk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://195.10.205.117/3d3d9476182c2057.phpl
unknown
http://195.10.205.117/3d3d9476182c2057.phpwser
unknown
http://195.10.205.117/d308e86880289517/vcruntime140.dll-
unknown
http://195.10.205.117/3d3d9476182c2057.phpi
unknown
http://195.10.205.117/d308e86880289517/msvcp140.dllx
unknown
http://195.10.205.117/d308e86880289517/freebl3.dllJ
unknown
http://195.10.205.117/d308e86880289517/sqlite3.dll2
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
http://195.10.205.117/3d3d9476182c2057.phpI
unknown
http://195.10.205.1173d3d9476182c2057.phpe
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://195.10.205.117/3d3d9476182c2057.phpQ
unknown
https://duckduckgo.com/chrome_newtabv209h
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
172.217.18.4
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyA2KlwBX3mkFo30om9LUFYQhpqLoa_BNhE
172.217.18.4
http://195.10.205.117/3d3d9476182c2057.phpe
unknown
http://195.10.205.117/3d3d9476182c2057.phpf
unknown
http://www.sqlite.org/copyright.html.
unknown
http://195.10.205.117/3d3d9476182c2057.phpa
unknown
http://195.10.205.117a
unknown
http://195.10.205.117/2
unknown
http://195.10.205.117/J.
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://195.10.205.117/d308e86880289517/sqlite3.dllj
unknown
https://mozilla.org0/
unknown
http://195.10.205.117/3d3d9476182c2057.php3
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ac.ecosia.org?q=
unknown
https://www.google.com/async/newtab_promos
172.217.18.4
http://195.10.205.117/3d3d9476182c2057.php9
unknown
http://195.10.205.117/d308e86880289517/vcruntime140.dll6880289517/nss3.dlla
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://195.10.205.117/d308e86880289517/nss3.dllv
unknown
https://www.google.com/async/ddljson?async=ntp:2
172.217.18.4
https://www.ecosia.org/newtab/v20
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://195.10.205.117/3d3d9476182c2057.phpea3501dfda1220ac704e6b17e7588tension
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://195.10.205.117/d308e86880289517/vcruntime140.dll3
unknown
https://gemini.google.com/app?q=
unknown
There are 52 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
172.217.18.4

IPs

IP
Domain
Country
Malicious
195.10.205.117
unknown
Russian Federation
malicious
192.168.2.5
unknown
unknown
malicious
172.217.18.4
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
153E000
heap
page read and write
malicious
8EB000
unkown
page readonly
malicious
8EB000
unkown
page readonly
malicious
9BBA000
heap
page read and write
9A6D000
heap
page read and write
37DC000
stack
page read and write
61E01000
direct allocation
page execute read
9A50000
heap
page read and write
6FBE1000
unkown
page execute read
9A52000
heap
page read and write
9A50000
heap
page read and write
9A73000
heap
page read and write
89D000
stack
page read and write
9BB7000
heap
page read and write
9A30000
trusted library allocation
page read and write
9A50000
heap
page read and write
39C1000
heap
page read and write
9EF8000
heap
page read and write
9A30000
heap
page read and write
9A3D000
heap
page read and write
9A60000
heap
page read and write
9A49000
heap
page read and write
354F000
stack
page read and write
9A51000
heap
page read and write
9A5B000
heap
page read and write
9A4E000
heap
page read and write
61ECC000
direct allocation
page read and write
9A57000
heap
page read and write
9A64000
heap
page read and write
13A7000
heap
page read and write
8C0000
unkown
page readonly
39C0000
heap
page read and write
9B3B000
heap
page read and write
9A54000
heap
page read and write
1623000
heap
page read and write
9F00000
heap
page read and write
1607000
heap
page read and write
9A51000
heap
page read and write
AF8000
unkown
page read and write
8AC000
heap
page read and write
8A3000
heap
page read and write
9BC8000
heap
page read and write
61EB4000
direct allocation
page read and write
9BCB000
heap
page read and write
3AC1000
heap
page read and write
9A3D000
heap
page read and write
B1D000
unkown
page readonly
9F00000
heap
page read and write
61E00000
direct allocation
page execute and read and write
6CB0E000
unkown
page read and write
9A50000
heap
page read and write
9BB5000
heap
page read and write
9A73000
heap
page read and write
153A000
heap
page read and write
392D000
stack
page read and write
9A64000
heap
page read and write
152E000
stack
page read and write
9A6D000
heap
page read and write
9A73000
heap
page read and write
61ED3000
direct allocation
page read and write
39C1000
heap
page read and write
137E000
stack
page read and write
1582000
heap
page read and write
330F000
stack
page read and write
810000
heap
page read and write
61ED4000
direct allocation
page readonly
6C931000
unkown
page execute read
9A30000
trusted library allocation
page read and write
85E000
stack
page read and write
359D000
stack
page read and write
9C1B000
heap
page read and write
1610000
heap
page read and write
39B0000
heap
page read and write
9A57000
heap
page read and write
9A57000
heap
page read and write
9A57000
heap
page read and write
61ED0000
direct allocation
page read and write
9A64000
heap
page read and write
9A57000
heap
page read and write
9F06000
heap
page read and write
9EA0000
heap
page read and write
9A4D000
heap
page read and write
975000
unkown
page read and write
9A57000
heap
page read and write
9BD1000
heap
page read and write
9B40000
heap
page read and write
9A49000
heap
page read and write
9A7B000
heap
page read and write
8C1000
unkown
page execute read
9A5B000
heap
page read and write
6C930000
unkown
page readonly
13A7000
heap
page read and write
9C12000
heap
page read and write
36DE000
stack
page read and write
6CACF000
unkown
page readonly
9A49000
heap
page read and write
9A4E000
heap
page read and write
6FC6E000
unkown
page read and write
9A50000
heap
page read and write
156A000
heap
page read and write
9A73000
heap
page read and write
9A73000
heap
page read and write
9A57000
heap
page read and write
156F000
heap
page read and write
9A64000
heap
page read and write
13A5000
heap
page read and write
6CB15000
unkown
page readonly
61EB7000
direct allocation
page readonly
9C30000
trusted library allocation
page read and write
9A3C000
heap
page read and write
8C0000
unkown
page readonly
6CB10000
unkown
page read and write
9A57000
heap
page read and write
9A3D000
heap
page read and write
9BBF000
heap
page read and write
9A5B000
heap
page read and write
39C1000
heap
page read and write
320F000
stack
page read and write
6FC72000
unkown
page readonly
382E000
stack
page read and write
9A64000
heap
page read and write
944000
unkown
page read and write
9A4D000
heap
page read and write
1320000
heap
page read and write
798000
stack
page read and write
9A60000
heap
page read and write
9A51000
heap
page read and write
10ECA000
heap
page read and write
9A73000
heap
page read and write
9A4C000
heap
page read and write
B0A000
unkown
page readonly
9A50000
heap
page read and write
159F000
heap
page read and write
9A7B000
heap
page read and write
9A4E000
heap
page read and write
109B0000
heap
page read and write
9A54000
heap
page read and write
9A4E000
heap
page read and write
161B000
heap
page read and write
9A73000
heap
page read and write
9EF8000
heap
page read and write
9B30000
heap
page read and write
8C1000
unkown
page execute read
9AD0000
heap
page read and write
A27000
unkown
page read and write
69B000
stack
page read and write
9A4E000
heap
page read and write
9A73000
heap
page read and write
9A53000
heap
page read and write
9A50000
heap
page read and write
9A5D000
heap
page read and write
B1D000
unkown
page readonly
9A57000
heap
page read and write
13A7000
heap
page read and write
344E000
stack
page read and write
9A64000
heap
page read and write
9B48000
heap
page read and write
9C60000
heap
page read and write
9EAA000
heap
page read and write
9A57000
heap
page read and write
9B60000
heap
page read and write
9A64000
heap
page read and write
9A35000
heap
page read and write
13A7000
heap
page read and write
9A5D000
heap
page read and write
9B36000
heap
page read and write
9A3C000
heap
page read and write
61ECD000
direct allocation
page readonly
9A57000
heap
page read and write
9BA0000
heap
page read and write
9A67000
heap
page read and write
9A4E000
heap
page read and write
1530000
heap
page read and write
9B80000
heap
page read and write
8F7000
unkown
page write copy
12FE000
stack
page read and write
B0A000
unkown
page readonly
3AC0000
trusted library allocation
page read and write
9A50000
heap
page read and write
9A70000
heap
page read and write
8F7000
unkown
page write copy
14AE000
stack
page read and write
1615000
heap
page read and write
9A50000
heap
page read and write
1603000
heap
page read and write
6FBE0000
unkown
page readonly
13A0000
heap
page read and write
14EE000
stack
page read and write
9B42000
heap
page read and write
9A3D000
heap
page read and write
6CB0F000
unkown
page write copy
98C000
unkown
page read and write
9B4D000
heap
page read and write
8A0000
heap
page read and write
9A57000
heap
page read and write
800000
heap
page read and write
9A50000
heap
page read and write
9A73000
heap
page read and write
793000
stack
page read and write
9E60000
trusted library allocation
page read and write
9A7B000
heap
page read and write
39C1000
heap
page read and write
340F000
stack
page read and write
9C15000
heap
page read and write
9A50000
heap
page read and write
9A7B000
heap
page read and write
6FC5D000
unkown
page readonly
9A65000
heap
page read and write
9A52000
heap
page read and write
369D000
stack
page read and write
9A4D000
heap
page read and write
9A60000
heap
page read and write
There are 202 hidden memdumps, click here to show them.