IOC Report
exDbnS3M12.exe

loading gif

Files

File Path
Type
Category
Malicious
exDbnS3M12.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BNAGMGSPLO.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\CBGCGDBKEGHIEBGDBFHD
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CFIJEBFCGDAAKFHIDBFIDBKFHJ
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\CURQNKVOIX.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\CURQNKVOIX.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\DVWHKMNFNN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\FBKKFBAEGDHJJJJKFBKFHCAFCB
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\FCAKFCGC
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\FHCBGIIJKEBFCBGDBAEB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IIIJECAE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JDAEHJJECAEGCAAAAEGIEBKEBK
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KATAXZVCPS.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_exDbnS3M12.exe_7320d2c7348eb5a2cce5ad3858cd98525166d_22b2d4d1_07e9c368-5f83-4de7-9d6d-37ea26527dad\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDAB6.tmp.dmp
Mini DuMP crash report, 14 streams, Fri May 3 00:08:04 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDC3D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDC5E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\NEBFQQYWPS.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\NYMMPCEIMA.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ONBQCLYSPU.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\UMMBDNEQBN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\VLZDGUKUTZ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\VLZDGUKUTZ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\WUTJSCBCFX.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 29 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\exDbnS3M12.exe
"C:\Users\user\Desktop\exDbnS3M12.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6860 -s 2084

URLs

Name
IP
Malicious
http://185.172.128.151/7043a0c6a68d9c65.php
185.172.128.151
malicious
http://185.172.128.151/8420e83ceb95f3af/softokn3.dll
185.172.128.151
malicious
http://185.172.128.151/8420e83ceb95f3af/vcruntime140.dll
185.172.128.151
malicious
http://185.172.128.151/8420e83ceb95f3af/sqlite3.dll
185.172.128.151
malicious
http://185.172.128.151/8420e83ceb95f3af/freebl3.dll
185.172.128.151
malicious
http://185.172.1
unknown
malicious
http://185.172.128.151/7043a0c6a68d9c65.
unknown
malicious
http://185.172.128.151/8420e83ceb95f3af/mozglue.dll
185.172.128.151
malicious
185.172.128.151/7043a0c6a68d9c65.php
malicious
http://185.172.128.151/8420e83ceb95f3af/nss3.dll
185.172.128.151
malicious
http://185.172.128.151
unknown
malicious
http://185.172.128.151/8420e83ceb95f3af/msvcp140.dll
185.172.128.151
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
http://185.172.128.151/8420e83ceb95f3af/softokn3.dll;
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.172.128.151/7043a0c6a68d9c65.phpamily
unknown
http://185.172.128.151/8420e83ceb95f3af/freebl3.dllU
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://185.172.128.151/7043a0c6a68d9c65.phpphp
unknown
http://185.172.1#
unknown
http://185.172.128.151/7043a0c6a68d9c65.phpM
unknown
http://185.172.128.151/7043a0c6a68d9c65.php4Y
unknown
http://185.172.128.151/7043a0c6a68d9c65.php0Z
unknown
http://185.172.128.151/7043a0c6a68d9c65.phpP
unknown
http://185.172.128.151/7043a0c6a68d9c65.phpnfigOverlay
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.172.128.151/7043a0c6a68d9c65.phpp$
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016.exe
unknown
http://185.172.128.151/7043a0c6a68d9c65.phpF
unknown
http://185.172.128.151/7043a0c6a68d9c65.php9234f57b36f5aecdadff57d390ccrelease6e79ea3d936bac71f9bd79
unknown
http://185.172.128.151/7043a0c6a68d9c65.phpJ
unknown
http://www.sqlite.org/copyright.html.
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
http://185.172.128.151/8420e83ceb95f3af/nss3.dll7
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.172.128.151/7043a0c6a68d9c65.phpp
unknown
http://185.172.128.151/7t
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://ac.ecopnacl
unknown
http://185.172.128.151/7h
unknown
http://185.172.128.151/7043a0c6a68d9c65.phpdpoint
unknown
http://185.172.128.151/7043a0c6a68d9c65.phppY
unknown
https://support.mozilla.org
unknown
https://ac.ecop
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 44 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.172.128.151
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{e4ae18c1-c77e-8e6e-647e-e1be540f0fe7}\Root\InventoryApplicationFile\exdbns3m12.exe|c016a2969c21c35a
ProgramId
\REGISTRY\A\{e4ae18c1-c77e-8e6e-647e-e1be540f0fe7}\Root\InventoryApplicationFile\exdbns3m12.exe|c016a2969c21c35a
FileId
\REGISTRY\A\{e4ae18c1-c77e-8e6e-647e-e1be540f0fe7}\Root\InventoryApplicationFile\exdbns3m12.exe|c016a2969c21c35a
LowerCaseLongPath
\REGISTRY\A\{e4ae18c1-c77e-8e6e-647e-e1be540f0fe7}\Root\InventoryApplicationFile\exdbns3m12.exe|c016a2969c21c35a
LongPathHash
\REGISTRY\A\{e4ae18c1-c77e-8e6e-647e-e1be540f0fe7}\Root\InventoryApplicationFile\exdbns3m12.exe|c016a2969c21c35a
Name
\REGISTRY\A\{e4ae18c1-c77e-8e6e-647e-e1be540f0fe7}\Root\InventoryApplicationFile\exdbns3m12.exe|c016a2969c21c35a
OriginalFileName
\REGISTRY\A\{e4ae18c1-c77e-8e6e-647e-e1be540f0fe7}\Root\InventoryApplicationFile\exdbns3m12.exe|c016a2969c21c35a
Publisher
\REGISTRY\A\{e4ae18c1-c77e-8e6e-647e-e1be540f0fe7}\Root\InventoryApplicationFile\exdbns3m12.exe|c016a2969c21c35a
Version
\REGISTRY\A\{e4ae18c1-c77e-8e6e-647e-e1be540f0fe7}\Root\InventoryApplicationFile\exdbns3m12.exe|c016a2969c21c35a
BinFileVersion
\REGISTRY\A\{e4ae18c1-c77e-8e6e-647e-e1be540f0fe7}\Root\InventoryApplicationFile\exdbns3m12.exe|c016a2969c21c35a
BinaryType
\REGISTRY\A\{e4ae18c1-c77e-8e6e-647e-e1be540f0fe7}\Root\InventoryApplicationFile\exdbns3m12.exe|c016a2969c21c35a
ProductName
\REGISTRY\A\{e4ae18c1-c77e-8e6e-647e-e1be540f0fe7}\Root\InventoryApplicationFile\exdbns3m12.exe|c016a2969c21c35a
ProductVersion
\REGISTRY\A\{e4ae18c1-c77e-8e6e-647e-e1be540f0fe7}\Root\InventoryApplicationFile\exdbns3m12.exe|c016a2969c21c35a
LinkDate
\REGISTRY\A\{e4ae18c1-c77e-8e6e-647e-e1be540f0fe7}\Root\InventoryApplicationFile\exdbns3m12.exe|c016a2969c21c35a
BinProductVersion
\REGISTRY\A\{e4ae18c1-c77e-8e6e-647e-e1be540f0fe7}\Root\InventoryApplicationFile\exdbns3m12.exe|c016a2969c21c35a
AppxPackageFullName
\REGISTRY\A\{e4ae18c1-c77e-8e6e-647e-e1be540f0fe7}\Root\InventoryApplicationFile\exdbns3m12.exe|c016a2969c21c35a
AppxPackageRelativeId
\REGISTRY\A\{e4ae18c1-c77e-8e6e-647e-e1be540f0fe7}\Root\InventoryApplicationFile\exdbns3m12.exe|c016a2969c21c35a
Size
\REGISTRY\A\{e4ae18c1-c77e-8e6e-647e-e1be540f0fe7}\Root\InventoryApplicationFile\exdbns3m12.exe|c016a2969c21c35a
Language
\REGISTRY\A\{e4ae18c1-c77e-8e6e-647e-e1be540f0fe7}\Root\InventoryApplicationFile\exdbns3m12.exe|c016a2969c21c35a
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2C0C000
heap
page read and write
malicious
2EC0000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
2E90000
direct allocation
page execute and read and write
malicious
6D10E000
unkown
page read and write
23090000
heap
page read and write
2CE5000
heap
page read and write
2308D000
heap
page read and write
2FB0000
heap
page read and write
23077000
heap
page read and write
1D010000
heap
page read and write
61ED4000
direct allocation
page readonly
2924E000
stack
page read and write
230A2000
heap
page read and write
495F000
stack
page read and write
430000
unkown
page write copy
499E000
stack
page read and write
230AA000
heap
page read and write
29100000
heap
page read and write
293EF000
heap
page read and write
1CABE000
stack
page read and write
23086000
heap
page read and write
2309D000
heap
page read and write
2EFB000
heap
page read and write
23090000
heap
page read and write
6D10F000
unkown
page write copy
1D110000
heap
page read and write
2CD3000
heap
page read and write
9B000
stack
page read and write
1D110000
trusted library allocation
page read and write
2CE7000
heap
page read and write
2BEA000
heap
page read and write
230A9000
heap
page read and write
2307E000
heap
page read and write
549000
unkown
page execute and read and write
400000
unkown
page readonly
6E371000
unkown
page execute read
2E3F000
stack
page read and write
2C5E000
heap
page read and write
61EB4000
direct allocation
page read and write
2308B000
heap
page read and write
2BEE000
heap
page read and write
2309D000
heap
page read and write
1CF7E000
stack
page read and write
23111000
heap
page read and write
6E370000
unkown
page readonly
199000
stack
page read and write
2E7E000
stack
page read and write
23177000
heap
page read and write
23088000
heap
page read and write
1D011000
heap
page read and write
61EB7000
direct allocation
page readonly
23089000
heap
page read and write
23076000
heap
page read and write
290E0000
heap
page read and write
61E00000
direct allocation
page execute and read and write
230A9000
heap
page read and write
230AC000
heap
page read and write
2CF0000
heap
page read and write
29120000
heap
page read and write
293F5000
heap
page read and write
23088000
heap
page read and write
2309D000
heap
page read and write
23083000
heap
page read and write
23076000
heap
page read and write
1D000000
heap
page read and write
6D0CF000
unkown
page readonly
1F0000
heap
page read and write
309D0000
heap
page read and write
6CF31000
unkown
page execute read
2CE0000
heap
page read and write
2308C000
heap
page read and write
447000
unkown
page execute and read and write
2BF7000
heap
page execute and read and write
23088000
heap
page read and write
1CE7E000
stack
page read and write
6E3ED000
unkown
page readonly
1CCFF000
stack
page read and write
23083000
heap
page read and write
293F7000
heap
page read and write
23078000
heap
page read and write
293EF000
heap
page read and write
6E3FE000
unkown
page read and write
230AA000
heap
page read and write
2308D000
heap
page read and write
230AC000
heap
page read and write
23090000
heap
page read and write
30BE000
stack
page read and write
401000
unkown
page execute read
41A000
unkown
page readonly
2C48000
heap
page read and write
230A2000
heap
page read and write
1CE3D000
stack
page read and write
636000
unkown
page execute and read and write
230A2000
heap
page read and write
6E402000
unkown
page readonly
2309D000
heap
page read and write
193000
stack
page read and write
2CE7000
heap
page read and write
230AC000
heap
page read and write
2F460000
heap
page read and write
23080000
heap
page read and write
23070000
heap
page read and write
2308D000
heap
page read and write
1CBFE000
stack
page read and write
1D011000
heap
page read and write
61ECD000
direct allocation
page readonly
23088000
heap
page read and write
61ECC000
direct allocation
page read and write
23088000
heap
page read and write
2309D000
heap
page read and write
2F20000
heap
page read and write
230A2000
heap
page read and write
230A0000
heap
page read and write
624000
unkown
page execute and read and write
61ED3000
direct allocation
page read and write
2308D000
heap
page read and write
2F420000
trusted library allocation
page read and write
2BE0000
heap
page read and write
29182000
heap
page read and write
230A8000
heap
page read and write
6D115000
unkown
page readonly
304C4000
heap
page read and write
29171000
heap
page read and write
23076000
heap
page read and write
2F4A0000
heap
page read and write
23088000
heap
page read and write
2934F000
stack
page read and write
61ED0000
direct allocation
page read and write
2F46A000
heap
page read and write
1CBBF000
stack
page read and write
2EF0000
heap
page read and write
6CF30000
unkown
page readonly
293E7000
heap
page read and write
23086000
heap
page read and write
2C73000
heap
page read and write
2AEE000
unkown
page readonly
61E01000
direct allocation
page execute read
2F7E000
stack
page read and write
2307C000
heap
page read and write
23087000
heap
page read and write
230A8000
heap
page read and write
2307C000
heap
page read and write
23076000
heap
page read and write
23077000
heap
page read and write
1CD3E000
stack
page read and write
230AA000
heap
page read and write
40C000
unkown
page readonly
49A0000
heap
page read and write
230AC000
heap
page read and write
23084000
heap
page read and write
2D3E000
stack
page read and write
230A3000
heap
page read and write
2AEE000
unkown
page readonly
6D110000
unkown
page read and write
23076000
heap
page read and write
1CA7F000
stack
page read and write
There are 147 hidden memdumps, click here to show them.