IOC Report
q27UFusYdn.exe

loading gif

Files

File Path
Type
Category
Malicious
q27UFusYdn.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\CBAKJEHDBGHIEBGCGDGH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DTBZGIOOSO.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EBFHJEGDAFHIJKECFBKJ
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FBFIDBFHDBGIDHJJEGHIIDAFID
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GIIIIJDH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HJDGCGDBGCAAEBFIECGHDGCAAE
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\JDDHMPCDUJ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\JKKECBGIIIEBGCBGIDHDGCAKJE
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KATAXZVCPS.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\KECBFBAE
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\LTKMYBSEYZ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_q27UFusYdn.exe_17f263357178d1bd3398f7e1a5c12181ad9221_49752fc2_41f5f8f8-a691-4b0e-a676-bc26f5cb5f80\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER791E.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Apr 23 07:27:33 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7A77.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7AA7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\ONBQCLYSPU.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\RAYHIWGKDI.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\RAYHIWGKDI.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\SFPUSAFIOL.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\SUAVTZKNFL.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\VLZDGUKUTZ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\XZXHAVGRAG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\XZXHAVGRAG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 29 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\q27UFusYdn.exe
"C:\Users\user\Desktop\q27UFusYdn.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6672 -s 2160

URLs

Name
IP
Malicious
http://185.172.128.111/8e6d9db21fb63946/softokn3.dll
185.172.128.111
malicious
http://185.172.128.111/8e6d9db21fb63946/freebl3.dll
185.172.128.111
malicious
http://185.172.128.111/f
unknown
malicious
http://185.172.128.111/8e6d9db21fb63946/sqlite3.dll
185.172.128.111
malicious
http://185.172.128.111/8e6d9db21fb63946/nss3.dll
185.172.128.111
malicious
http://185.172.128.111/f993692117a3fda2.
unknown
malicious
http://185.172.128.111/8e6d9db21fb63946/mozglue.dll
185.172.128.111
malicious
http://185.172.128.111/8e6d9db21fb63946/msvcp140.dll
185.172.128.111
malicious
http://185.172.128.111
unknown
malicious
http://185.172.128.1
unknown
malicious
http://185.172.128.111/f993692117a3fda2.php
185.172.128.111
malicious
http://185.172.128.111/8e6d9db21fb63946/vcruntime140.dll
185.172.128.111
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.172.128.111/8e6d9db21fb63946/vcruntime140.dllc
unknown
http://185.172.128.111/8e6d9db21fb63946/softokn3.dll0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://185.172.128.111/f993692117a3fda2.phpt
unknown
http://185.172.128.111/f993692117a3fda2.phprowser
unknown
http://185.172.1Z
unknown
http://185.172.128.111/f993692117a3fda2.phpdpoint
unknown
http://185.172.128.111/f993692117a3fda2.php$
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
http://185.172.128.111/8e6d9db21fb63946/mozglue.dllt5C
unknown
http://185.172.128.111/f993692117a3fda2.y
unknown
http://185.172.128.111/8e6d9db21fb63946/nss3.dllF5U
unknown
http://www.sqlite.org/copyright.html.
unknown
http://185.172.128.111/f993692117a3fda2.phpodus.wallet
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.172.128.111/f993692117a3fda2.phpA
unknown
http://185.172.128.111/f993692117a3fda2.a
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
http://185.172.128.111/f993692117a3fda2.php62dda440aa63685631b0723d92e0release
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.172.128.111/f993692117a3fda2.Q
unknown
http://185.172.128.111/f993692117a3fda2.phpl?
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.172.128.111/f993692117a3fda2.I
unknown
http://185.172.128.111/f993692117a3fda2.phpd
unknown
http://185.172.128.111/f993692117a3fda2.phpb
unknown
http://185.172.128.111/f993692117a3fda2.A
unknown
http://185.172.128.111/f993692117a3fda2.phpL
unknown
http://185.172.128.111/f993692117a3fda2.phpPrograms
unknown
http://185.172.128.111/f993692117a3fda2.9
unknown
https://support.mozilla.org
unknown
http://185.172.128.111/f993692117a3fda2.phpT
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://185.172.128.111/f993692117a3fda2.phpR
unknown
There are 46 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.172.128.111
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{07f16914-05bf-186d-248f-a463a6abc68b}\Root\InventoryApplicationFile\q27ufusydn.exe|c92a7b88372494ef
ProgramId
\REGISTRY\A\{07f16914-05bf-186d-248f-a463a6abc68b}\Root\InventoryApplicationFile\q27ufusydn.exe|c92a7b88372494ef
FileId
\REGISTRY\A\{07f16914-05bf-186d-248f-a463a6abc68b}\Root\InventoryApplicationFile\q27ufusydn.exe|c92a7b88372494ef
LowerCaseLongPath
\REGISTRY\A\{07f16914-05bf-186d-248f-a463a6abc68b}\Root\InventoryApplicationFile\q27ufusydn.exe|c92a7b88372494ef
LongPathHash
\REGISTRY\A\{07f16914-05bf-186d-248f-a463a6abc68b}\Root\InventoryApplicationFile\q27ufusydn.exe|c92a7b88372494ef
Name
\REGISTRY\A\{07f16914-05bf-186d-248f-a463a6abc68b}\Root\InventoryApplicationFile\q27ufusydn.exe|c92a7b88372494ef
OriginalFileName
\REGISTRY\A\{07f16914-05bf-186d-248f-a463a6abc68b}\Root\InventoryApplicationFile\q27ufusydn.exe|c92a7b88372494ef
Publisher
\REGISTRY\A\{07f16914-05bf-186d-248f-a463a6abc68b}\Root\InventoryApplicationFile\q27ufusydn.exe|c92a7b88372494ef
Version
\REGISTRY\A\{07f16914-05bf-186d-248f-a463a6abc68b}\Root\InventoryApplicationFile\q27ufusydn.exe|c92a7b88372494ef
BinFileVersion
\REGISTRY\A\{07f16914-05bf-186d-248f-a463a6abc68b}\Root\InventoryApplicationFile\q27ufusydn.exe|c92a7b88372494ef
BinaryType
\REGISTRY\A\{07f16914-05bf-186d-248f-a463a6abc68b}\Root\InventoryApplicationFile\q27ufusydn.exe|c92a7b88372494ef
ProductName
\REGISTRY\A\{07f16914-05bf-186d-248f-a463a6abc68b}\Root\InventoryApplicationFile\q27ufusydn.exe|c92a7b88372494ef
ProductVersion
\REGISTRY\A\{07f16914-05bf-186d-248f-a463a6abc68b}\Root\InventoryApplicationFile\q27ufusydn.exe|c92a7b88372494ef
LinkDate
\REGISTRY\A\{07f16914-05bf-186d-248f-a463a6abc68b}\Root\InventoryApplicationFile\q27ufusydn.exe|c92a7b88372494ef
BinProductVersion
\REGISTRY\A\{07f16914-05bf-186d-248f-a463a6abc68b}\Root\InventoryApplicationFile\q27ufusydn.exe|c92a7b88372494ef
AppxPackageFullName
\REGISTRY\A\{07f16914-05bf-186d-248f-a463a6abc68b}\Root\InventoryApplicationFile\q27ufusydn.exe|c92a7b88372494ef
AppxPackageRelativeId
\REGISTRY\A\{07f16914-05bf-186d-248f-a463a6abc68b}\Root\InventoryApplicationFile\q27ufusydn.exe|c92a7b88372494ef
Size
\REGISTRY\A\{07f16914-05bf-186d-248f-a463a6abc68b}\Root\InventoryApplicationFile\q27ufusydn.exe|c92a7b88372494ef
Language
\REGISTRY\A\{07f16914-05bf-186d-248f-a463a6abc68b}\Root\InventoryApplicationFile\q27ufusydn.exe|c92a7b88372494ef
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
43E0000
direct allocation
page execute and read and write
malicious
4141000
heap
page read and write
malicious
400000
unkown
page execute and read and write
malicious
4410000
direct allocation
page read and write
malicious
1E36D000
stack
page read and write
61ED4000
direct allocation
page readonly
2A77E000
stack
page read and write
245C3000
heap
page read and write
245D9000
heap
page read and write
2A640000
heap
page read and write
245D0000
heap
page read and write
40F7000
heap
page read and write
40DE000
stack
page read and write
1DFAF000
stack
page read and write
2A701000
heap
page read and write
61EB4000
direct allocation
page read and write
6CF70000
unkown
page read and write
245E2000
heap
page read and write
245C6000
heap
page read and write
6CF6E000
unkown
page read and write
40F0000
heap
page read and write
245C8000
heap
page read and write
245DD000
heap
page read and write
61ED0000
direct allocation
page read and write
245D0000
heap
page read and write
245E9000
heap
page read and write
2A9CF000
stack
page read and write
549000
unkown
page execute and read and write
43DF000
stack
page read and write
1DFEE000
stack
page read and write
2A675000
heap
page read and write
31620000
heap
page read and write
245C3000
heap
page read and write
245C3000
heap
page read and write
400000
unkown
page readonly
2A6FA000
heap
page read and write
6CD7E000
unkown
page read and write
61ECC000
direct allocation
page read and write
245E2000
heap
page read and write
1E541000
heap
page read and write
1E12E000
stack
page read and write
245C8000
heap
page read and write
6CCF1000
unkown
page execute read
245D0000
heap
page read and write
4450000
heap
page read and write
1E541000
heap
page read and write
245DF000
heap
page read and write
24650000
heap
page read and write
245E2000
heap
page read and write
245E8000
heap
page read and write
245B6000
heap
page read and write
245B0000
heap
page read and write
2A663000
heap
page read and write
409E000
stack
page read and write
411A000
heap
page read and write
2A8CE000
stack
page read and write
2AA7A000
heap
page read and write
41E7000
heap
page read and write
4480000
heap
page read and write
245EC000
heap
page read and write
2AA77000
heap
page read and write
245CB000
heap
page read and write
411E000
heap
page read and write
245C8000
heap
page read and write
245C7000
heap
page read and write
1E530000
heap
page read and write
245DD000
heap
page read and write
5D6E000
stack
page read and write
245E3000
heap
page read and write
6CF75000
unkown
page readonly
2A9E0000
heap
page read and write
2AA6C000
heap
page read and write
245C9000
heap
page read and write
1E22F000
stack
page read and write
197000
stack
page read and write
31B2E000
heap
page read and write
245CD000
heap
page read and write
4192000
heap
page read and write
246BA000
heap
page read and write
245EA000
heap
page read and write
245DD000
heap
page read and write
245CD000
heap
page read and write
245D9000
heap
page read and write
2A6ED000
heap
page read and write
2A6FE000
heap
page read and write
2A66F000
heap
page read and write
40F7000
heap
page read and write
1F0000
heap
page read and write
245EC000
heap
page read and write
245C5000
heap
page read and write
245CD000
heap
page read and write
1E4AE000
stack
page read and write
6CF6F000
unkown
page write copy
245D9000
heap
page read and write
2A87E000
stack
page read and write
61ED3000
direct allocation
page read and write
245CD000
heap
page read and write
245B6000
heap
page read and write
6CD90000
unkown
page readonly
2AA74000
heap
page read and write
192000
stack
page read and write
41C000
unkown
page write copy
1E3AE000
stack
page read and write
245C4000
heap
page read and write
4021000
unkown
page read and write
6CD6D000
unkown
page readonly
245B7000
heap
page read and write
31590000
heap
page read and write
245CD000
heap
page read and write
1E0EF000
stack
page read and write
245EC000
heap
page read and write
245D9000
heap
page read and write
2A6C3000
heap
page read and write
245BC000
heap
page read and write
40F000
unkown
page readonly
1DEAE000
stack
page read and write
61ECD000
direct allocation
page readonly
245D9000
heap
page read and write
245E8000
heap
page read and write
245C8000
heap
page read and write
245B7000
heap
page read and write
416000
unkown
page write copy
61E00000
direct allocation
page execute and read and write
245E2000
heap
page read and write
245C8000
heap
page read and write
245EC000
heap
page read and write
30AB0000
trusted library allocation
page read and write
412C000
heap
page execute and read and write
4023000
unkown
page readonly
1E64A000
heap
page read and write
6CCF0000
unkown
page readonly
245B4000
heap
page read and write
245DD000
heap
page read and write
6CF2F000
unkown
page readonly
3159A000
heap
page read and write
458E000
stack
page read and write
245DD000
heap
page read and write
5E90000
heap
page read and write
2A620000
heap
page read and write
245DD000
heap
page read and write
245B6000
heap
page read and write
401000
unkown
page execute read
2A660000
heap
page read and write
1E540000
heap
page read and write
448B000
heap
page read and write
1E640000
trusted library allocation
page read and write
6CD82000
unkown
page readonly
245BD000
heap
page read and write
245EA000
heap
page read and write
624000
unkown
page execute and read and write
40F5000
heap
page read and write
9B000
stack
page read and write
2A668000
heap
page read and write
6CD91000
unkown
page execute read
5E6F000
stack
page read and write
4050000
heap
page read and write
245B8000
heap
page read and write
245B6000
heap
page read and write
245EA000
heap
page read and write
417A000
heap
page read and write
245E9000
heap
page read and write
245C6000
heap
page read and write
2AA7F000
heap
page read and write
447000
unkown
page execute and read and write
1E26E000
stack
page read and write
2A67C000
heap
page read and write
41EC000
heap
page read and write
4023000
unkown
page readonly
636000
unkown
page execute and read and write
61E01000
direct allocation
page execute read
19B000
stack
page read and write
4110000
heap
page read and write
245C8000
heap
page read and write
61EB7000
direct allocation
page readonly
There are 164 hidden memdumps, click here to show them.