IOC Report
w3WOJ1ohgD.exe

loading gif

Files

File Path
Type
Category
Malicious
w3WOJ1ohgD.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\tiktok[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\FBKJDGCGDA.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\CAAKFIIDGIEHIDGCGHIIECGIJK
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DAECAECFCAAEBFHIEHDGHDHCBA
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DVWHKMNFNN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\FENIVHOIKN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\FENIVHOIKN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\GIDBKKKKKFBGDGDHIDBG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HIIIJDAAAAAAKECBFBAE
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HJDAKFBF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HTAGVDFUIE.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\KFIEHIII
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KJJJDHDGDAAKECAKJDAEGCBKEH
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_w3WOJ1ohgD.exe_07e66848ed9fe7765a468cc42953c4fe5536254_f6f3c23d_00f74d96-6ec7-4fb2-b6fb-c6161c00c842\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2604.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Apr 25 12:42:31 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER298F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER29BF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\NEBFQQYWPS.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\NWTVCDUMOB.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\NYMMPCEIMA.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ONBQCLYSPU.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ONBQCLYSPU.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\PIVFAGEAAV.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\UMMBDNEQBN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\UMMBDNEQBN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\VLZDGUKUTZ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\XZXHAVGRAG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 33 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\w3WOJ1ohgD.exe
"C:\Users\user\Desktop\w3WOJ1ohgD.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\FBKJDGCGDA.exe"
malicious
C:\Users\user\AppData\Local\Temp\FBKJDGCGDA.exe
"C:\Users\user\AppData\Local\Temp\FBKJDGCGDA.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7428 -s 2268

URLs

Name
IP
Malicious
http://185.172.128.76/15f649199f40275b/nss3.dll
185.172.128.76
malicious
http://185.1
unknown
malicious
http://185.172.128.76/15f649199f40275b/softokn3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/mozglue.dll
185.172.128.76
malicious
185.172.128.76/3cd2b41cbde8fc9c.php
malicious
http://185.172.128.76/3cd2b41cbde8fc9c.php
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/freebl3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/msvcp140.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/vcruntime140.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/sqlite3.dll
185.172.128.76
malicious
http://185.172.128.76
unknown
malicious
http://185.172.128.76/15f649199f40275b/nss3.dllBz
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
http://185.172.10n
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://duckduckgo.com/ac/?q=
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://185.172.128.76/3cBn
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpt
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.172.128.203/tiktok.exe
185.172.128.203
http://185.172.128.203/tiktok.exe00
unknown
http://185.172.128.76/15f649199f40275b/nss3.dll$z
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpVDW
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php71bb574811636c15fa1a905272a27release79d524d37ca609991fe296
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.172.128.203/tiktok.exet-Disposition:
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
https://support.mozilla.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016.exe
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://185.172.128.76/3cd2b4Mn?
unknown
http://www.sqlite.org/copyright.html.
unknown
There are 32 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.172.128.76
unknown
Russian Federation
malicious
185.172.128.203
unknown
Russian Federation

Registry

Path
Value
Malicious
\REGISTRY\A\{1fe7909d-4e6d-a431-4956-92aa18a8c682}\Root\InventoryApplicationFile\w3woj1ohgd.exe|5bc659237e73babe
ProgramId
\REGISTRY\A\{1fe7909d-4e6d-a431-4956-92aa18a8c682}\Root\InventoryApplicationFile\w3woj1ohgd.exe|5bc659237e73babe
FileId
\REGISTRY\A\{1fe7909d-4e6d-a431-4956-92aa18a8c682}\Root\InventoryApplicationFile\w3woj1ohgd.exe|5bc659237e73babe
LowerCaseLongPath
\REGISTRY\A\{1fe7909d-4e6d-a431-4956-92aa18a8c682}\Root\InventoryApplicationFile\w3woj1ohgd.exe|5bc659237e73babe
LongPathHash
\REGISTRY\A\{1fe7909d-4e6d-a431-4956-92aa18a8c682}\Root\InventoryApplicationFile\w3woj1ohgd.exe|5bc659237e73babe
Name
\REGISTRY\A\{1fe7909d-4e6d-a431-4956-92aa18a8c682}\Root\InventoryApplicationFile\w3woj1ohgd.exe|5bc659237e73babe
OriginalFileName
\REGISTRY\A\{1fe7909d-4e6d-a431-4956-92aa18a8c682}\Root\InventoryApplicationFile\w3woj1ohgd.exe|5bc659237e73babe
Publisher
\REGISTRY\A\{1fe7909d-4e6d-a431-4956-92aa18a8c682}\Root\InventoryApplicationFile\w3woj1ohgd.exe|5bc659237e73babe
Version
\REGISTRY\A\{1fe7909d-4e6d-a431-4956-92aa18a8c682}\Root\InventoryApplicationFile\w3woj1ohgd.exe|5bc659237e73babe
BinFileVersion
\REGISTRY\A\{1fe7909d-4e6d-a431-4956-92aa18a8c682}\Root\InventoryApplicationFile\w3woj1ohgd.exe|5bc659237e73babe
BinaryType
\REGISTRY\A\{1fe7909d-4e6d-a431-4956-92aa18a8c682}\Root\InventoryApplicationFile\w3woj1ohgd.exe|5bc659237e73babe
ProductName
\REGISTRY\A\{1fe7909d-4e6d-a431-4956-92aa18a8c682}\Root\InventoryApplicationFile\w3woj1ohgd.exe|5bc659237e73babe
ProductVersion
\REGISTRY\A\{1fe7909d-4e6d-a431-4956-92aa18a8c682}\Root\InventoryApplicationFile\w3woj1ohgd.exe|5bc659237e73babe
LinkDate
\REGISTRY\A\{1fe7909d-4e6d-a431-4956-92aa18a8c682}\Root\InventoryApplicationFile\w3woj1ohgd.exe|5bc659237e73babe
BinProductVersion
\REGISTRY\A\{1fe7909d-4e6d-a431-4956-92aa18a8c682}\Root\InventoryApplicationFile\w3woj1ohgd.exe|5bc659237e73babe
AppxPackageFullName
\REGISTRY\A\{1fe7909d-4e6d-a431-4956-92aa18a8c682}\Root\InventoryApplicationFile\w3woj1ohgd.exe|5bc659237e73babe
AppxPackageRelativeId
\REGISTRY\A\{1fe7909d-4e6d-a431-4956-92aa18a8c682}\Root\InventoryApplicationFile\w3woj1ohgd.exe|5bc659237e73babe
Size
\REGISTRY\A\{1fe7909d-4e6d-a431-4956-92aa18a8c682}\Root\InventoryApplicationFile\w3woj1ohgd.exe|5bc659237e73babe
Language
\REGISTRY\A\{1fe7909d-4e6d-a431-4956-92aa18a8c682}\Root\InventoryApplicationFile\w3woj1ohgd.exe|5bc659237e73babe
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
24C0000
direct allocation
page read and write
malicious
9F0000
direct allocation
page execute and read and write
malicious
A54000
heap
page read and write
malicious
400000
unkown
page execute and read and write
malicious
6CD6E000
unkown
page read and write
25EB000
heap
page read and write
20DFC000
heap
page read and write
AF4000
heap
page read and write
839000
unkown
page readonly
61E00000
direct allocation
page execute and read and write
DC000
unkown
page readonly
193000
stack
page read and write
61ED4000
direct allocation
page readonly
70000
unkown
page readonly
6CD80000
unkown
page readonly
6CD72000
unkown
page readonly
1AD51000
heap
page read and write
20DF3000
heap
page read and write
20DD4000
heap
page read and write
447000
unkown
page execute and read and write
20DED000
heap
page read and write
1AE50000
trusted library allocation
page read and write
20DED000
heap
page read and write
6CD81000
unkown
page execute read
20E60000
heap
page read and write
20DCC000
heap
page read and write
636000
unkown
page execute and read and write
20DC6000
heap
page read and write
2450000
heap
page read and write
D1F000
stack
page read and write
400000
unkown
page readonly
20DF8000
heap
page read and write
9B000
stack
page read and write
20DD2000
heap
page read and write
2DDEB000
stack
page read and write
198000
stack
page read and write
20DF9000
heap
page read and write
EB000
unkown
page read and write
20DDD000
heap
page read and write
20DCE000
heap
page read and write
26F12000
heap
page read and write
20DF8000
heap
page read and write
EE000
unkown
page readonly
8D0000
heap
page read and write
20ECB000
heap
page read and write
20DE0000
heap
page read and write
9EE000
stack
page read and write
549000
unkown
page execute and read and write
401000
unkown
page execute read
26EFB000
heap
page read and write
20DC7000
heap
page read and write
20DD4000
heap
page read and write
1AB9E000
stack
page read and write
61ECD000
direct allocation
page readonly
20DC0000
heap
page read and write
2740000
heap
page read and write
AA2000
heap
page read and write
77A000
stack
page read and write
6CF5F000
unkown
page write copy
20DF2000
heap
page read and write
A2E000
heap
page read and write
20DC6000
heap
page read and write
2E880000
heap
page read and write
26F8E000
stack
page read and write
20DD3000
heap
page read and write
20DED000
heap
page read and write
20DDB000
heap
page read and write
270DE000
stack
page read and write
2D2A0000
trusted library allocation
page read and write
71000
unkown
page execute read
1A91F000
stack
page read and write
61ED3000
direct allocation
page read and write
2E8F5000
heap
page read and write
20DFC000
heap
page read and write
7F0000
heap
page read and write
8D7000
heap
page read and write
26E7E000
heap
page read and write
6CF60000
unkown
page read and write
1AD50000
heap
page read and write
20DFA000
heap
page read and write
20DE0000
heap
page read and write
6CD5D000
unkown
page readonly
6CCE0000
unkown
page readonly
A20000
heap
page read and write
7E0000
heap
page read and write
8D5000
heap
page read and write
B05000
heap
page read and write
20DD7000
heap
page read and write
A86000
heap
page read and write
2D2EC000
stack
page read and write
61EB4000
direct allocation
page read and write
20DD8000
heap
page read and write
20DD6000
heap
page read and write
20DF9000
heap
page read and write
2D32C000
stack
page read and write
1A95E000
stack
page read and write
26ED1000
heap
page read and write
2DF6C000
stack
page read and write
6CF65000
unkown
page readonly
20DDD000
heap
page read and write
1A81F000
stack
page read and write
61EB7000
direct allocation
page readonly
DC000
unkown
page readonly
24F0000
heap
page read and write
20DD6000
heap
page read and write
C1F000
stack
page read and write
EE000
unkown
page readonly
A90000
heap
page read and write
AEC000
heap
page read and write
271DF000
stack
page read and write
20DFC000
heap
page read and write
AE7000
heap
page read and write
20DEE000
heap
page read and write
26E50000
heap
page read and write
2D2F0000
heap
page read and write
71000
unkown
page execute read
27286000
heap
page read and write
20DCA000
heap
page read and write
20DE0000
heap
page read and write
89E000
stack
page read and write
20DDD000
heap
page read and write
1ABDE000
stack
page read and write
B09000
heap
page read and write
1AD40000
heap
page read and write
1AA5F000
stack
page read and write
6CF5E000
unkown
page read and write
20DFC000
heap
page read and write
26E70000
heap
page read and write
B00000
heap
page read and write
AE2000
heap
page read and write
70000
unkown
page readonly
61ECC000
direct allocation
page read and write
20DC7000
heap
page read and write
20DF2000
heap
page read and write
61E01000
direct allocation
page execute read
272E000
stack
page read and write
6CCE1000
unkown
page execute read
A2A000
heap
page read and write
2708D000
stack
page read and write
624000
unkown
page execute and read and write
2E375000
heap
page read and write
20DD8000
heap
page read and write
258E000
stack
page read and write
2728C000
heap
page read and write
421000
unkown
page readonly
26E8B000
heap
page read and write
20DFA000
heap
page read and write
1AD51000
heap
page read and write
850000
heap
page read and write
20DD8000
heap
page read and write
437000
unkown
page write copy
1AA9E000
stack
page read and write
40E000
unkown
page readonly
1F0000
heap
page read and write
25A0000
heap
page read and write
ADE000
heap
page read and write
A3F000
heap
page execute and read and write
2D340000
heap
page read and write
EB000
unkown
page write copy
8A0000
heap
page read and write
20DF2000
heap
page read and write
2E8CD000
heap
page read and write
2728E000
heap
page read and write
26E84000
heap
page read and write
20DC5000
heap
page read and write
20DD8000
heap
page read and write
20DC7000
heap
page read and write
839000
unkown
page readonly
19C000
stack
page read and write
20DF2000
heap
page read and write
20DDD000
heap
page read and write
A9E000
heap
page read and write
20DD3000
heap
page read and write
20DD8000
heap
page read and write
20DD9000
heap
page read and write
26E77000
heap
page read and write
254E000
stack
page read and write
27286000
heap
page read and write
2727E000
heap
page read and write
20DED000
heap
page read and write
20DD0000
heap
page read and write
26F0B000
heap
page read and write
26E72000
heap
page read and write
6CF1F000
unkown
page readonly
26E30000
heap
page read and write
A9A000
heap
page read and write
8D7000
heap
page read and write
67C000
stack
page read and write
61ED0000
direct allocation
page read and write
20DED000
heap
page read and write
26EF000
stack
page read and write
25E0000
heap
page read and write
AF9000
heap
page read and write
1ACDD000
stack
page read and write
20DD8000
heap
page read and write
2D2FA000
heap
page read and write
20DC6000
heap
page read and write
20DFA000
heap
page read and write
1AE5D000
heap
page read and write
20DC6000
heap
page read and write
There are 190 hidden memdumps, click here to show them.