IOC Report
bUcIhJ4VHm.exe

loading gif

Files

File Path
Type
Category
Malicious
bUcIhJ4VHm.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\tiktok[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\JKJEHJKJEB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AAFIJKKEHJDHJKFIECAA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\AAFIJKKEHJDHJKFIECAAKFIJJK
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\AZTRJHKCVR.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\BFHIJEBKEBGHIDHJKJEGCBAEGH
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\BNAGMGSPLO.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\CAKEBFCFIJJKKECAKJEHDAAFIE
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DGDBFBFC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\DQOFHVHTMG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\DQOFHVHTMG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\DUUDTUBZFW.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EEGWXUHVUG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ERWQDBYZVW.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\FIIEGDBAEBFIIDHJJJEBAAAKJE
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\GDBKJDGI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GRXZDKKVDB.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\HCAEGCBFHJDGCBFHDAFB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HMPPSXQPQV.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_bUcIhJ4VHm.exe_299f4611d8ec3b2647c7ae1051883f5e2fe7f8_8f292b08_60c9164b-2ceb-41af-98bc-8b57164cf0a2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCA09.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Apr 25 19:48:27 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCB23.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCB43.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\NVWZAPQSQL.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\NVWZAPQSQL.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\PALRGUCVEH.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\SQSJKEBWDT.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\SQSJKEBWDT.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 34 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\bUcIhJ4VHm.exe
"C:\Users\user\Desktop\bUcIhJ4VHm.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\JKJEHJKJEB.exe"
malicious
C:\Users\user\AppData\Local\Temp\JKJEHJKJEB.exe
"C:\Users\user\AppData\Local\Temp\JKJEHJKJEB.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6760 -s 2252

URLs

Name
IP
Malicious
http://185.172.128.76/15f649199f40275b/nss3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/softokn3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/mozglue.dll
185.172.128.76
malicious
185.172.128.76/3cd2b41cbde8fc9c.php
malicious
http://185.172.128.76/3cd2b41cbde8fc9c.php
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/freebl3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/msvcp140.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/vcruntime140.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/sqlite3.dll
185.172.128.76
malicious
http://185.172.128.76
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://duckduckgo.com/ac/?q=
unknown
https://mozilla.org0/
unknown
http://185.172.128.76/15f649199f40275b/vcruntime140.dllK
unknown
http://185.172.128.76rf
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phps
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpt
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.172.128.203/tiktok.exe
185.172.128.203
http://185.172.128.203/tiktok.exe00
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.172.128.76/15f649199f40275b/msvcp140.dllP
unknown
http://185.172.128.76/15f649199f40275b/mozglue.dllB
unknown
http://185.172.128.76/15f649199f40275b/msvcp140.dllL
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php2d6c41453d0c85f468b78951f73ec-release80c3c777a51d62c363839
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
http://185.172.128.203/tiktok.exet-Disposition:
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://185.172.128.203/tiktok.exeq
unknown
http://www.sqlite.org/copyright.html.
unknown
There are 28 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.172.128.76
unknown
Russian Federation
malicious
185.172.128.203
unknown
Russian Federation

Registry

Path
Value
Malicious
\REGISTRY\A\{c97abf69-ac23-b0f9-8314-98377e4cc712}\Root\InventoryApplicationFile\bucihj4vhm.exe|1344189e220bb11f
ProgramId
\REGISTRY\A\{c97abf69-ac23-b0f9-8314-98377e4cc712}\Root\InventoryApplicationFile\bucihj4vhm.exe|1344189e220bb11f
FileId
\REGISTRY\A\{c97abf69-ac23-b0f9-8314-98377e4cc712}\Root\InventoryApplicationFile\bucihj4vhm.exe|1344189e220bb11f
LowerCaseLongPath
\REGISTRY\A\{c97abf69-ac23-b0f9-8314-98377e4cc712}\Root\InventoryApplicationFile\bucihj4vhm.exe|1344189e220bb11f
LongPathHash
\REGISTRY\A\{c97abf69-ac23-b0f9-8314-98377e4cc712}\Root\InventoryApplicationFile\bucihj4vhm.exe|1344189e220bb11f
Name
\REGISTRY\A\{c97abf69-ac23-b0f9-8314-98377e4cc712}\Root\InventoryApplicationFile\bucihj4vhm.exe|1344189e220bb11f
OriginalFileName
\REGISTRY\A\{c97abf69-ac23-b0f9-8314-98377e4cc712}\Root\InventoryApplicationFile\bucihj4vhm.exe|1344189e220bb11f
Publisher
\REGISTRY\A\{c97abf69-ac23-b0f9-8314-98377e4cc712}\Root\InventoryApplicationFile\bucihj4vhm.exe|1344189e220bb11f
Version
\REGISTRY\A\{c97abf69-ac23-b0f9-8314-98377e4cc712}\Root\InventoryApplicationFile\bucihj4vhm.exe|1344189e220bb11f
BinFileVersion
\REGISTRY\A\{c97abf69-ac23-b0f9-8314-98377e4cc712}\Root\InventoryApplicationFile\bucihj4vhm.exe|1344189e220bb11f
BinaryType
\REGISTRY\A\{c97abf69-ac23-b0f9-8314-98377e4cc712}\Root\InventoryApplicationFile\bucihj4vhm.exe|1344189e220bb11f
ProductName
\REGISTRY\A\{c97abf69-ac23-b0f9-8314-98377e4cc712}\Root\InventoryApplicationFile\bucihj4vhm.exe|1344189e220bb11f
ProductVersion
\REGISTRY\A\{c97abf69-ac23-b0f9-8314-98377e4cc712}\Root\InventoryApplicationFile\bucihj4vhm.exe|1344189e220bb11f
LinkDate
\REGISTRY\A\{c97abf69-ac23-b0f9-8314-98377e4cc712}\Root\InventoryApplicationFile\bucihj4vhm.exe|1344189e220bb11f
BinProductVersion
\REGISTRY\A\{c97abf69-ac23-b0f9-8314-98377e4cc712}\Root\InventoryApplicationFile\bucihj4vhm.exe|1344189e220bb11f
AppxPackageFullName
\REGISTRY\A\{c97abf69-ac23-b0f9-8314-98377e4cc712}\Root\InventoryApplicationFile\bucihj4vhm.exe|1344189e220bb11f
AppxPackageRelativeId
\REGISTRY\A\{c97abf69-ac23-b0f9-8314-98377e4cc712}\Root\InventoryApplicationFile\bucihj4vhm.exe|1344189e220bb11f
Size
\REGISTRY\A\{c97abf69-ac23-b0f9-8314-98377e4cc712}\Root\InventoryApplicationFile\bucihj4vhm.exe|1344189e220bb11f
Language
\REGISTRY\A\{c97abf69-ac23-b0f9-8314-98377e4cc712}\Root\InventoryApplicationFile\bucihj4vhm.exe|1344189e220bb11f
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3130000
direct allocation
page read and write
malicious
3100000
direct allocation
page execute and read and write
malicious
2F2C000
heap
page read and write
malicious
400000
unkown
page execute and read and write
malicious
2B30000
heap
page read and write
23300000
heap
page read and write
23315000
heap
page read and write
232E6000
heap
page read and write
495E000
stack
page read and write
2F00000
heap
page read and write
2FC2000
heap
page read and write
232FB000
heap
page read and write
36370000
heap
page read and write
23315000
heap
page read and write
EE0000
heap
page read and write
1CFAE000
stack
page read and write
55B000
unkown
page write copy
232FC000
heap
page read and write
23300000
heap
page read and write
356C0000
heap
page read and write
2331D000
heap
page read and write
29420000
heap
page read and write
23300000
heap
page read and write
2F5DB000
heap
page read and write
1CBAF000
stack
page read and write
400000
unkown
page readonly
4E0000
unkown
page readonly
4E1000
unkown
page execute read
55E000
unkown
page readonly
6CF60000
unkown
page read and write
232F3000
heap
page read and write
2F0A000
heap
page read and write
2F99000
heap
page read and write
2C1A000
unkown
page readonly
636000
unkown
page execute and read and write
2330F000
heap
page read and write
2331D000
heap
page read and write
23300000
heap
page read and write
437000
unkown
page write copy
23249000
heap
page read and write
2F67000
heap
page read and write
9B000
stack
page read and write
2331D000
heap
page read and write
61ED0000
direct allocation
page read and write
23309000
heap
page read and write
23300000
heap
page read and write
232F7000
heap
page read and write
6CD72000
unkown
page readonly
232FB000
heap
page read and write
DE0000
heap
page read and write
1D230000
trusted library allocation
page read and write
54C000
unkown
page readonly
361E0000
heap
page read and write
232E6000
heap
page read and write
232EA000
heap
page read and write
6CCE0000
unkown
page readonly
3677A000
heap
page read and write
447000
unkown
page execute and read and write
1CE6E000
stack
page read and write
232F6000
heap
page read and write
2330D000
heap
page read and write
6CF5F000
unkown
page write copy
2330F000
heap
page read and write
2FC9000
heap
page read and write
29429000
heap
page read and write
3140000
heap
page read and write
61E00000
direct allocation
page execute and read and write
1D131000
heap
page read and write
40E000
unkown
page readonly
6CF1F000
unkown
page readonly
36270000
heap
page read and write
2D50000
heap
page read and write
29417000
heap
page read and write
2331D000
heap
page read and write
232F9000
heap
page read and write
30FE000
stack
page read and write
1D0AD000
stack
page read and write
23389000
heap
page read and write
2D55000
heap
page read and write
2330D000
heap
page read and write
54C000
unkown
page readonly
1D120000
heap
page read and write
317B000
heap
page read and write
23300000
heap
page read and write
61ECD000
direct allocation
page readonly
1F0000
heap
page read and write
6CD81000
unkown
page execute read
232F3000
heap
page read and write
232FA000
heap
page read and write
1D130000
heap
page read and write
E60000
heap
page read and write
2330F000
heap
page read and write
35600000
trusted library allocation
page read and write
2FB8000
heap
page read and write
4E0000
unkown
page readonly
2FBD000
heap
page read and write
2331D000
heap
page read and write
2E5F000
stack
page read and write
2F42E000
stack
page read and write
29425000
heap
page read and write
23315000
heap
page read and write
232E2000
heap
page read and write
2F52F000
stack
page read and write
232F8000
heap
page read and write
23300000
heap
page read and write
2330F000
heap
page read and write
2F5C9000
heap
page read and write
232F3000
heap
page read and write
61ECC000
direct allocation
page read and write
232FA000
heap
page read and write
1CA6F000
stack
page read and write
23300000
heap
page read and write
363E9000
heap
page read and write
23309000
heap
page read and write
624000
unkown
page execute and read and write
1D232000
heap
page read and write
232F9000
heap
page read and write
2331D000
heap
page read and write
232E5000
heap
page read and write
232FA000
heap
page read and write
3564C000
stack
page read and write
23315000
heap
page read and write
EEA000
heap
page read and write
CFA000
stack
page read and write
2330D000
heap
page read and write
23316000
heap
page read and write
232FB000
heap
page read and write
6CD5D000
unkown
page readonly
D00000
heap
page read and write
232FD000
heap
page read and write
2C1A000
unkown
page readonly
3170000
heap
page read and write
232EC000
heap
page read and write
2330F000
heap
page read and write
2F5D7000
heap
page read and write
6CD6E000
unkown
page read and write
23300000
heap
page read and write
2330D000
heap
page read and write
232FD000
heap
page read and write
293D6000
heap
page read and write
232F8000
heap
page read and write
2331D000
heap
page read and write
2ED0000
heap
page read and write
6CD80000
unkown
page readonly
2331D000
heap
page read and write
61EB4000
direct allocation
page read and write
2331C000
heap
page read and write
19C000
stack
page read and write
2331D000
heap
page read and write
3616B000
stack
page read and write
232F3000
heap
page read and write
2D4E000
stack
page read and write
232FA000
heap
page read and write
193000
stack
page read and write
1CBEE000
stack
page read and write
6CCE1000
unkown
page execute read
6CF65000
unkown
page readonly
232E3000
heap
page read and write
549000
unkown
page execute and read and write
2F0E000
heap
page read and write
55E000
unkown
page readonly
23308000
heap
page read and write
2330D000
heap
page read and write
6CF5E000
unkown
page read and write
232FF000
heap
page read and write
1CCEF000
stack
page read and write
2D57000
heap
page read and write
2FCF000
heap
page read and write
1CF6D000
stack
page read and write
29370000
heap
page read and write
61EB7000
direct allocation
page readonly
3636C000
stack
page read and write
3568C000
stack
page read and write
23300000
heap
page read and write
23398000
heap
page read and write
61ED4000
direct allocation
page readonly
23318000
heap
page read and write
23315000
heap
page read and write
2330F000
heap
page read and write
2D00000
heap
page read and write
232E5000
heap
page read and write
232FF000
heap
page read and write
232FD000
heap
page read and write
232FA000
heap
page read and write
23300000
heap
page read and write
29350000
heap
page read and write
361E4000
heap
page read and write
232FC000
heap
page read and write
2331C000
heap
page read and write
232E0000
heap
page read and write
363C1000
heap
page read and write
293BD000
heap
page read and write
1CE2F000
stack
page read and write
1CD2E000
stack
page read and write
231A1000
heap
page read and write
EEE000
heap
page read and write
421000
unkown
page readonly
23300000
heap
page read and write
232F1000
heap
page read and write
233EE000
heap
page read and write
23300000
heap
page read and write
23318000
heap
page read and write
2FB5000
heap
page read and write
2330F000
heap
page read and write
2F5D1000
heap
page read and write
198000
stack
page read and write
2330D000
heap
page read and write
55B000
unkown
page read and write
232E8000
heap
page read and write
61E01000
direct allocation
page execute read
232E6000
heap
page read and write
2330F000
heap
page read and write
401000
unkown
page execute read
36277000
heap
page read and write
23388000
heap
page read and write
2F17000
heap
page execute and read and write
232EF000
heap
page read and write
2D57000
heap
page read and write
35650000
heap
page read and write
61ED3000
direct allocation
page read and write
99C000
stack
page read and write
1CAAE000
stack
page read and write
232F6000
heap
page read and write
232F6000
heap
page read and write
2330F000
heap
page read and write
293CD000
heap
page read and write
1D131000
heap
page read and write
4990000
heap
page read and write
4E1000
unkown
page execute read
23300000
heap
page read and write
2F5D3000
heap
page read and write
2E9E000
stack
page read and write
23388000
heap
page read and write
There are 223 hidden memdumps, click here to show them.