IOC Report
YEnIrzZUUw.exe

loading gif

Files

File Path
Type
Category
Malicious
YEnIrzZUUw.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\tiktok[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IDBAKKECAE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AEBKKECBGIIJJKECGIJE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CZQKSDDMWR.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\DHJDAFIEHIEGDHIDGDGH
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DVWHKMNFNN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EGIDBFBFHJDGCAKEGHJECGHCGC
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\FHIDAFHCBAKFCAAKFCFCFIIJKF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\FIDHCFBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GAOBCVIQIJ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\GHDHJEBF
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HIEBAKEHDHCAKEBFBKEGCGIEBF
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HTAGVDFUIE.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\HTAGVDFUIE.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\JSDNGYCOWY.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\KATAXZVCPS.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\LTKMYBSEYZ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_YEnIrzZUUw.exe_53323bae8c89d5655a0792659e7b097e8df878d_aba9e9d8_1c2b8bbf-70ed-4441-a7df-e4ba8b157a50\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF41D.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Apr 26 07:41:43 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF5B4.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF613.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\NVWZAPQSQL.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\VAMYDFPUND.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\VAMYDFPUND.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\WUTJSCBCFX.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 31 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\YEnIrzZUUw.exe
"C:\Users\user\Desktop\YEnIrzZUUw.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\IDBAKKECAE.exe"
malicious
C:\Users\user\AppData\Local\Temp\IDBAKKECAE.exe
"C:\Users\user\AppData\Local\Temp\IDBAKKECAE.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7428 -s 2204

URLs

Name
IP
Malicious
http://185.172.128.111/8e6d9db21fb63946/nss3.dll
185.172.128.111
malicious
http://185.172.128.111/8e6d9db21fb63946/mozglue.dll
185.172.128.111
malicious
http://185.172.128.111/8e6d9db21fb63946/softokn3.dll
185.172.128.111
malicious
http://185.172.128.111/8e6d9db21fb63946/freebl3.dll
185.172.128.111
malicious
http://185.172.128.111/8e6d9db21fb63946/msvcp140.dll
185.172.128.111
malicious
185.172.128.111/f993692117a3fda2.php
malicious
http://185.172.128.111
unknown
malicious
http://185.172.128.111/f993692117a3fda2.php
185.172.128.111
malicious
http://185.172.128.111/8e6d9db21fb63946/sqlite3.dll
185.172.128.111
malicious
http://185.172.128.111/8e6d9db21fb63946/vcruntime140.dll
185.172.128.111
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
http://185.172.128.111/8e6d9db21fb63946/mozglue.dllb
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://duckduckgo.com/ac/?q=
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.172.128.111/8e6d9db21fb63946/vcruntime140.dll$X
unknown
http://185.172.128.111/f993692117a3fda2.phpDC
unknown
http://185.172.128.111D
unknown
http://185.172.128.111/8e6d9db21fb63946/freebl3.dllX
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.172.128.203/tiktok.exe
185.172.128.203
http://185.172.128.203/tiktok.exe00
unknown
http://185.172.128.111/8e6d9db21fb63946/freebl3.dllT_
unknown
http://185.172.128.111/f993692117a3fda2.php5
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.172.128.111/f993692117a3fda2.phpd01eb5849095e97b89aab94ffc51release
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.172.128.203/tiktok.exet-Disposition:
unknown
http://185.172.128.111/f993692117a3fda2.phpL
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
https://support.mozilla.org
unknown
http://185.172.128.111/8e6d9db21fb63946/sqlite3.dlll_
unknown
http://185.172.128.111/f993692117a3fda2.phprofiles
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.sqlite.org/copyright.html.
unknown
There are 33 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.172.128.111
unknown
Russian Federation
malicious
185.172.128.203
unknown
Russian Federation

Registry

Path
Value
Malicious
\REGISTRY\A\{2df6cf42-a55d-cebe-e424-fad4a3d073b8}\Root\InventoryApplicationFile\yenirzzuuw.exe|112676ac17173c65
ProgramId
\REGISTRY\A\{2df6cf42-a55d-cebe-e424-fad4a3d073b8}\Root\InventoryApplicationFile\yenirzzuuw.exe|112676ac17173c65
FileId
\REGISTRY\A\{2df6cf42-a55d-cebe-e424-fad4a3d073b8}\Root\InventoryApplicationFile\yenirzzuuw.exe|112676ac17173c65
LowerCaseLongPath
\REGISTRY\A\{2df6cf42-a55d-cebe-e424-fad4a3d073b8}\Root\InventoryApplicationFile\yenirzzuuw.exe|112676ac17173c65
LongPathHash
\REGISTRY\A\{2df6cf42-a55d-cebe-e424-fad4a3d073b8}\Root\InventoryApplicationFile\yenirzzuuw.exe|112676ac17173c65
Name
\REGISTRY\A\{2df6cf42-a55d-cebe-e424-fad4a3d073b8}\Root\InventoryApplicationFile\yenirzzuuw.exe|112676ac17173c65
OriginalFileName
\REGISTRY\A\{2df6cf42-a55d-cebe-e424-fad4a3d073b8}\Root\InventoryApplicationFile\yenirzzuuw.exe|112676ac17173c65
Publisher
\REGISTRY\A\{2df6cf42-a55d-cebe-e424-fad4a3d073b8}\Root\InventoryApplicationFile\yenirzzuuw.exe|112676ac17173c65
Version
\REGISTRY\A\{2df6cf42-a55d-cebe-e424-fad4a3d073b8}\Root\InventoryApplicationFile\yenirzzuuw.exe|112676ac17173c65
BinFileVersion
\REGISTRY\A\{2df6cf42-a55d-cebe-e424-fad4a3d073b8}\Root\InventoryApplicationFile\yenirzzuuw.exe|112676ac17173c65
BinaryType
\REGISTRY\A\{2df6cf42-a55d-cebe-e424-fad4a3d073b8}\Root\InventoryApplicationFile\yenirzzuuw.exe|112676ac17173c65
ProductName
\REGISTRY\A\{2df6cf42-a55d-cebe-e424-fad4a3d073b8}\Root\InventoryApplicationFile\yenirzzuuw.exe|112676ac17173c65
ProductVersion
\REGISTRY\A\{2df6cf42-a55d-cebe-e424-fad4a3d073b8}\Root\InventoryApplicationFile\yenirzzuuw.exe|112676ac17173c65
LinkDate
\REGISTRY\A\{2df6cf42-a55d-cebe-e424-fad4a3d073b8}\Root\InventoryApplicationFile\yenirzzuuw.exe|112676ac17173c65
BinProductVersion
\REGISTRY\A\{2df6cf42-a55d-cebe-e424-fad4a3d073b8}\Root\InventoryApplicationFile\yenirzzuuw.exe|112676ac17173c65
AppxPackageFullName
\REGISTRY\A\{2df6cf42-a55d-cebe-e424-fad4a3d073b8}\Root\InventoryApplicationFile\yenirzzuuw.exe|112676ac17173c65
AppxPackageRelativeId
\REGISTRY\A\{2df6cf42-a55d-cebe-e424-fad4a3d073b8}\Root\InventoryApplicationFile\yenirzzuuw.exe|112676ac17173c65
Size
\REGISTRY\A\{2df6cf42-a55d-cebe-e424-fad4a3d073b8}\Root\InventoryApplicationFile\yenirzzuuw.exe|112676ac17173c65
Language
\REGISTRY\A\{2df6cf42-a55d-cebe-e424-fad4a3d073b8}\Root\InventoryApplicationFile\yenirzzuuw.exe|112676ac17173c65
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
41FA000
heap
page read and write
malicious
5B70000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
4190000
direct allocation
page execute and read and write
malicious
41F000
unkown
page write copy
2A7E4000
heap
page read and write
61EB7000
direct allocation
page readonly
191000
stack
page read and write
42AB000
heap
page read and write
40B5000
heap
page read and write
447000
unkown
page execute and read and write
5D1B000
heap
page read and write
2A7DC000
heap
page read and write
245BD000
heap
page read and write
2A650000
heap
page read and write
1E530000
heap
page read and write
245BD000
heap
page read and write
245B4000
heap
page read and write
245B5000
heap
page read and write
31E64000
heap
page read and write
5AB000
unkown
page read and write
245A7000
heap
page read and write
61ED3000
direct allocation
page read and write
5AE000
unkown
page readonly
4FA000
stack
page read and write
1E520000
heap
page read and write
1E639000
heap
page read and write
6CB5E000
unkown
page read and write
43CF000
stack
page read and write
41D0000
heap
page read and write
4040000
heap
page read and write
245B0000
heap
page read and write
245DA000
heap
page read and write
245B3000
heap
page read and write
245D2000
heap
page read and write
4255000
heap
page read and write
2A7E1000
heap
page read and write
245CD000
heap
page read and write
245A5000
heap
page read and write
6CB1F000
unkown
page readonly
5AB000
unkown
page write copy
42BE000
heap
page read and write
245D8000
heap
page read and write
6C972000
unkown
page readonly
59C000
unkown
page readonly
6C95D000
unkown
page readonly
245A0000
heap
page read and write
500000
heap
page read and write
41E5000
heap
page execute and read and write
245DC000
heap
page read and write
1DE8E000
stack
page read and write
2A664000
heap
page read and write
5D10000
heap
page read and write
7EA000
heap
page read and write
245B8000
heap
page read and write
4023000
unkown
page readonly
61ECC000
direct allocation
page read and write
41DA000
heap
page read and write
40B7000
heap
page read and write
3134C000
stack
page read and write
245D2000
heap
page read and write
6C8E1000
unkown
page execute read
31E2F000
heap
page read and write
2A702000
heap
page read and write
245BD000
heap
page read and write
6CB5F000
unkown
page write copy
1E630000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
245A6000
heap
page read and write
245CD000
heap
page read and write
318D7000
heap
page read and write
245D9000
heap
page read and write
2A66B000
heap
page read and write
245A6000
heap
page read and write
2A657000
heap
page read and write
31340000
heap
page read and write
245D8000
heap
page read and write
4235000
heap
page read and write
2A7D3000
heap
page read and write
4299000
heap
page read and write
1E35D000
stack
page read and write
408E000
stack
page read and write
4294000
heap
page read and write
1DFCE000
stack
page read and write
419000
unkown
page write copy
42A6000
heap
page read and write
6C96E000
unkown
page read and write
1DE4F000
stack
page read and write
245B8000
heap
page read and write
245C0000
heap
page read and write
245CD000
heap
page read and write
245A6000
heap
page read and write
510000
heap
page read and write
31DE0000
heap
page read and write
245A6000
heap
page read and write
2A760000
heap
page read and write
245B8000
heap
page read and write
6CB65000
unkown
page readonly
2A7DB000
heap
page read and write
2A65E000
heap
page read and write
5D70000
heap
page read and write
245BD000
heap
page read and write
24641000
heap
page read and write
41DE000
heap
page read and write
6C8E0000
unkown
page readonly
40B0000
heap
page read and write
2200000
heap
page read and write
2A6E1000
heap
page read and write
245AC000
heap
page read and write
245CD000
heap
page read and write
600000
heap
page read and write
4239000
heap
page read and write
61ED0000
direct allocation
page read and write
429E000
heap
page read and write
1E25E000
stack
page read and write
1E20F000
stack
page read and write
19C000
stack
page read and write
245BB000
heap
page read and write
245B3000
heap
page read and write
61E00000
direct allocation
page execute and read and write
5AE000
unkown
page readonly
314CC000
stack
page read and write
2A6B1000
heap
page read and write
245CD000
heap
page read and write
245B9000
heap
page read and write
1E0CF000
stack
page read and write
2A6EB000
heap
page read and write
40B7000
heap
page read and write
6C981000
unkown
page execute read
412000
unkown
page readonly
245B6000
heap
page read and write
5D5E000
stack
page read and write
30820000
trusted library allocation
page read and write
245D2000
heap
page read and write
1E531000
heap
page read and write
5BDE000
stack
page read and write
245B3000
heap
page read and write
245B7000
heap
page read and write
245DA000
heap
page read and write
5CDF000
stack
page read and write
245B8000
heap
page read and write
401000
unkown
page execute read
400000
unkown
page readonly
2A610000
heap
page read and write
245D3000
heap
page read and write
1E39E000
stack
page read and write
245DC000
heap
page read and write
197000
stack
page read and write
245C0000
heap
page read and write
1E531000
heap
page read and write
2A652000
heap
page read and write
7EE000
heap
page read and write
3134A000
heap
page read and write
4228000
heap
page read and write
531000
unkown
page execute read
245DC000
heap
page read and write
6CB60000
unkown
page read and write
5CE0000
heap
page read and write
245D2000
heap
page read and write
61ED4000
direct allocation
page readonly
2A6DF000
heap
page read and write
530000
unkown
page readonly
246A3000
heap
page read and write
2A6EF000
heap
page read and write
245DC000
heap
page read and write
624000
unkown
page execute and read and write
61EB4000
direct allocation
page read and write
245B8000
heap
page read and write
245DA000
heap
page read and write
2A6A0000
heap
page read and write
6C980000
unkown
page readonly
245A8000
heap
page read and write
3120C000
stack
page read and write
61E01000
direct allocation
page execute read
3130B000
stack
page read and write
1E10E000
stack
page read and write
1F0000
heap
page read and write
245C0000
heap
page read and write
245B6000
heap
page read and write
245A7000
heap
page read and write
42B6000
heap
page read and write
1DF8F000
stack
page read and write
2A630000
heap
page read and write
549000
unkown
page execute and read and write
1E49D000
stack
page read and write
531000
unkown
page execute read
4023000
unkown
page readonly
245B8000
heap
page read and write
7E0000
heap
page read and write
245D1000
heap
page read and write
245D9000
heap
page read and write
636000
unkown
page execute and read and write
4021000
unkown
page read and write
9B000
stack
page read and write
245AB000
heap
page read and write
530000
unkown
page readonly
59C000
unkown
page readonly
There are 187 hidden memdumps, click here to show them.