IOC Report
34cFFMVY3B.exe

loading gif

Files

File Path
Type
Category
Malicious
34cFFMVY3B.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BAKJKFHCAEGDHIDGDHDAKEGHCG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BJZFPPWAPT.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\BJZFPPWAPT.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\BKFBAKFCBFHIJJJJDBFCAFIEBK
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\CAKEBFCFIJJKKECAKJEH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CBAFCAKE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\CBAFCAKEHDHDHIDHDGDH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DUUDTUBZFW.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\FIIEGDBAEBFIIDHJJJEBAAAKJE
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GRXZDKKVDB.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\HIJJEGDBFIIDGCAKJEBKFBGDBF
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\KJEGCFBG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6F53.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Apr 29 21:17:51 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER707D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER70BD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\PALRGUCVEH.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ZGGKNSUKOP.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
There are 22 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\34cFFMVY3B.exe
"C:\Users\user\Desktop\34cFFMVY3B.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 2708

URLs

Name
IP
Malicious
https://shaffatta.com
unknown
malicious
https://shaffatta.com/fdca69ae739b4897.phpwindow-state.jsonll
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://shaffatta.com/H
unknown
https://shaffatta.com/fdca69ae739b4897.phpft
unknown
https://shaffatta.com/2n
unknown
https://shaffatta.com/fdca69ae739b4897.php
168.119.248.46
https://shaffatta.com/fdca69ae739b4897.php/
unknown
https://shaffatta.com/d32e011d2eaa85a0/mozglue.dll
168.119.248.46
https://shaffatta.com/9tXs
unknown
https://shaffatta.com/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://shaffatta.com/d32e011d2eaa85a0/msvcp140.dll
168.119.248.46
https://shaffatta.com/fdca69ae739b4897.phpst
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://shaffatta.com/d32e011d2eaa85a0/softokn3.dllf
unknown
https://shaffatta.com//
unknown
https://shaffatta.com/d32e011d2eaa85a0/nss3.dll1
unknown
https://shaffatta.com/uments
unknown
https://shaffatta.com/7
unknown
http://www.sqlite.org/copyright.html.
unknown
https://shaffatta.com/d32e011d2eaa85a0/nss3.dll
168.119.248.46
https://shaffatta.com/fdca69ae739b4897.php_
unknown
https://shaffatta.com/d32e011d2eaa85a0/freebl3.dll
168.119.248.46
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://shaffatta.com//t
unknown
https://shaffatta.com/d32e011d2eaa85a0/sqlite3.dll
168.119.248.46
https://shaffatta.com/fdca69ae739b4897.php/t
unknown
https://shaffatta.com/d32e011d2eaa85a0/vcruntime140.dll
168.119.248.46
https://shaffatta.com//n;s
unknown
https://shaffatta.com/fdca69ae739b4897.phpindows
unknown
https://shaffatta.com/fdca69ae739b4897.phpl
unknown
https://shaffatta.com/Pt
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://shaffatta.com/fatta.com/ia
unknown
https://shaffatta.com/fdca69ae739b4897.php7
unknown
https://shaffatta.com/fdca69ae739b4897.php9
unknown
https://shaffatta.com/fdca69ae739b4897.phpecb7e6cfceb60ea741ec1c22e4cad
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://shaffatta.com/l
unknown
https://shaffatta.com/q
unknown
https://shaffatta.com/d32e011d2eaa85a0/softokn3.dll
168.119.248.46
https://shaffatta.com/fdca69ae739b4897.phpf2
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
shaffatta.com
168.119.248.46
malicious

IPs

IP
Domain
Country
Malicious
168.119.248.46
shaffatta.com
Germany
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{51e49c87-9b47-b247-d3dc-1e6f7c4fc067}\Root\InventoryApplicationFile\34cffmvy3b.exe|cf84bbf400bb85d7
ProgramId
\REGISTRY\A\{51e49c87-9b47-b247-d3dc-1e6f7c4fc067}\Root\InventoryApplicationFile\34cffmvy3b.exe|cf84bbf400bb85d7
FileId
\REGISTRY\A\{51e49c87-9b47-b247-d3dc-1e6f7c4fc067}\Root\InventoryApplicationFile\34cffmvy3b.exe|cf84bbf400bb85d7
LowerCaseLongPath
\REGISTRY\A\{51e49c87-9b47-b247-d3dc-1e6f7c4fc067}\Root\InventoryApplicationFile\34cffmvy3b.exe|cf84bbf400bb85d7
LongPathHash
\REGISTRY\A\{51e49c87-9b47-b247-d3dc-1e6f7c4fc067}\Root\InventoryApplicationFile\34cffmvy3b.exe|cf84bbf400bb85d7
Name
\REGISTRY\A\{51e49c87-9b47-b247-d3dc-1e6f7c4fc067}\Root\InventoryApplicationFile\34cffmvy3b.exe|cf84bbf400bb85d7
OriginalFileName
\REGISTRY\A\{51e49c87-9b47-b247-d3dc-1e6f7c4fc067}\Root\InventoryApplicationFile\34cffmvy3b.exe|cf84bbf400bb85d7
Publisher
\REGISTRY\A\{51e49c87-9b47-b247-d3dc-1e6f7c4fc067}\Root\InventoryApplicationFile\34cffmvy3b.exe|cf84bbf400bb85d7
Version
\REGISTRY\A\{51e49c87-9b47-b247-d3dc-1e6f7c4fc067}\Root\InventoryApplicationFile\34cffmvy3b.exe|cf84bbf400bb85d7
BinFileVersion
\REGISTRY\A\{51e49c87-9b47-b247-d3dc-1e6f7c4fc067}\Root\InventoryApplicationFile\34cffmvy3b.exe|cf84bbf400bb85d7
BinaryType
\REGISTRY\A\{51e49c87-9b47-b247-d3dc-1e6f7c4fc067}\Root\InventoryApplicationFile\34cffmvy3b.exe|cf84bbf400bb85d7
ProductName
\REGISTRY\A\{51e49c87-9b47-b247-d3dc-1e6f7c4fc067}\Root\InventoryApplicationFile\34cffmvy3b.exe|cf84bbf400bb85d7
ProductVersion
\REGISTRY\A\{51e49c87-9b47-b247-d3dc-1e6f7c4fc067}\Root\InventoryApplicationFile\34cffmvy3b.exe|cf84bbf400bb85d7
LinkDate
\REGISTRY\A\{51e49c87-9b47-b247-d3dc-1e6f7c4fc067}\Root\InventoryApplicationFile\34cffmvy3b.exe|cf84bbf400bb85d7
BinProductVersion
\REGISTRY\A\{51e49c87-9b47-b247-d3dc-1e6f7c4fc067}\Root\InventoryApplicationFile\34cffmvy3b.exe|cf84bbf400bb85d7
AppxPackageFullName
\REGISTRY\A\{51e49c87-9b47-b247-d3dc-1e6f7c4fc067}\Root\InventoryApplicationFile\34cffmvy3b.exe|cf84bbf400bb85d7
AppxPackageRelativeId
\REGISTRY\A\{51e49c87-9b47-b247-d3dc-1e6f7c4fc067}\Root\InventoryApplicationFile\34cffmvy3b.exe|cf84bbf400bb85d7
Size
\REGISTRY\A\{51e49c87-9b47-b247-d3dc-1e6f7c4fc067}\Root\InventoryApplicationFile\34cffmvy3b.exe|cf84bbf400bb85d7
Language
\REGISTRY\A\{51e49c87-9b47-b247-d3dc-1e6f7c4fc067}\Root\InventoryApplicationFile\34cffmvy3b.exe|cf84bbf400bb85d7
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2B40000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
2B10000
direct allocation
page execute and read and write
malicious
2BF3000
heap
page read and write
malicious
47E0000
remote allocation
page read and write
23480000
heap
page read and write
1D291000
heap
page read and write
2F5E7000
heap
page read and write
23304000
heap
page read and write
47F0000
heap
page read and write
483E000
stack
page read and write
47E0000
remote allocation
page read and write
2C8F000
heap
page read and write
23456000
heap
page read and write
23453000
heap
page read and write
2CA8000
heap
page read and write
1D7000
heap
page read and write
23456000
heap
page read and write
23480000
heap
page read and write
23471000
heap
page read and write
2345D000
heap
page read and write
2F8E000
stack
page read and write
61ED3000
direct allocation
page read and write
23440000
heap
page read and write
2345D000
heap
page read and write
294B2000
heap
page read and write
6CCD0000
unkown
page readonly
2954A000
heap
page read and write
1D290000
heap
page read and write
1CF6E000
stack
page read and write
549000
unkown
page execute and read and write
23457000
heap
page read and write
489B000
heap
page read and write
2C52000
heap
page read and write
23480000
heap
page read and write
2CA0000
heap
page read and write
23480000
heap
page read and write
23480000
heap
page read and write
23480000
heap
page read and write
23462000
heap
page read and write
23471000
heap
page read and write
23460000
heap
page read and write
233A3000
heap
page read and write
2CA0000
heap
page read and write
6CEB5000
unkown
page readonly
1D7000
heap
page read and write
47E0000
remote allocation
page read and write
2345E000
heap
page read and write
19D000
stack
page read and write
2CB8000
heap
page read and write
294A1000
heap
page read and write
2CA1000
heap
page read and write
1D16F000
stack
page read and write
6CC30000
unkown
page readonly
2C27000
heap
page read and write
624000
unkown
page execute and read and write
2345C000
heap
page read and write
2C5D000
heap
page read and write
23460000
heap
page read and write
23480000
heap
page read and write
23454000
heap
page read and write
23446000
heap
page read and write
6CCBE000
unkown
page read and write
1D06D000
stack
page read and write
23451000
heap
page read and write
23446000
heap
page read and write
2DCE000
stack
page read and write
2C58000
heap
page read and write
294C0000
heap
page read and write
2B00000
heap
page read and write
2345E000
heap
page read and write
40C000
unkown
page readonly
2F5D9000
heap
page read and write
2CBC000
heap
page read and write
23458000
heap
page read and write
2345E000
heap
page read and write
23460000
heap
page read and write
2C45000
heap
page read and write
2CBC000
heap
page read and write
42B000
unkown
page write copy
23540000
heap
page read and write
23460000
heap
page read and write
2C95000
heap
page read and write
2BCE000
heap
page read and write
23455000
heap
page read and write
2346E000
heap
page read and write
23456000
heap
page read and write
4890000
heap
page read and write
61ECC000
direct allocation
page read and write
2BA0000
heap
page read and write
23459000
heap
page read and write
2C45000
heap
page read and write
23480000
heap
page read and write
1D390000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
6CCD1000
unkown
page execute read
447000
unkown
page execute and read and write
2F3E000
stack
page read and write
23445000
heap
page read and write
61EB7000
direct allocation
page readonly
2E4E000
stack
page read and write
2F540000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
1CE6F000
stack
page read and write
23472000
heap
page read and write
23460000
heap
page read and write
23480000
heap
page read and write
1CC6F000
stack
page read and write
23476000
heap
page read and write
2AE9000
unkown
page readonly
23460000
heap
page read and write
23476000
heap
page read and write
23453000
heap
page read and write
2955C000
heap
page read and write
23458000
heap
page read and write
6CE6F000
unkown
page readonly
2BDD000
heap
page execute and read and write
23454000
heap
page read and write
1CB6F000
stack
page read and write
2BCA000
heap
page read and write
2AE9000
unkown
page readonly
23460000
heap
page read and write
2345C000
heap
page read and write
23476000
heap
page read and write
2CB7000
heap
page read and write
2345C000
heap
page read and write
23460000
heap
page read and write
2EDE000
stack
page read and write
9C000
stack
page read and write
61E00000
direct allocation
page execute and read and write
2CA0000
heap
page read and write
2C5C000
heap
page read and write
23480000
heap
page read and write
23465000
heap
page read and write
23458000
heap
page read and write
2C5E000
heap
page read and write
2CA0000
heap
page read and write
2C5D000
heap
page read and write
61ECD000
direct allocation
page readonly
2345E000
heap
page read and write
29599000
heap
page read and write
2345B000
heap
page read and write
23471000
heap
page read and write
2CB1000
heap
page read and write
2E8E000
stack
page read and write
23480000
heap
page read and write
23460000
heap
page read and write
23456000
heap
page read and write
23460000
heap
page read and write
294AB000
heap
page read and write
193000
stack
page read and write
2347F000
heap
page read and write
6CCC2000
unkown
page readonly
1D5000
heap
page read and write
29500000
heap
page read and write
23456000
heap
page read and write
1D280000
heap
page read and write
2C96000
heap
page read and write
636000
unkown
page execute and read and write
2E90000
heap
page read and write
23460000
heap
page read and write
61ED0000
direct allocation
page read and write
1CD6F000
stack
page read and write
2C58000
heap
page read and write
6CC31000
unkown
page execute read
23480000
heap
page read and write
1D396000
heap
page read and write
23471000
heap
page read and write
2F5DF000
heap
page read and write
476E000
stack
page read and write
2BC0000
heap
page read and write
23457000
heap
page read and write
2C58000
heap
page read and write
2CAB000
heap
page read and write
6CEB0000
unkown
page read and write
23480000
heap
page read and write
23480000
heap
page read and write
294A0000
heap
page read and write
2C5E000
heap
page read and write
2F5E1000
heap
page read and write
23460000
heap
page read and write
23471000
heap
page read and write
23480000
heap
page read and write
23470000
heap
page read and write
1C62F000
stack
page read and write
23471000
heap
page read and write
23453000
heap
page read and write
23460000
heap
page read and write
487E000
stack
page read and write
2AF0000
heap
page read and write
23460000
heap
page read and write
2CA0000
heap
page read and write
400000
unkown
page readonly
2CAC000
heap
page read and write
415000
unkown
page readonly
2C96000
heap
page read and write
1D0000
heap
page read and write
23476000
heap
page read and write
61E01000
direct allocation
page execute read
2C56000
heap
page read and write
23471000
heap
page read and write
2C95000
heap
page read and write
1D26E000
stack
page read and write
6CEAE000
unkown
page read and write
23462000
heap
page read and write
401000
unkown
page execute read
2959D000
heap
page read and write
1C72F000
stack
page read and write
23460000
heap
page read and write
2E0E000
stack
page read and write
23480000
heap
page read and write
23476000
heap
page read and write
2344E000
heap
page read and write
6CEAF000
unkown
page write copy
3557C000
heap
page read and write
2CB1000
heap
page read and write
2CA0000
heap
page read and write
35570000
heap
page read and write
23473000
heap
page read and write
23460000
heap
page read and write
199000
stack
page read and write
2F5ED000
heap
page read and write
23454000
heap
page read and write
2C58000
heap
page read and write
2C2F000
heap
page read and write
23460000
heap
page read and write
23476000
heap
page read and write
294E0000
heap
page read and write
294A6000
heap
page read and write
1D291000
heap
page read and write
2C51000
heap
page read and write
294B8000
heap
page read and write
6CCAD000
unkown
page readonly
There are 223 hidden memdumps, click here to show them.