IOC Report
qa4Ulla1BY.exe

loading gif

Files

File Path
Type
Category
Malicious
qa4Ulla1BY.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BWDRWEEARI.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\DHIEBAAK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\ECGDAAFIIJDAAAAKFHIDAAAKJJ
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EHDAAECA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GCFHDAKECFIDGDGDBKJDGIIIDB
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GRXZDKKVDB.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\GRXZDKKVDB.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\HDGHJEBFBFHIIECAECGHIDBAEG
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\IPKGELNTQY.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\JJJKFBAAAFHJEBFIEGID
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JJJKFBAAAFHJEBFIEGIDHDHIEB
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\JKJDHDBKEBGHJJJJKEHD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KLIZUSIQEN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\MXPXCVPDVN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\MXPXCVPDVN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_qa4Ulla1BY.exe_2e6b40885ca080e35f9445e43cb3744e326d5cf0_39a5c092_317f80a0-65eb-449f-bec6-a2736dd8e980\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER83A2.tmp.dmp
Mini DuMP crash report, 14 streams, Thu May 2 17:00:56 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER88D3.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8922.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\NEBFQQYWPS.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\QCFWYSKMHA.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\SFPUSAFIOL.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\SFPUSAFIOL.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\UNKRLCVOHV.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\UOOJJOZIRH.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ZQIXMVQGAH.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 32 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\qa4Ulla1BY.exe
"C:\Users\user\Desktop\qa4Ulla1BY.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6548 -s 2156

URLs

Name
IP
Malicious
185.172.128.151/7043a0c6a68d9c65.php
malicious
http://185.172.128.151/7043a0c6a68d9c65.php
185.172.128.151
malicious
http://185.172.128.151/7043a0c6a
unknown
malicious
http://185.172.128.151/8420e83ceb95f3af/nss3.dll
185.172.128.151
malicious
http://185.172.128.151/8420e83ceb95f3af/softokn3.dll
185.172.128.151
malicious
http://185.1
unknown
malicious
http://185.172.128.151/8420e83ceb95f3af/vcruntime140.dll
185.172.128.151
malicious
http://185.172.128.151/7043a0c6a68d9
unknown
malicious
http://185.172.128.151
unknown
malicious
http://185.172.128.1
unknown
malicious
http://185.172.128.151/8420e83ceb95f3af/sqlite3.dll
185.172.128.151
malicious
http://185.172.128.151/8420e83ceb95f3af/freebl3.dll
185.172.128.151
malicious
http://185.172.1
unknown
malicious
http://185.172.128.151/8420e83ceb95f3af/msvcp140.dll
185.172.128.151
malicious
http://185.172.128.151/8420e83ceb95f3af/mozglue.dll
185.172.128.151
malicious
http://185.172.128.151/7E
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://185.172.128.151/8420e83ceb95f3af/nss3.dllll
unknown
https://duckduckgo.com/ac/?q=
unknown
https://mozilla.org0/
unknown
http://185.172.128.1515
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.172.128.151/7043a0c6a68d9c65.phpp
unknown
http://185.172.1.
unknown
http://185.172.128.151/7043a0c6a68d9c65.phps
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://185.172.128.151/7043a0c6a68d9c65.php2c2d5a8ae17ec472416794492730lt-releaseplaces.sqlite-shmfh
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.172.128.151/7043a0c6a68d9c65.phpe
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.172.128.151/8420e83ceb95f3af/vcruntime140.dllk
unknown
https://support.mozilla.org
unknown
http://185.172.128.151/7043a0c6a68d9c65.phpE
unknown
http://185.172.128.151/8420e83ceb95f3af/freebl3.dllj
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.sqlite.org/copyright.html.
unknown
http://185.172.128.151/8420e83ceb95f3af/nss3.dll0
unknown
There are 33 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.172.128.151
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{71d4c436-5791-c8f2-23f2-a968c949b8b9}\Root\InventoryApplicationFile\qa4ulla1by.exe|9f9cef871dd001b5
ProgramId
\REGISTRY\A\{71d4c436-5791-c8f2-23f2-a968c949b8b9}\Root\InventoryApplicationFile\qa4ulla1by.exe|9f9cef871dd001b5
FileId
\REGISTRY\A\{71d4c436-5791-c8f2-23f2-a968c949b8b9}\Root\InventoryApplicationFile\qa4ulla1by.exe|9f9cef871dd001b5
LowerCaseLongPath
\REGISTRY\A\{71d4c436-5791-c8f2-23f2-a968c949b8b9}\Root\InventoryApplicationFile\qa4ulla1by.exe|9f9cef871dd001b5
LongPathHash
\REGISTRY\A\{71d4c436-5791-c8f2-23f2-a968c949b8b9}\Root\InventoryApplicationFile\qa4ulla1by.exe|9f9cef871dd001b5
Name
\REGISTRY\A\{71d4c436-5791-c8f2-23f2-a968c949b8b9}\Root\InventoryApplicationFile\qa4ulla1by.exe|9f9cef871dd001b5
OriginalFileName
\REGISTRY\A\{71d4c436-5791-c8f2-23f2-a968c949b8b9}\Root\InventoryApplicationFile\qa4ulla1by.exe|9f9cef871dd001b5
Publisher
\REGISTRY\A\{71d4c436-5791-c8f2-23f2-a968c949b8b9}\Root\InventoryApplicationFile\qa4ulla1by.exe|9f9cef871dd001b5
Version
\REGISTRY\A\{71d4c436-5791-c8f2-23f2-a968c949b8b9}\Root\InventoryApplicationFile\qa4ulla1by.exe|9f9cef871dd001b5
BinFileVersion
\REGISTRY\A\{71d4c436-5791-c8f2-23f2-a968c949b8b9}\Root\InventoryApplicationFile\qa4ulla1by.exe|9f9cef871dd001b5
BinaryType
\REGISTRY\A\{71d4c436-5791-c8f2-23f2-a968c949b8b9}\Root\InventoryApplicationFile\qa4ulla1by.exe|9f9cef871dd001b5
ProductName
\REGISTRY\A\{71d4c436-5791-c8f2-23f2-a968c949b8b9}\Root\InventoryApplicationFile\qa4ulla1by.exe|9f9cef871dd001b5
ProductVersion
\REGISTRY\A\{71d4c436-5791-c8f2-23f2-a968c949b8b9}\Root\InventoryApplicationFile\qa4ulla1by.exe|9f9cef871dd001b5
LinkDate
\REGISTRY\A\{71d4c436-5791-c8f2-23f2-a968c949b8b9}\Root\InventoryApplicationFile\qa4ulla1by.exe|9f9cef871dd001b5
BinProductVersion
\REGISTRY\A\{71d4c436-5791-c8f2-23f2-a968c949b8b9}\Root\InventoryApplicationFile\qa4ulla1by.exe|9f9cef871dd001b5
AppxPackageFullName
\REGISTRY\A\{71d4c436-5791-c8f2-23f2-a968c949b8b9}\Root\InventoryApplicationFile\qa4ulla1by.exe|9f9cef871dd001b5
AppxPackageRelativeId
\REGISTRY\A\{71d4c436-5791-c8f2-23f2-a968c949b8b9}\Root\InventoryApplicationFile\qa4ulla1by.exe|9f9cef871dd001b5
Size
\REGISTRY\A\{71d4c436-5791-c8f2-23f2-a968c949b8b9}\Root\InventoryApplicationFile\qa4ulla1by.exe|9f9cef871dd001b5
Language
\REGISTRY\A\{71d4c436-5791-c8f2-23f2-a968c949b8b9}\Root\InventoryApplicationFile\qa4ulla1by.exe|9f9cef871dd001b5
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2E90000
direct allocation
page execute and read and write
malicious
2EC0000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
2DAC000
heap
page read and write
malicious
23088000
heap
page read and write
230AF000
heap
page read and write
2913B000
heap
page read and write
23091000
heap
page read and write
23137000
heap
page read and write
2F360000
heap
page read and write
2309C000
heap
page read and write
230A0000
heap
page read and write
2BA7000
heap
page read and write
6D222000
unkown
page readonly
6D415000
unkown
page readonly
2309C000
heap
page read and write
2E4B000
heap
page read and write
2E39000
heap
page read and write
2309D000
heap
page read and write
23098000
heap
page read and write
636000
unkown
page execute and read and write
230AF000
heap
page read and write
6D40F000
unkown
page write copy
23080000
heap
page read and write
23085000
heap
page read and write
2309C000
heap
page read and write
2D7E000
stack
page read and write
23181000
heap
page read and write
307F000
stack
page read and write
230B6000
heap
page read and write
230A0000
heap
page read and write
2914D000
heap
page read and write
29131000
heap
page read and write
29148000
heap
page read and write
1D010000
heap
page read and write
1CBBF000
stack
page read and write
1CD3E000
stack
page read and write
230AF000
heap
page read and write
29190000
heap
page read and write
2F7B000
heap
page read and write
2AEE000
unkown
page readonly
35F60000
heap
page read and write
2309C000
heap
page read and write
2BA5000
heap
page read and write
61ED4000
direct allocation
page readonly
1D119000
heap
page read and write
23099000
heap
page read and write
230B9000
heap
page read and write
1D110000
trusted library allocation
page read and write
2F2AF000
stack
page read and write
2F00000
heap
page read and write
230BD000
heap
page read and write
230A0000
heap
page read and write
2308B000
heap
page read and write
40C000
unkown
page readonly
23084000
heap
page read and write
230A0000
heap
page read and write
23098000
heap
page read and write
230AF000
heap
page read and write
6D21E000
unkown
page read and write
29130000
heap
page read and write
1D000000
heap
page read and write
23098000
heap
page read and write
2D80000
heap
page read and write
2F70000
heap
page read and write
23093000
heap
page read and write
2B5E000
stack
page read and write
23097000
heap
page read and write
23099000
heap
page read and write
230BD000
heap
page read and write
61ED3000
direct allocation
page read and write
230AF000
heap
page read and write
2F7B000
heap
page read and write
23090000
heap
page read and write
230AB000
heap
page read and write
2309D000
heap
page read and write
2F77000
heap
page read and write
23098000
heap
page read and write
23096000
heap
page read and write
6D191000
unkown
page execute read
230AB000
heap
page read and write
2309F000
heap
page read and write
230BC000
heap
page read and write
230A0000
heap
page read and write
549000
unkown
page execute and read and write
230AF000
heap
page read and write
2AEE000
unkown
page readonly
6D230000
unkown
page readonly
2309C000
heap
page read and write
23085000
heap
page read and write
2F77000
heap
page read and write
2E71000
heap
page read and write
624000
unkown
page execute and read and write
23128000
heap
page read and write
23098000
heap
page read and write
230A0000
heap
page read and write
61E01000
direct allocation
page execute read
2308E000
heap
page read and write
23094000
heap
page read and write
1F0000
heap
page read and write
1D011000
heap
page read and write
230AB000
heap
page read and write
61EB4000
direct allocation
page read and write
2D8A000
heap
page read and write
2D97000
heap
page execute and read and write
2F352000
heap
page read and write
230AF000
heap
page read and write
230BD000
heap
page read and write
290F0000
heap
page read and write
230BC000
heap
page read and write
2309C000
heap
page read and write
61ECC000
direct allocation
page read and write
2F350000
heap
page read and write
2308E000
heap
page read and write
1CA7F000
stack
page read and write
230BD000
heap
page read and write
2E45000
heap
page read and write
230A0000
heap
page read and write
2F7B000
heap
page read and write
230BD000
heap
page read and write
61ECD000
direct allocation
page readonly
2309D000
heap
page read and write
2F77000
heap
page read and write
23094000
heap
page read and write
23097000
heap
page read and write
48A0000
heap
page read and write
230A0000
heap
page read and write
353A0000
trusted library allocation
page read and write
2309D000
heap
page read and write
1CBFE000
stack
page read and write
2D8E000
heap
page read and write
9B000
stack
page read and write
29144000
heap
page read and write
2B9E000
stack
page read and write
2F77000
heap
page read and write
2309C000
heap
page read and write
23098000
heap
page read and write
61EB7000
direct allocation
page readonly
2309D000
heap
page read and write
1D011000
heap
page read and write
23092000
heap
page read and write
1CABE000
stack
page read and write
6D40E000
unkown
page read and write
2309C000
heap
page read and write
230AF000
heap
page read and write
2F1AE000
stack
page read and write
2DE7000
heap
page read and write
2F7B000
heap
page read and write
2E0A000
heap
page read and write
230BD000
heap
page read and write
61ED0000
direct allocation
page read and write
2309F000
heap
page read and write
23093000
heap
page read and write
400000
unkown
page readonly
230AB000
heap
page read and write
1CCFF000
stack
page read and write
6D410000
unkown
page read and write
2F35A000
heap
page read and write
35DD0000
heap
page read and write
230AF000
heap
page read and write
2BA7000
heap
page read and write
1C97F000
stack
page read and write
36465000
heap
page read and write
29110000
heap
page read and write
198000
stack
page read and write
41A000
unkown
page readonly
2E52000
heap
page read and write
2F359000
heap
page read and write
1CF7D000
stack
page read and write
6D231000
unkown
page execute read
193000
stack
page read and write
2F7B000
heap
page read and write
230AF000
heap
page read and write
23088000
heap
page read and write
2E57000
heap
page read and write
35DDA000
heap
page read and write
2308E000
heap
page read and write
2BA0000
heap
page read and write
23098000
heap
page read and write
230BD000
heap
page read and write
2308E000
heap
page read and write
6D190000
unkown
page readonly
29195000
heap
page read and write
23127000
heap
page read and write
230AB000
heap
page read and write
23096000
heap
page read and write
230A0000
heap
page read and write
2311F000
heap
page read and write
2B10000
heap
page read and write
1CE3E000
stack
page read and write
230AF000
heap
page read and write
2309C000
heap
page read and write
485E000
stack
page read and write
230B0000
heap
page read and write
230B5000
heap
page read and write
23086000
heap
page read and write
447000
unkown
page execute and read and write
29133000
heap
page read and write
230BD000
heap
page read and write
2309C000
heap
page read and write
1CE7E000
stack
page read and write
23093000
heap
page read and write
230A0000
heap
page read and write
430000
unkown
page write copy
2F20000
heap
page read and write
6D3CF000
unkown
page readonly
230AF000
heap
page read and write
230A0000
heap
page read and write
489E000
stack
page read and write
23098000
heap
page read and write
230AB000
heap
page read and write
2E40000
heap
page read and write
230AF000
heap
page read and write
23098000
heap
page read and write
61E00000
direct allocation
page execute and read and write
6D20D000
unkown
page readonly
2F361000
heap
page read and write
29136000
heap
page read and write
401000
unkown
page execute read
There are 209 hidden memdumps, click here to show them.