IOC Report
Wb9LZ5Sn1l.exe

loading gif

Files

File Path
Type
Category
Malicious
Wb9LZ5Sn1l.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BFHDHJKKJDHJJJJKEGHIDGDHDA
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BNAGMGSPLO.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\BNAGMGSPLO.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\DAECAECFCAAEBFHIEHDGHDHCBA
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\EBKKKEGIDBGHIDGDHDBFHDAKJJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\EEGWXUHVUG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EFOYFBOLXA.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EHDAFIJJECFHJJKFCAKJJKEHID
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\GHDHDGHJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\GHDHDGHJEBGIDGDGIJJK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HDBGHIDGDGHCBGDGCBFI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IDAAFBGD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Wb9LZ5Sn1l.exe_6bf9801264b0a953976646c0a07cf5ec5d778a2a_0ff734d6_f2d55ae1-9a4c-4530-b113-11a7fa9980d5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6070.tmp.dmp
Mini DuMP crash report, 14 streams, Fri May 3 07:14:34 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER61B9.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER61E9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\PIVFAGEAAV.docx
ASCII text, with very long lines (1024), with CRLF line terminators
modified
C:\ProgramData\SQSJKEBWDT.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 24 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Wb9LZ5Sn1l.exe
"C:\Users\user\Desktop\Wb9LZ5Sn1l.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6524 -s 2900

URLs

Name
IP
Malicious
https://shaffatta.com
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://shaffatta.com/fdca69ae739b4897.phpu-
unknown
https://duckduckgo.com/ac/?q=
unknown
https://shaffatta.com/qC
unknown
https://shaffatta.com/D
unknown
https://shaffatta.com/d32e011d2eaa85a0/vcruntime140.dlljd
unknown
https://shaffatta.com/fdca69ae739b4897.phpft
unknown
https://shaffatta.com/Kf
unknown
https://shaffatta.com/fdca69ae739b4897.php
168.119.248.46
https://shaffatta.com/d32e011d2eaa85a0/mozglue.dll
168.119.248.46
https://shaffatta.com/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://shaffatta.com/d32e011d2eaa85a0/msvcp140.dll
168.119.248.46
https://shaffatta.com/ost:
unknown
https://shaffatta.com/fatta.com/32e011d2eaa85a0/nss3.dllbfP
unknown
https://shaffatta.com/fdca69ae739b4897.php)
unknown
https://shaffatta.com/AECFCAAEBFHIEHDGHDHCBA9fy
unknown
https://shaffatta.com/fdca69ae739b4897.php&
unknown
https://shaffatta.com/AECFCAAEBFHIEHDGHDHCBAxf6
unknown
https://shaffatta.com/fdca69ae739b4897.php4n
unknown
https://shaffatta.com/fdca69ae739b4897.phpdf75cd1f19e4e3ce5d0897b354e44
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://shaffatta.com//
unknown
https://shaffatta.com/32e011d2eaa85a0/nss3.dllufE
unknown
https://shaffatta.com/uments
unknown
https://shaffatta.com/d32e011d2eaa85a0/softokn3.dllt
unknown
http://www.sqlite.org/copyright.html.
unknown
https://shaffatta.com/d32e011d2eaa85a0/nss3.dll
168.119.248.46
https://shaffatta.com/fdca69ae739b4897.phpl-
unknown
https://shaffatta.com/d32e011d2eaa85a0/freebl3.dll
168.119.248.46
http://www.mozilla.com/en-US/blocklist/
unknown
https://shaffatta.com/d32e011d2eaa85a0/mozglue.dllb
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://shaffatta.com/fdca69ae739b4897.phpX
unknown
https://shaffatta.com/fdca69ae739b4897.phpV
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://shaffatta.com/d32e011d2eaa85a0/sqlite3.dll
168.119.248.46
https://shaffatta.com/d32e011d2eaa85a0/vcruntime140.dll
168.119.248.46
http://upx.sf.net
unknown
https://shaffatta.com/fdca69ae739b4897.phpindows
unknown
https://shaffatta.com/fdca69ae739b4897.phpm
unknown
https://shaffatta.com/#f
unknown
https://shaffatta.com/fatta.com/uments
unknown
https://www.ecosia.org/newtab/
unknown
https://shaffatta.com/fatta.com/d32e011d2eaa85a0/nss3.dll
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://shaffatta.com/d32e011d2eaa85a0/sqlite3.dllf?6
unknown
https://shaffatta.com/fdca69ae739b4897.phpe
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://shaffatta.com/ia
unknown
https://shaffatta.com/fatta.com/ia
unknown
https://shaffatta.com/fatta.com/
unknown
https://shaffatta.com0
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://shaffatta.com/fatta.com/32e011d2eaa85a0/nss3.dll
unknown
https://shaffatta.com/d32e011d2eaa85a0/softokn3.dll
168.119.248.46
https://support.mozilla.org
unknown
https://shaffatta.com/d32e011d2eaa85a0/nss3.dllDg2
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://shaffatta.com/d32e011d2eaa85a0/msvcp140.dllF
unknown
There are 52 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
shaffatta.com
168.119.248.46
malicious

IPs

IP
Domain
Country
Malicious
168.119.248.46
shaffatta.com
Germany
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{11ba11a6-d672-1fb4-0dd6-c711e3a45e38}\Root\InventoryApplicationFile\wb9lz5sn1l.exe|c8e72675b378956f
ProgramId
\REGISTRY\A\{11ba11a6-d672-1fb4-0dd6-c711e3a45e38}\Root\InventoryApplicationFile\wb9lz5sn1l.exe|c8e72675b378956f
FileId
\REGISTRY\A\{11ba11a6-d672-1fb4-0dd6-c711e3a45e38}\Root\InventoryApplicationFile\wb9lz5sn1l.exe|c8e72675b378956f
LowerCaseLongPath
\REGISTRY\A\{11ba11a6-d672-1fb4-0dd6-c711e3a45e38}\Root\InventoryApplicationFile\wb9lz5sn1l.exe|c8e72675b378956f
LongPathHash
\REGISTRY\A\{11ba11a6-d672-1fb4-0dd6-c711e3a45e38}\Root\InventoryApplicationFile\wb9lz5sn1l.exe|c8e72675b378956f
Name
\REGISTRY\A\{11ba11a6-d672-1fb4-0dd6-c711e3a45e38}\Root\InventoryApplicationFile\wb9lz5sn1l.exe|c8e72675b378956f
OriginalFileName
\REGISTRY\A\{11ba11a6-d672-1fb4-0dd6-c711e3a45e38}\Root\InventoryApplicationFile\wb9lz5sn1l.exe|c8e72675b378956f
Publisher
\REGISTRY\A\{11ba11a6-d672-1fb4-0dd6-c711e3a45e38}\Root\InventoryApplicationFile\wb9lz5sn1l.exe|c8e72675b378956f
Version
\REGISTRY\A\{11ba11a6-d672-1fb4-0dd6-c711e3a45e38}\Root\InventoryApplicationFile\wb9lz5sn1l.exe|c8e72675b378956f
BinFileVersion
\REGISTRY\A\{11ba11a6-d672-1fb4-0dd6-c711e3a45e38}\Root\InventoryApplicationFile\wb9lz5sn1l.exe|c8e72675b378956f
BinaryType
\REGISTRY\A\{11ba11a6-d672-1fb4-0dd6-c711e3a45e38}\Root\InventoryApplicationFile\wb9lz5sn1l.exe|c8e72675b378956f
ProductName
\REGISTRY\A\{11ba11a6-d672-1fb4-0dd6-c711e3a45e38}\Root\InventoryApplicationFile\wb9lz5sn1l.exe|c8e72675b378956f
ProductVersion
\REGISTRY\A\{11ba11a6-d672-1fb4-0dd6-c711e3a45e38}\Root\InventoryApplicationFile\wb9lz5sn1l.exe|c8e72675b378956f
LinkDate
\REGISTRY\A\{11ba11a6-d672-1fb4-0dd6-c711e3a45e38}\Root\InventoryApplicationFile\wb9lz5sn1l.exe|c8e72675b378956f
BinProductVersion
\REGISTRY\A\{11ba11a6-d672-1fb4-0dd6-c711e3a45e38}\Root\InventoryApplicationFile\wb9lz5sn1l.exe|c8e72675b378956f
AppxPackageFullName
\REGISTRY\A\{11ba11a6-d672-1fb4-0dd6-c711e3a45e38}\Root\InventoryApplicationFile\wb9lz5sn1l.exe|c8e72675b378956f
AppxPackageRelativeId
\REGISTRY\A\{11ba11a6-d672-1fb4-0dd6-c711e3a45e38}\Root\InventoryApplicationFile\wb9lz5sn1l.exe|c8e72675b378956f
Size
\REGISTRY\A\{11ba11a6-d672-1fb4-0dd6-c711e3a45e38}\Root\InventoryApplicationFile\wb9lz5sn1l.exe|c8e72675b378956f
Language
\REGISTRY\A\{11ba11a6-d672-1fb4-0dd6-c711e3a45e38}\Root\InventoryApplicationFile\wb9lz5sn1l.exe|c8e72675b378956f
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2B50000
direct allocation
page execute and read and write
malicious
447000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
2BD6000
heap
page read and write
malicious
47A0000
direct allocation
page read and write
malicious
235C0000
heap
page read and write
2B8E000
heap
page read and write
19B000
stack
page read and write
235D2000
heap
page read and write
235B7000
heap
page read and write
235C0000
heap
page read and write
235BD000
heap
page read and write
2B80000
heap
page read and write
493E000
stack
page read and write
235C0000
heap
page read and write
2F6E0000
heap
page read and write
1D3D0000
heap
page read and write
235C0000
heap
page read and write
1D3D8000
heap
page read and write
235E0000
heap
page read and write
235C0000
heap
page read and write
235B3000
heap
page read and write
235D1000
heap
page read and write
2C40000
heap
page read and write
2F6F8000
heap
page read and write
235D1000
heap
page read and write
6CD00000
unkown
page readonly
235B6000
heap
page read and write
549000
unkown
page execute and read and write
235A0000
heap
page read and write
1D250000
remote allocation
page read and write
6CD01000
unkown
page execute read
235E0000
heap
page read and write
235B7000
heap
page read and write
1CB1F000
stack
page read and write
235BE000
heap
page read and write
235E0000
heap
page read and write
1D3D3000
heap
page read and write
235B9000
heap
page read and write
1CD5E000
stack
page read and write
1D48D000
heap
page read and write
1CF9E000
stack
page read and write
2F98A000
heap
page read and write
2F709000
heap
page read and write
235A6000
heap
page read and write
235B6000
heap
page read and write
235B4000
heap
page read and write
1D408000
heap
page read and write
624000
unkown
page execute and read and write
235B3000
heap
page read and write
1D453000
heap
page read and write
1D4D4000
heap
page read and write
6CCF2000
unkown
page readonly
1D3C0000
heap
page read and write
1D44A000
heap
page read and write
235B3000
heap
page read and write
2F6FE000
heap
page read and write
235C0000
heap
page read and write
494B000
heap
page read and write
235E0000
heap
page read and write
235BE000
heap
page read and write
2F983000
heap
page read and write
2F6EC000
heap
page read and write
235BC000
heap
page read and write
235BD000
heap
page read and write
61E00000
direct allocation
page execute and read and write
418000
unkown
page write copy
1D442000
heap
page read and write
6CC61000
unkown
page execute read
1D0ED000
stack
page read and write
235C2000
heap
page read and write
1CD1F000
stack
page read and write
1CE9E000
stack
page read and write
2F97D000
heap
page read and write
2B00000
trusted library allocation
page read and write
235BE000
heap
page read and write
235A6000
heap
page read and write
6CCEE000
unkown
page read and write
2BF4000
heap
page read and write
235AD000
heap
page read and write
47D0000
heap
page read and write
235D6000
heap
page read and write
235D1000
heap
page read and write
6CEDF000
unkown
page write copy
235E0000
heap
page read and write
2C0B000
heap
page read and write
2CE0000
heap
page read and write
2344F000
heap
page read and write
235C5000
heap
page read and write
2C2A000
heap
page read and write
482E000
stack
page read and write
235C0000
heap
page read and write
235E0000
heap
page read and write
235BC000
heap
page read and write
1A05000
unkown
page readonly
235C0000
heap
page read and write
235D6000
heap
page read and write
48F0000
heap
page read and write
235E0000
heap
page read and write
1CFEE000
stack
page read and write
1D28E000
stack
page read and write
1D3E3000
heap
page read and write
235B0000
heap
page read and write
61EB7000
direct allocation
page readonly
235D1000
heap
page read and write
636000
unkown
page execute and read and write
235D2000
heap
page read and write
2C38000
heap
page read and write
235C0000
heap
page read and write
48AE000
stack
page read and write
4940000
heap
page read and write
401000
unkown
page execute read
1CA1F000
stack
page read and write
235BB000
heap
page read and write
1D17C000
heap
page read and write
1D3E8000
heap
page read and write
235B1000
heap
page read and write
235D6000
heap
page read and write
235E0000
heap
page read and write
6CE9F000
unkown
page readonly
235B8000
heap
page read and write
235D1000
heap
page read and write
1D440000
heap
page read and write
191000
stack
page read and write
6CEDE000
unkown
page read and write
235BC000
heap
page read and write
2AE9000
unkown
page execute and read and write
1D445000
heap
page read and write
235B8000
heap
page read and write
235B8000
heap
page read and write
234FD000
heap
page read and write
2F6FB000
heap
page read and write
2BC1000
heap
page execute and read and write
235E0000
heap
page read and write
47A0000
direct allocation
page read and write
235DF000
heap
page read and write
47B3000
direct allocation
page read and write
1D48B000
heap
page read and write
235C2000
heap
page read and write
61ECC000
direct allocation
page read and write
1D3D8000
heap
page read and write
1D3EA000
heap
page read and write
235D1000
heap
page read and write
6CEE0000
unkown
page read and write
235D6000
heap
page read and write
235A5000
heap
page read and write
6CCDD000
unkown
page readonly
235CD000
heap
page read and write
400000
unkown
page readonly
235CD000
heap
page read and write
235B6000
heap
page read and write
61ECD000
direct allocation
page readonly
235E0000
heap
page read and write
2CE5000
heap
page read and write
235B4000
heap
page read and write
1D3F0000
heap
page read and write
235CD000
heap
page read and write
235B3000
heap
page read and write
235BE000
heap
page read and write
1D3D3000
heap
page read and write
235C0000
heap
page read and write
235E0000
heap
page read and write
1CC1F000
stack
page read and write
235B6000
heap
page read and write
47CC000
direct allocation
page read and write
235C0000
heap
page read and write
235D6000
heap
page read and write
48E0000
heap
page read and write
2AF0000
heap
page read and write
2C3D000
heap
page read and write
235E0000
heap
page read and write
2F975000
heap
page read and write
2B8A000
heap
page read and write
1D140000
heap
page read and write
486E000
stack
page read and write
2B9B000
heap
page execute and read and write
1D38F000
stack
page read and write
1D250000
remote allocation
page read and write
235C0000
heap
page read and write
1D45C000
heap
page read and write
235B6000
heap
page read and write
235D1000
heap
page read and write
235C0000
heap
page read and write
6CEE5000
unkown
page readonly
235E0000
heap
page read and write
1D49F000
heap
page read and write
235A5000
heap
page read and write
1D428000
heap
page read and write
235C0000
heap
page read and write
4760000
direct allocation
page execute and read and write
2C44000
heap
page read and write
61ED4000
direct allocation
page readonly
235D6000
heap
page read and write
411000
unkown
page readonly
1F0000
heap
page read and write
2C44000
heap
page read and write
235E0000
heap
page read and write
1CE5E000
stack
page read and write
2BBF000
heap
page read and write
235C0000
heap
page read and write
2F982000
heap
page read and write
61EB4000
direct allocation
page read and write
2F703000
heap
page read and write
235C0000
heap
page read and write
4774000
direct allocation
page execute and read and write
2C41000
heap
page read and write
235C0000
heap
page read and write
9C000
stack
page read and write
61ED0000
direct allocation
page read and write
1D250000
remote allocation
page read and write
6CC60000
unkown
page readonly
1D3DE000
heap
page read and write
1D457000
heap
page read and write
1D3C0000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
197000
stack
page read and write
235D0000
heap
page read and write
235E0000
heap
page read and write
61ED3000
direct allocation
page read and write
235E0000
heap
page read and write
236AE000
heap
page read and write
235B4000
heap
page read and write
There are 212 hidden memdumps, click here to show them.