IOC Report
MqN5lD3LGo.exe

loading gif

Files

File Path
Type
Category
Malicious
MqN5lD3LGo.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MqN5lD3LGo.exe_75d7bb26b9feea5788cdd196fb86ebec7d54070_4703ef6b_6232b001-d7a8-4b58-a9ee-92c298c63795\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC180.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Jun 25 16:12:56 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC1CF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC20F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\MqN5lD3LGo.exe
"C:\Users\user\Desktop\MqN5lD3LGo.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4508 -s 308

URLs

Name
IP
Malicious
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
http://www.winimage.com/zLibDll
unknown
http://upx.sf.net
unknown
https://t.me/RiseProSUPPORT
unknown
http://www.microsoft.
unknown
https://ipinfo.io/
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown

IPs

IP
Domain
Country
Malicious
5.42.67.8
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{1b448bad-b4cd-e6b8-cc68-4e3097ac926a}\Root\InventoryApplicationFile\mqn5ld3lgo.exe|4809346ebb857701
ProgramId
\REGISTRY\A\{1b448bad-b4cd-e6b8-cc68-4e3097ac926a}\Root\InventoryApplicationFile\mqn5ld3lgo.exe|4809346ebb857701
FileId
\REGISTRY\A\{1b448bad-b4cd-e6b8-cc68-4e3097ac926a}\Root\InventoryApplicationFile\mqn5ld3lgo.exe|4809346ebb857701
LowerCaseLongPath
\REGISTRY\A\{1b448bad-b4cd-e6b8-cc68-4e3097ac926a}\Root\InventoryApplicationFile\mqn5ld3lgo.exe|4809346ebb857701
LongPathHash
\REGISTRY\A\{1b448bad-b4cd-e6b8-cc68-4e3097ac926a}\Root\InventoryApplicationFile\mqn5ld3lgo.exe|4809346ebb857701
Name
\REGISTRY\A\{1b448bad-b4cd-e6b8-cc68-4e3097ac926a}\Root\InventoryApplicationFile\mqn5ld3lgo.exe|4809346ebb857701
OriginalFileName
\REGISTRY\A\{1b448bad-b4cd-e6b8-cc68-4e3097ac926a}\Root\InventoryApplicationFile\mqn5ld3lgo.exe|4809346ebb857701
Publisher
\REGISTRY\A\{1b448bad-b4cd-e6b8-cc68-4e3097ac926a}\Root\InventoryApplicationFile\mqn5ld3lgo.exe|4809346ebb857701
Version
\REGISTRY\A\{1b448bad-b4cd-e6b8-cc68-4e3097ac926a}\Root\InventoryApplicationFile\mqn5ld3lgo.exe|4809346ebb857701
BinFileVersion
\REGISTRY\A\{1b448bad-b4cd-e6b8-cc68-4e3097ac926a}\Root\InventoryApplicationFile\mqn5ld3lgo.exe|4809346ebb857701
BinaryType
\REGISTRY\A\{1b448bad-b4cd-e6b8-cc68-4e3097ac926a}\Root\InventoryApplicationFile\mqn5ld3lgo.exe|4809346ebb857701
ProductName
\REGISTRY\A\{1b448bad-b4cd-e6b8-cc68-4e3097ac926a}\Root\InventoryApplicationFile\mqn5ld3lgo.exe|4809346ebb857701
ProductVersion
\REGISTRY\A\{1b448bad-b4cd-e6b8-cc68-4e3097ac926a}\Root\InventoryApplicationFile\mqn5ld3lgo.exe|4809346ebb857701
LinkDate
\REGISTRY\A\{1b448bad-b4cd-e6b8-cc68-4e3097ac926a}\Root\InventoryApplicationFile\mqn5ld3lgo.exe|4809346ebb857701
BinProductVersion
\REGISTRY\A\{1b448bad-b4cd-e6b8-cc68-4e3097ac926a}\Root\InventoryApplicationFile\mqn5ld3lgo.exe|4809346ebb857701
AppxPackageFullName
\REGISTRY\A\{1b448bad-b4cd-e6b8-cc68-4e3097ac926a}\Root\InventoryApplicationFile\mqn5ld3lgo.exe|4809346ebb857701
AppxPackageRelativeId
\REGISTRY\A\{1b448bad-b4cd-e6b8-cc68-4e3097ac926a}\Root\InventoryApplicationFile\mqn5ld3lgo.exe|4809346ebb857701
Size
\REGISTRY\A\{1b448bad-b4cd-e6b8-cc68-4e3097ac926a}\Root\InventoryApplicationFile\mqn5ld3lgo.exe|4809346ebb857701
Language
\REGISTRY\A\{1b448bad-b4cd-e6b8-cc68-4e3097ac926a}\Root\InventoryApplicationFile\mqn5ld3lgo.exe|4809346ebb857701
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1495000
heap
page read and write
E4000
unkown
page write copy
1480000
heap
page read and write
525E000
stack
page read and write
273E000
stack
page read and write
D8000
unkown
page readonly
153B000
heap
page read and write
AFD000
stack
page read and write
7B0000
heap
page read and write
3150000
heap
page read and write
133C000
stack
page read and write
1540000
heap
page read and write
B0000
unkown
page readonly
30C0000
heap
page read and write
D1E000
stack
page read and write
1563000
heap
page read and write
156B000
heap
page read and write
1542000
heap
page read and write
E1F000
stack
page read and write
287D000
stack
page read and write
B1000
unkown
page execute read
27A000
unkown
page readonly
400000
remote allocation
page execute and read and write
13A0000
heap
page read and write
14FA000
heap
page read and write
152E000
heap
page read and write
162E000
stack
page read and write
D8000
unkown
page readonly
BEA000
heap
page read and write
7F0000
direct allocation
page execute and read and write
123B000
stack
page read and write
1546000
heap
page read and write
E4000
unkown
page write copy
2F7F000
stack
page read and write
75C000
stack
page read and write
25FE000
stack
page read and write
1537000
heap
page read and write
1533000
heap
page read and write
7C0000
heap
page read and write
B0000
unkown
page readonly
E4000
unkown
page read and write
1490000
heap
page read and write
156D000
heap
page read and write
BE0000
heap
page read and write
1529000
heap
page read and write
16D0000
heap
page read and write
BEE000
heap
page read and write
14F0000
heap
page read and write
283F000
stack
page read and write
26FF000
stack
page read and write
30BE000
stack
page read and write
297D000
stack
page read and write
27A000
unkown
page readonly
7D0000
heap
page read and write
B1000
unkown
page execute read
There are 45 hidden memdumps, click here to show them.