IOC Report
4M3JIACIWk.exe

loading gif

Files

File Path
Type
Category
Malicious
4M3JIACIWk.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_4M3JIACIWk.exe_42abe2dd17d2b9ef6341786752f88f99cca66ab_4786b708_13c8a5b3-1761-4a90-bdd2-1bca33a5700f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER869A.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Oct 23 13:42:03 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8870.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER88AF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\4M3JIACIWk.exe
"C:\Users\user\Desktop\4M3JIACIWk.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 1044

URLs

Name
IP
Malicious
http://185.201.252.118/
185.201.252.118
malicious
http://185.201.252.118/ef952bc0f542da4b.php
185.201.252.118
malicious
http://185.201.252.118
unknown
malicious
http://upx.sf.net
unknown
http://185.201.252.118/ws
unknown
http://185.201.252.118/ef952bc0f542da4b.phpW
unknown
http://185.201.252.118/4
unknown
http://185.201.252.118/ef952bc0f542da4b.phpWindows
unknown
http://185.201.252.118/ef952bc0f542da4b.php3
unknown
http://185.201.252.118/Y
unknown
http://185.201.252.118/ef952bc0f542da4b.php&zV
unknown
http://185.201.252.118/ef952bc0f542da4b.php/
unknown
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.201.252.118
unknown
Netherlands
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
ProgramId
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
FileId
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
LowerCaseLongPath
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
LongPathHash
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
Name
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
OriginalFileName
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
Publisher
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
Version
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
BinFileVersion
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
BinaryType
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
ProductName
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
ProductVersion
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
LinkDate
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
BinProductVersion
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
AppxPackageFullName
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
AppxPackageRelativeId
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
Size
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
Language
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2480000
direct allocation
page read and write
malicious
23E0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
7C8000
heap
page read and write
malicious
438000
unkown
page readonly
1ACAE000
stack
page read and write
79E000
heap
page execute and read and write
40E000
unkown
page execute read
9BF000
stack
page read and write
1F0000
heap
page read and write
64A000
unkown
page execute and read and write
780000
heap
page read and write
765000
heap
page read and write
51B000
unkown
page readonly
2450000
heap
page read and write
1A66F000
stack
page read and write
1ADAE000
stack
page read and write
AFF000
stack
page read and write
B3E000
stack
page read and write
1A8AE000
stack
page read and write
8BE000
stack
page read and write
252E000
stack
page read and write
817000
heap
page read and write
195000
stack
page read and write
65C000
unkown
page execute and read and write
760000
heap
page read and write
2490000
heap
page read and write
9FE000
stack
page read and write
801000
heap
page read and write
19D000
stack
page read and write
2470000
heap
page read and write
4B1000
unkown
page execute and read and write
4E2000
unkown
page execute and read and write
256E000
stack
page read and write
1A9FE000
stack
page read and write
1AC4D000
stack
page read and write
401000
unkown
page execute read
1A76F000
stack
page read and write
1AAFE000
stack
page read and write
1A86F000
stack
page read and write
740000
heap
page read and write
9C000
stack
page read and write
7FA000
heap
page read and write
1AB4E000
stack
page read and write
400000
unkown
page readonly
2473000
heap
page read and write
2590000
heap
page read and write
4BD000
unkown
page execute and read and write
24EE000
stack
page read and write
78A000
heap
page read and write
C3F000
stack
page read and write
78E000
heap
page read and write
43B000
unkown
page write copy
1A9AF000
stack
page read and write
There are 44 hidden memdumps, click here to show them.