IOC Report
QmMKz5d4j7.exe

loading gif

Files

File Path
Type
Category
Malicious
QmMKz5d4j7.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_QmMKz5d4j7.exe_dc14d93cd133352ca410a767c739d7e1cc7238_4194dc89_d27235f4-f01d-4ca3-9fb1-ecde3480120d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7872.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 8 00:33:57 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER795D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER797D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QmMKz5d4j7.exe
"C:\Users\user\Desktop\QmMKz5d4j7.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 1128

URLs

Name
IP
Malicious
http://62.122.184.144/
62.122.184.144
malicious
http://62.122.184.144/f88d87a7e087e100.php
62.122.184.144
malicious
http://62.122.184.144
unknown
malicious
http://62.122.184.144/f88d87a7e087e100.php)
unknown
http://upx.sf.net
unknown
http://62.122.184.144k
unknown
http://62.122.184.144/9
unknown
http://62.122.184.144g
unknown
http://62.122.184.144/ws
unknown
http://62.122.184.144/f88d87a7e087e100.php5
unknown
http://62.122.184.144/f88d87a7e087e100.phpU
unknown
http://62.122.184.144/f88d87a7e087e100.phpe
unknown
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
62.122.184.144
unknown
unknown
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{a5854939-9fd9-e9be-cf33-93f9acb82761}\Root\InventoryApplicationFile\qmmkz5d4j7.exe|c05bc97f51afdc99
ProgramId
\REGISTRY\A\{a5854939-9fd9-e9be-cf33-93f9acb82761}\Root\InventoryApplicationFile\qmmkz5d4j7.exe|c05bc97f51afdc99
FileId
\REGISTRY\A\{a5854939-9fd9-e9be-cf33-93f9acb82761}\Root\InventoryApplicationFile\qmmkz5d4j7.exe|c05bc97f51afdc99
LowerCaseLongPath
\REGISTRY\A\{a5854939-9fd9-e9be-cf33-93f9acb82761}\Root\InventoryApplicationFile\qmmkz5d4j7.exe|c05bc97f51afdc99
LongPathHash
\REGISTRY\A\{a5854939-9fd9-e9be-cf33-93f9acb82761}\Root\InventoryApplicationFile\qmmkz5d4j7.exe|c05bc97f51afdc99
Name
\REGISTRY\A\{a5854939-9fd9-e9be-cf33-93f9acb82761}\Root\InventoryApplicationFile\qmmkz5d4j7.exe|c05bc97f51afdc99
OriginalFileName
\REGISTRY\A\{a5854939-9fd9-e9be-cf33-93f9acb82761}\Root\InventoryApplicationFile\qmmkz5d4j7.exe|c05bc97f51afdc99
Publisher
\REGISTRY\A\{a5854939-9fd9-e9be-cf33-93f9acb82761}\Root\InventoryApplicationFile\qmmkz5d4j7.exe|c05bc97f51afdc99
Version
\REGISTRY\A\{a5854939-9fd9-e9be-cf33-93f9acb82761}\Root\InventoryApplicationFile\qmmkz5d4j7.exe|c05bc97f51afdc99
BinFileVersion
\REGISTRY\A\{a5854939-9fd9-e9be-cf33-93f9acb82761}\Root\InventoryApplicationFile\qmmkz5d4j7.exe|c05bc97f51afdc99
BinaryType
\REGISTRY\A\{a5854939-9fd9-e9be-cf33-93f9acb82761}\Root\InventoryApplicationFile\qmmkz5d4j7.exe|c05bc97f51afdc99
ProductName
\REGISTRY\A\{a5854939-9fd9-e9be-cf33-93f9acb82761}\Root\InventoryApplicationFile\qmmkz5d4j7.exe|c05bc97f51afdc99
ProductVersion
\REGISTRY\A\{a5854939-9fd9-e9be-cf33-93f9acb82761}\Root\InventoryApplicationFile\qmmkz5d4j7.exe|c05bc97f51afdc99
LinkDate
\REGISTRY\A\{a5854939-9fd9-e9be-cf33-93f9acb82761}\Root\InventoryApplicationFile\qmmkz5d4j7.exe|c05bc97f51afdc99
BinProductVersion
\REGISTRY\A\{a5854939-9fd9-e9be-cf33-93f9acb82761}\Root\InventoryApplicationFile\qmmkz5d4j7.exe|c05bc97f51afdc99
AppxPackageFullName
\REGISTRY\A\{a5854939-9fd9-e9be-cf33-93f9acb82761}\Root\InventoryApplicationFile\qmmkz5d4j7.exe|c05bc97f51afdc99
AppxPackageRelativeId
\REGISTRY\A\{a5854939-9fd9-e9be-cf33-93f9acb82761}\Root\InventoryApplicationFile\qmmkz5d4j7.exe|c05bc97f51afdc99
Size
\REGISTRY\A\{a5854939-9fd9-e9be-cf33-93f9acb82761}\Root\InventoryApplicationFile\qmmkz5d4j7.exe|c05bc97f51afdc99
Language
\REGISTRY\A\{a5854939-9fd9-e9be-cf33-93f9acb82761}\Root\InventoryApplicationFile\qmmkz5d4j7.exe|c05bc97f51afdc99
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
22D0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
6BD000
heap
page read and write
malicious
2350000
direct allocation
page read and write
malicious
65C000
unkown
page execute and read and write
1A8BE000
stack
page read and write
6F2000
heap
page read and write
9BF000
stack
page read and write
770000
heap
page read and write
670000
heap
page read and write
4E2000
unkown
page execute and read and write
67A000
heap
page read and write
400000
unkown
page readonly
2440000
heap
page read and write
691000
heap
page execute and read and write
4B1000
unkown
page execute and read and write
7E5000
heap
page read and write
64A000
unkown
page execute and read and write
7E0000
heap
page read and write
7BE000
stack
page read and write
23EE000
stack
page read and write
6EB000
heap
page read and write
1AA0E000
stack
page read and write
2350000
heap
page read and write
1A51F000
stack
page read and write
1A61F000
stack
page read and write
67E000
heap
page read and write
1AC6E000
stack
page read and write
1A76E000
stack
page read and write
9FE000
stack
page read and write
41D000
unkown
page readonly
1AB0D000
stack
page read and write
401000
unkown
page execute read
23AE000
stack
page read and write
70A000
heap
page read and write
44B000
unkown
page write copy
AFF000
stack
page read and write
1A86F000
stack
page read and write
242E000
stack
page read and write
9C000
stack
page read and write
4BD000
unkown
page execute and read and write
19D000
stack
page read and write
22C3000
heap
page read and write
2340000
heap
page read and write
194000
stack
page read and write
1A9BE000
stack
page read and write
460000
unkown
page readonly
1AB6E000
stack
page read and write
1F0000
heap
page read and write
40F000
unkown
page readonly
22C0000
heap
page read and write
1A71F000
stack
page read and write
There are 42 hidden memdumps, click here to show them.