IOC Report
MmcJhaiYNh.exe

loading gif

Files

File Path
Type
Category
Malicious
MmcJhaiYNh.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MmcJhaiYNh.exe_bdefa9aad4b825c5631b87954d3abbfcc0f02270_a8e7628e_feeafe02-ff32-4b1c-a93d-c4818edfd04c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF549.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 8 01:24:05 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF625.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF654.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\MmcJhaiYNh.exe
"C:\Users\user\Desktop\MmcJhaiYNh.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7676 -s 248

URLs

Name
IP
Malicious
http://62.204.41.150
unknown
malicious
http://62.204.41.150/
62.204.41.150
malicious
http://62.204.41.150/edd20096ecef326d.php
62.204.41.150
malicious
http://upx.sf.net
unknown
http://62.204.41.150/Tg$
unknown
http://62.204.41.150/edd20096ecef326d.php-
unknown
http://62.204.41.150/edd20096ecef326d.phpows
unknown
http://62.204.41.150/W
unknown
http://62.204.41.150/edd20096ecef326d.phpn8
unknown
http://62.204.41.150/edd20096ecef326d.php5
unknown
http://62.204.41.150=
unknown
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172
s-part-0032.t-0009.t-msedge.net
13.107.246.60

IPs

IP
Domain
Country
Malicious
62.204.41.150
unknown
United Kingdom
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{d41951d0-0750-54a2-cf41-3cfcb9f11558}\Root\InventoryApplicationFile\mmcjhaiynh.exe|e3301c0c7c3ed075
ProgramId
\REGISTRY\A\{d41951d0-0750-54a2-cf41-3cfcb9f11558}\Root\InventoryApplicationFile\mmcjhaiynh.exe|e3301c0c7c3ed075
FileId
\REGISTRY\A\{d41951d0-0750-54a2-cf41-3cfcb9f11558}\Root\InventoryApplicationFile\mmcjhaiynh.exe|e3301c0c7c3ed075
LowerCaseLongPath
\REGISTRY\A\{d41951d0-0750-54a2-cf41-3cfcb9f11558}\Root\InventoryApplicationFile\mmcjhaiynh.exe|e3301c0c7c3ed075
LongPathHash
\REGISTRY\A\{d41951d0-0750-54a2-cf41-3cfcb9f11558}\Root\InventoryApplicationFile\mmcjhaiynh.exe|e3301c0c7c3ed075
Name
\REGISTRY\A\{d41951d0-0750-54a2-cf41-3cfcb9f11558}\Root\InventoryApplicationFile\mmcjhaiynh.exe|e3301c0c7c3ed075
OriginalFileName
\REGISTRY\A\{d41951d0-0750-54a2-cf41-3cfcb9f11558}\Root\InventoryApplicationFile\mmcjhaiynh.exe|e3301c0c7c3ed075
Publisher
\REGISTRY\A\{d41951d0-0750-54a2-cf41-3cfcb9f11558}\Root\InventoryApplicationFile\mmcjhaiynh.exe|e3301c0c7c3ed075
Version
\REGISTRY\A\{d41951d0-0750-54a2-cf41-3cfcb9f11558}\Root\InventoryApplicationFile\mmcjhaiynh.exe|e3301c0c7c3ed075
BinFileVersion
\REGISTRY\A\{d41951d0-0750-54a2-cf41-3cfcb9f11558}\Root\InventoryApplicationFile\mmcjhaiynh.exe|e3301c0c7c3ed075
BinaryType
\REGISTRY\A\{d41951d0-0750-54a2-cf41-3cfcb9f11558}\Root\InventoryApplicationFile\mmcjhaiynh.exe|e3301c0c7c3ed075
ProductName
\REGISTRY\A\{d41951d0-0750-54a2-cf41-3cfcb9f11558}\Root\InventoryApplicationFile\mmcjhaiynh.exe|e3301c0c7c3ed075
ProductVersion
\REGISTRY\A\{d41951d0-0750-54a2-cf41-3cfcb9f11558}\Root\InventoryApplicationFile\mmcjhaiynh.exe|e3301c0c7c3ed075
LinkDate
\REGISTRY\A\{d41951d0-0750-54a2-cf41-3cfcb9f11558}\Root\InventoryApplicationFile\mmcjhaiynh.exe|e3301c0c7c3ed075
BinProductVersion
\REGISTRY\A\{d41951d0-0750-54a2-cf41-3cfcb9f11558}\Root\InventoryApplicationFile\mmcjhaiynh.exe|e3301c0c7c3ed075
AppxPackageFullName
\REGISTRY\A\{d41951d0-0750-54a2-cf41-3cfcb9f11558}\Root\InventoryApplicationFile\mmcjhaiynh.exe|e3301c0c7c3ed075
AppxPackageRelativeId
\REGISTRY\A\{d41951d0-0750-54a2-cf41-3cfcb9f11558}\Root\InventoryApplicationFile\mmcjhaiynh.exe|e3301c0c7c3ed075
Size
\REGISTRY\A\{d41951d0-0750-54a2-cf41-3cfcb9f11558}\Root\InventoryApplicationFile\mmcjhaiynh.exe|e3301c0c7c3ed075
Language
\REGISTRY\A\{d41951d0-0750-54a2-cf41-3cfcb9f11558}\Root\InventoryApplicationFile\mmcjhaiynh.exe|e3301c0c7c3ed075
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
DC7000
heap
page read and write
malicious
87D000
unkown
page read and write
malicious
D0E000
stack
page read and write
873000
unkown
page readonly
7D0000
heap
page read and write
F2E000
heap
page read and write
B60000
heap
page read and write
BBE000
stack
page read and write
E23000
heap
page read and write
DB0000
heap
page read and write
4E2000
remote allocation
page execute and read and write
1AA2E000
stack
page read and write
F36000
heap
page read and write
D4E000
stack
page read and write
1AC6F000
stack
page read and write
F20000
heap
page read and write
873000
unkown
page readonly
AFF000
stack
page read and write
75C000
stack
page read and write
C4E000
stack
page read and write
C90000
heap
page read and write
8CC000
unkown
page readonly
8CC000
unkown
page readonly
851000
unkown
page execute read
1ACCE000
stack
page read and write
C0E000
stack
page read and write
1AB2D000
stack
page read and write
1AB6E000
stack
page read and write
64A000
remote allocation
page execute and read and write
1A92F000
stack
page read and write
4B1000
remote allocation
page execute and read and write
65C000
remote allocation
page execute and read and write
B70000
heap
page read and write
1ADCE000
stack
page read and write
87D000
unkown
page write copy
851000
unkown
page execute read
CC0000
heap
page read and write
850000
unkown
page readonly
DF4000
heap
page read and write
D8E000
stack
page read and write
7C0000
heap
page read and write
CC5000
heap
page read and write
8CB000
unkown
page read and write
EFD000
stack
page read and write
11EF000
stack
page read and write
132F000
stack
page read and write
B0C000
stack
page read and write
285F000
stack
page read and write
FBF000
stack
page read and write
8CA000
unkown
page execute and read and write
122E000
stack
page read and write
E09000
heap
page read and write
F2A000
heap
page read and write
4BD000
remote allocation
page execute and read and write
DC0000
heap
page read and write
850000
unkown
page readonly
BF0000
heap
page read and write
DB4000
heap
page read and write
AF5000
stack
page read and write
There are 50 hidden memdumps, click here to show them.