IOC Report
UmJMWJPQ9h.exe

loading gif

Files

File Path
Type
Category
Malicious
UmJMWJPQ9h.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_UmJMWJPQ9h.exe_8c7d42cea5357129cc03c9ecb622c79ad25e318_286f4e9b_64a9bd90-967b-40d1-9fa7-3242816991fd\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9B8B.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Apr 21 19:13:17 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA06E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA0CC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\~DF202E41C03DBD0444.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\UmJMWJPQ9h.exe
"C:\Users\user\Desktop\UmJMWJPQ9h.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5680 -s 1200

URLs

Name
IP
Malicious
trusted420.anondns.net
malicious
https://www.google.com
unknown
https://paste.ee/r/tC4AKNU6
unknown
https://paste.ee/5
unknown
https://paste.ee/r/tC4AKns
unknown
https://www.google.com;
unknown
https://paste.ee/
unknown
https://analytics.paste.ee;
unknown
https://paste.ee/r/tC4AK&UN
unknown
https://analytics.paste.ee
unknown
http://upx.sf.net
unknown
https://cdnjs.cloudflare.com
unknown
https://paste.ee/r/tC4AKntAD
unknown
https://cdnjs.cloudflare.com;
unknown
https://paste.ee/r/tC4AK
104.21.84.67
https://secure.gravatar.com
unknown
https://themes.googleusercontent.com
unknown
There are 7 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
paste.ee
104.21.84.67

IPs

IP
Domain
Country
Malicious
104.21.84.67
paste.ee
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{d54e1541-23e8-818d-e7b1-5bce4469a0e5}\Root\InventoryApplicationFile\umjmwjpq9h.exe|b4c8d60990889ec4
ProgramId
\REGISTRY\A\{d54e1541-23e8-818d-e7b1-5bce4469a0e5}\Root\InventoryApplicationFile\umjmwjpq9h.exe|b4c8d60990889ec4
FileId
\REGISTRY\A\{d54e1541-23e8-818d-e7b1-5bce4469a0e5}\Root\InventoryApplicationFile\umjmwjpq9h.exe|b4c8d60990889ec4
LowerCaseLongPath
\REGISTRY\A\{d54e1541-23e8-818d-e7b1-5bce4469a0e5}\Root\InventoryApplicationFile\umjmwjpq9h.exe|b4c8d60990889ec4
LongPathHash
\REGISTRY\A\{d54e1541-23e8-818d-e7b1-5bce4469a0e5}\Root\InventoryApplicationFile\umjmwjpq9h.exe|b4c8d60990889ec4
Name
\REGISTRY\A\{d54e1541-23e8-818d-e7b1-5bce4469a0e5}\Root\InventoryApplicationFile\umjmwjpq9h.exe|b4c8d60990889ec4
OriginalFileName
\REGISTRY\A\{d54e1541-23e8-818d-e7b1-5bce4469a0e5}\Root\InventoryApplicationFile\umjmwjpq9h.exe|b4c8d60990889ec4
Publisher
\REGISTRY\A\{d54e1541-23e8-818d-e7b1-5bce4469a0e5}\Root\InventoryApplicationFile\umjmwjpq9h.exe|b4c8d60990889ec4
Version
\REGISTRY\A\{d54e1541-23e8-818d-e7b1-5bce4469a0e5}\Root\InventoryApplicationFile\umjmwjpq9h.exe|b4c8d60990889ec4
BinFileVersion
\REGISTRY\A\{d54e1541-23e8-818d-e7b1-5bce4469a0e5}\Root\InventoryApplicationFile\umjmwjpq9h.exe|b4c8d60990889ec4
BinaryType
\REGISTRY\A\{d54e1541-23e8-818d-e7b1-5bce4469a0e5}\Root\InventoryApplicationFile\umjmwjpq9h.exe|b4c8d60990889ec4
ProductName
\REGISTRY\A\{d54e1541-23e8-818d-e7b1-5bce4469a0e5}\Root\InventoryApplicationFile\umjmwjpq9h.exe|b4c8d60990889ec4
ProductVersion
\REGISTRY\A\{d54e1541-23e8-818d-e7b1-5bce4469a0e5}\Root\InventoryApplicationFile\umjmwjpq9h.exe|b4c8d60990889ec4
LinkDate
\REGISTRY\A\{d54e1541-23e8-818d-e7b1-5bce4469a0e5}\Root\InventoryApplicationFile\umjmwjpq9h.exe|b4c8d60990889ec4
BinProductVersion
\REGISTRY\A\{d54e1541-23e8-818d-e7b1-5bce4469a0e5}\Root\InventoryApplicationFile\umjmwjpq9h.exe|b4c8d60990889ec4
AppxPackageFullName
\REGISTRY\A\{d54e1541-23e8-818d-e7b1-5bce4469a0e5}\Root\InventoryApplicationFile\umjmwjpq9h.exe|b4c8d60990889ec4
AppxPackageRelativeId
\REGISTRY\A\{d54e1541-23e8-818d-e7b1-5bce4469a0e5}\Root\InventoryApplicationFile\umjmwjpq9h.exe|b4c8d60990889ec4
Size
\REGISTRY\A\{d54e1541-23e8-818d-e7b1-5bce4469a0e5}\Root\InventoryApplicationFile\umjmwjpq9h.exe|b4c8d60990889ec4
Language
\REGISTRY\A\{d54e1541-23e8-818d-e7b1-5bce4469a0e5}\Root\InventoryApplicationFile\umjmwjpq9h.exe|b4c8d60990889ec4
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
850000
heap
page read and write
malicious
16231000
heap
page read and write
16221000
heap
page read and write
695000
unkown
page readonly
2DE0000
trusted library section
page read and write
1648B000
heap
page read and write
87D000
heap
page read and write
412000
unkown
page execute read
161AC000
heap
page read and write
44B000
unkown
page execute read
19A000
stack
page read and write
1642F000
heap
page read and write
16430000
remote allocation
page read and write
2510000
heap
page read and write
861000
heap
page read and write
31F8000
unkown
page read and write
1642E000
heap
page read and write
16220000
heap
page read and write
1646C000
heap
page read and write
400000
unkown
page readonly
8A0000
heap
page read and write
1643A000
heap
page read and write
BDF000
stack
page read and write
2DD0000
heap
page read and write
3207000
unkown
page read and write
16572000
heap
page read and write
834000
heap
page read and write
16169000
heap
page read and write
45E000
unkown
page execute read
16477000
heap
page read and write
16430000
remote allocation
page read and write
6C7000
unkown
page readonly
16563000
heap
page read and write
81A000
heap
page read and write
16137000
heap
page read and write
670000
unkown
page read and write
31F1000
unkown
page read and write
709000
unkown
page readonly
2517000
heap
page read and write
164CC000
heap
page read and write
326D000
unkown
page read and write
16440000
heap
page read and write
1627C000
heap
page read and write
1647F000
heap
page read and write
2D9E000
stack
page read and write
673000
unkown
page readonly
17FFF000
stack
page read and write
81E000
heap
page read and write
864000
heap
page read and write
16510000
heap
page read and write
755000
heap
page read and write
1654C000
heap
page read and write
16121000
heap
page read and write
7DE000
stack
page read and write
6A4000
unkown
page readonly
673000
unkown
page readonly
2520000
trusted library allocation
page read and write
31E0000
unkown
page read and write
24E0000
heap
page read and write
44B000
unkown
page execute read
401000
unkown
page execute read
161C7000
heap
page read and write
1646E000
stack
page read and write
6D9000
unkown
page readonly
428000
unkown
page execute read
16169000
heap
page read and write
16195000
heap
page read and write
16237000
heap
page read and write
48D000
unkown
page execute read
61F000
unkown
page execute read
16552000
heap
page read and write
164AE000
heap
page read and write
61F000
unkown
page execute read
428000
unkown
page execute read
400000
unkown
page readonly
164E3000
heap
page read and write
864000
heap
page read and write
164B5000
heap
page read and write
48D000
unkown
page execute read
2390000
heap
page read and write
750000
heap
page read and write
1617C000
heap
page read and write
16454000
heap
page read and write
8B2000
heap
page read and write
16455000
heap
page read and write
17EFE000
stack
page read and write
164ED000
heap
page read and write
1643F000
heap
page read and write
161A4000
heap
page read and write
68E000
unkown
page readonly
1646F000
heap
page read and write
16430000
remote allocation
page read and write
16120000
heap
page read and write
164F2000
heap
page read and write
740000
trusted library allocation
page execute read
ADF000
stack
page read and write
16434000
heap
page read and write
1643D000
heap
page read and write
17DBE000
stack
page read and write
79E000
stack
page read and write
2DD9000
heap
page read and write
164CC000
heap
page read and write
1813F000
stack
page read and write
16269000
heap
page read and write
8C7000
heap
page read and write
164C7000
heap
page read and write
800000
heap
page read and write
323D000
unkown
page read and write
164C6000
heap
page read and write
17EBF000
stack
page read and write
16511000
heap
page read and write
16246000
heap
page read and write
6C7000
unkown
page readonly
16437000
heap
page read and write
16131000
heap
page read and write
412000
unkown
page execute read
810000
heap
page read and write
16528000
heap
page read and write
695000
unkown
page readonly
23D0000
heap
page read and write
2514000
heap
page read and write
16523000
heap
page read and write
16137000
heap
page read and write
1803E000
stack
page read and write
16423000
heap
page read and write
16478000
heap
page read and write
1656F000
stack
page read and write
2C60000
heap
page read and write
85F000
heap
page read and write
419000
unkown
page execute read
161DA000
heap
page read and write
2DE5000
trusted library section
page read and write
16445000
heap
page read and write
16146000
heap
page read and write
1619D000
heap
page read and write
709000
unkown
page readonly
16197000
heap
page read and write
161E2000
heap
page read and write
45E000
unkown
page execute read
17D7E000
stack
page read and write
1648A000
heap
page read and write
419000
unkown
page execute read
164D8000
heap
page read and write
16515000
heap
page read and write
85E000
heap
page read and write
6D9000
unkown
page readonly
16482000
heap
page read and write
1644C000
heap
page read and write
2490000
heap
page read and write
1617C000
heap
page read and write
2500000
heap
page read and write
17C7D000
stack
page read and write
710000
heap
page read and write
164DE000
heap
page read and write
898000
heap
page read and write
1817E000
stack
page read and write
830000
heap
page read and write
2513000
heap
page read and write
872000
heap
page read and write
16446000
heap
page read and write
16146000
heap
page read and write
1618F000
heap
page read and write
161CF000
heap
page read and write
164FE000
heap
page read and write
66B000
unkown
page read and write
16121000
heap
page read and write
2517000
heap
page read and write
16449000
heap
page read and write
16595000
heap
page read and write
68E000
unkown
page readonly
164DB000
heap
page read and write
165A8000
heap
page read and write
401000
unkown
page execute read
16131000
heap
page read and write
24DC000
stack
page read and write
864000
heap
page read and write
2504000
heap
page read and write
861000
heap
page read and write
164DD000
heap
page read and write
9A000
stack
page read and write
1655D000
heap
page read and write
1827F000
stack
page read and write
322A000
unkown
page read and write
6A4000
unkown
page readonly
1F0000
heap
page read and write
16426000
heap
page read and write
There are 176 hidden memdumps, click here to show them.