IOC Report
8qM4hI4CL6.exe

loading gif

Files

File Path
Type
Category
Malicious
8qM4hI4CL6.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_8qM4hI4CL6.exe_72fc5f828691cf56e05ccd598eeab96bd79ce35_5a52f46c_55db9b82-1f76-4ffe-9ba3-dba7cf1ce500\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5C8E.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Apr 23 23:29:02 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5CFD.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5D3C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\8qM4hI4CL6.exe
"C:\Users\user\Desktop\8qM4hI4CL6.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 332

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{7e8fb97a-3ec7-44e3-3fb6-273aa44d1e33}\Root\InventoryApplicationFile\8qm4hi4cl6.exe|53822f0d057fc1e7
ProgramId
\REGISTRY\A\{7e8fb97a-3ec7-44e3-3fb6-273aa44d1e33}\Root\InventoryApplicationFile\8qm4hi4cl6.exe|53822f0d057fc1e7
FileId
\REGISTRY\A\{7e8fb97a-3ec7-44e3-3fb6-273aa44d1e33}\Root\InventoryApplicationFile\8qm4hi4cl6.exe|53822f0d057fc1e7
LowerCaseLongPath
\REGISTRY\A\{7e8fb97a-3ec7-44e3-3fb6-273aa44d1e33}\Root\InventoryApplicationFile\8qm4hi4cl6.exe|53822f0d057fc1e7
LongPathHash
\REGISTRY\A\{7e8fb97a-3ec7-44e3-3fb6-273aa44d1e33}\Root\InventoryApplicationFile\8qm4hi4cl6.exe|53822f0d057fc1e7
Name
\REGISTRY\A\{7e8fb97a-3ec7-44e3-3fb6-273aa44d1e33}\Root\InventoryApplicationFile\8qm4hi4cl6.exe|53822f0d057fc1e7
OriginalFileName
\REGISTRY\A\{7e8fb97a-3ec7-44e3-3fb6-273aa44d1e33}\Root\InventoryApplicationFile\8qm4hi4cl6.exe|53822f0d057fc1e7
Publisher
\REGISTRY\A\{7e8fb97a-3ec7-44e3-3fb6-273aa44d1e33}\Root\InventoryApplicationFile\8qm4hi4cl6.exe|53822f0d057fc1e7
Version
\REGISTRY\A\{7e8fb97a-3ec7-44e3-3fb6-273aa44d1e33}\Root\InventoryApplicationFile\8qm4hi4cl6.exe|53822f0d057fc1e7
BinFileVersion
\REGISTRY\A\{7e8fb97a-3ec7-44e3-3fb6-273aa44d1e33}\Root\InventoryApplicationFile\8qm4hi4cl6.exe|53822f0d057fc1e7
BinaryType
\REGISTRY\A\{7e8fb97a-3ec7-44e3-3fb6-273aa44d1e33}\Root\InventoryApplicationFile\8qm4hi4cl6.exe|53822f0d057fc1e7
ProductName
\REGISTRY\A\{7e8fb97a-3ec7-44e3-3fb6-273aa44d1e33}\Root\InventoryApplicationFile\8qm4hi4cl6.exe|53822f0d057fc1e7
ProductVersion
\REGISTRY\A\{7e8fb97a-3ec7-44e3-3fb6-273aa44d1e33}\Root\InventoryApplicationFile\8qm4hi4cl6.exe|53822f0d057fc1e7
LinkDate
\REGISTRY\A\{7e8fb97a-3ec7-44e3-3fb6-273aa44d1e33}\Root\InventoryApplicationFile\8qm4hi4cl6.exe|53822f0d057fc1e7
BinProductVersion
\REGISTRY\A\{7e8fb97a-3ec7-44e3-3fb6-273aa44d1e33}\Root\InventoryApplicationFile\8qm4hi4cl6.exe|53822f0d057fc1e7
AppxPackageFullName
\REGISTRY\A\{7e8fb97a-3ec7-44e3-3fb6-273aa44d1e33}\Root\InventoryApplicationFile\8qm4hi4cl6.exe|53822f0d057fc1e7
AppxPackageRelativeId
\REGISTRY\A\{7e8fb97a-3ec7-44e3-3fb6-273aa44d1e33}\Root\InventoryApplicationFile\8qm4hi4cl6.exe|53822f0d057fc1e7
Size
\REGISTRY\A\{7e8fb97a-3ec7-44e3-3fb6-273aa44d1e33}\Root\InventoryApplicationFile\8qm4hi4cl6.exe|53822f0d057fc1e7
Language
\REGISTRY\A\{7e8fb97a-3ec7-44e3-3fb6-273aa44d1e33}\Root\InventoryApplicationFile\8qm4hi4cl6.exe|53822f0d057fc1e7
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
500000
heap
page read and write
40F000
unkown
page write copy
413000
unkown
page execute and write copy
401000
unkown
page write copy
411000
unkown
page write copy
5F0000
heap
page read and write
40F000
unkown
page write copy
411000
unkown
page write copy
5FE000
heap
page read and write
400000
unkown
page readonly
19D000
stack
page read and write
9C000
stack
page read and write
5FA000
heap
page read and write
54E000
stack
page read and write
401000
unkown
page write copy
1F0000
heap
page read and write
7EF000
stack
page read and write
59E000
stack
page read and write
8EF000
stack
page read and write
550000
heap
page read and write
413000
unkown
page execute and read and write
400000
unkown
page readonly
There are 12 hidden memdumps, click here to show them.