IOC Report
usCyF4QZGn.exe

loading gif

Files

File Path
Type
Category
Malicious
usCyF4QZGn.exe
MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_usCyF4QZGn.exe_101e80a796c51efa9dc05378b01e34e1f7da82_13a83583_b0e90792-80de-4f26-8816-3047cdb283ae\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9944.tmp.dmp
Mini DuMP crash report, 14 streams, Sun May 26 00:32:01 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9983.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER99B3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\usCyF4QZGn.exe
"C:\Users\user\Desktop\usCyF4QZGn.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5440 -s 236

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{ffd8cd14-71f9-f1e3-99ab-08970728c2d7}\Root\InventoryApplicationFile\uscyf4qzgn.exe|26cd1f27a4387399
ProgramId
\REGISTRY\A\{ffd8cd14-71f9-f1e3-99ab-08970728c2d7}\Root\InventoryApplicationFile\uscyf4qzgn.exe|26cd1f27a4387399
FileId
\REGISTRY\A\{ffd8cd14-71f9-f1e3-99ab-08970728c2d7}\Root\InventoryApplicationFile\uscyf4qzgn.exe|26cd1f27a4387399
LowerCaseLongPath
\REGISTRY\A\{ffd8cd14-71f9-f1e3-99ab-08970728c2d7}\Root\InventoryApplicationFile\uscyf4qzgn.exe|26cd1f27a4387399
LongPathHash
\REGISTRY\A\{ffd8cd14-71f9-f1e3-99ab-08970728c2d7}\Root\InventoryApplicationFile\uscyf4qzgn.exe|26cd1f27a4387399
Name
\REGISTRY\A\{ffd8cd14-71f9-f1e3-99ab-08970728c2d7}\Root\InventoryApplicationFile\uscyf4qzgn.exe|26cd1f27a4387399
OriginalFileName
\REGISTRY\A\{ffd8cd14-71f9-f1e3-99ab-08970728c2d7}\Root\InventoryApplicationFile\uscyf4qzgn.exe|26cd1f27a4387399
Publisher
\REGISTRY\A\{ffd8cd14-71f9-f1e3-99ab-08970728c2d7}\Root\InventoryApplicationFile\uscyf4qzgn.exe|26cd1f27a4387399
Version
\REGISTRY\A\{ffd8cd14-71f9-f1e3-99ab-08970728c2d7}\Root\InventoryApplicationFile\uscyf4qzgn.exe|26cd1f27a4387399
BinFileVersion
\REGISTRY\A\{ffd8cd14-71f9-f1e3-99ab-08970728c2d7}\Root\InventoryApplicationFile\uscyf4qzgn.exe|26cd1f27a4387399
BinaryType
\REGISTRY\A\{ffd8cd14-71f9-f1e3-99ab-08970728c2d7}\Root\InventoryApplicationFile\uscyf4qzgn.exe|26cd1f27a4387399
ProductName
\REGISTRY\A\{ffd8cd14-71f9-f1e3-99ab-08970728c2d7}\Root\InventoryApplicationFile\uscyf4qzgn.exe|26cd1f27a4387399
ProductVersion
\REGISTRY\A\{ffd8cd14-71f9-f1e3-99ab-08970728c2d7}\Root\InventoryApplicationFile\uscyf4qzgn.exe|26cd1f27a4387399
LinkDate
\REGISTRY\A\{ffd8cd14-71f9-f1e3-99ab-08970728c2d7}\Root\InventoryApplicationFile\uscyf4qzgn.exe|26cd1f27a4387399
BinProductVersion
\REGISTRY\A\{ffd8cd14-71f9-f1e3-99ab-08970728c2d7}\Root\InventoryApplicationFile\uscyf4qzgn.exe|26cd1f27a4387399
AppxPackageFullName
\REGISTRY\A\{ffd8cd14-71f9-f1e3-99ab-08970728c2d7}\Root\InventoryApplicationFile\uscyf4qzgn.exe|26cd1f27a4387399
AppxPackageRelativeId
\REGISTRY\A\{ffd8cd14-71f9-f1e3-99ab-08970728c2d7}\Root\InventoryApplicationFile\uscyf4qzgn.exe|26cd1f27a4387399
Size
\REGISTRY\A\{ffd8cd14-71f9-f1e3-99ab-08970728c2d7}\Root\InventoryApplicationFile\uscyf4qzgn.exe|26cd1f27a4387399
Language
\REGISTRY\A\{ffd8cd14-71f9-f1e3-99ab-08970728c2d7}\Root\InventoryApplicationFile\uscyf4qzgn.exe|26cd1f27a4387399
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
411000
unkown
page readonly
51A000
heap
page read and write
400000
unkown
page readonly
40F000
unkown
page execute and write copy
40F000
unkown
page execute and read and write
510000
heap
page read and write
411000
unkown
page readonly
400000
unkown
page readonly
1F0000
heap
page read and write
51E000
heap
page read and write
430000
heap
page read and write
19D000
stack
page read and write
9D000
stack
page read and write
4C0000
heap
page read and write
There are 4 hidden memdumps, click here to show them.