IOC Report
uxnkmJzTjK.exe

loading gif

Files

File Path
Type
Category
Malicious
uxnkmJzTjK.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_uxnkmJzTjK.exe_2758b5a6727ed414df83f22680b3fca6bee45aca_7d3e508a_21fb4e6d-b425-4a5d-96c5-dcfe67d27b2c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD2A4.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Oct 28 16:37:25 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD3CE.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD3FE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\uxnkmJzTjK.exe
"C:\Users\user\Desktop\uxnkmJzTjK.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6444 -s 1336

URLs

Name
IP
Malicious
http://194.15.46.65
unknown
malicious
http://194.15.46.65/7e57db3b864b30f1.php
malicious
http://194.15.46.65/
194.15.46.65
malicious
http://upx.sf.net
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown

Domains

Name
IP
Malicious
15.164.165.52.in-addr.arpa
unknown
malicious

IPs

IP
Domain
Country
Malicious
194.15.46.65
unknown
unknown
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
ProgramId
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
FileId
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
LowerCaseLongPath
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
LongPathHash
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
Name
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
OriginalFileName
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
Publisher
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
Version
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
BinFileVersion
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
BinaryType
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
ProductName
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
ProductVersion
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
LinkDate
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
BinProductVersion
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
AppxPackageFullName
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
AppxPackageRelativeId
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
Size
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
Language
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2570000
direct allocation
page read and write
malicious
514000
unkown
page execute and read and write
malicious
7CE000
heap
page read and write
malicious
526000
unkown
page execute and read and write
malicious
2490000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
1AC9E000
stack
page read and write
6F0000
heap
page read and write
26AE000
stack
page read and write
495000
unkown
page write copy
6EB000
unkown
page readonly
1A90E000
stack
page read and write
1A7AF000
stack
page read and write
4EE000
unkown
page execute and read and write
809000
heap
page read and write
833000
heap
page read and write
511000
unkown
page execute and read and write
1ADFF000
stack
page read and write
760000
heap
page read and write
194000
stack
page read and write
1AA0F000
stack
page read and write
73E000
stack
page read and write
1ACFE000
stack
page read and write
401000
unkown
page execute read
4E6000
unkown
page execute and read and write
4A7000
unkown
page readonly
2480000
heap
page read and write
765000
heap
page read and write
19E000
stack
page read and write
817000
heap
page read and write
23E0000
heap
page read and write
41E000
unkown
page execute read
7AE000
stack
page read and write
1AE60000
heap
page read and write
26C0000
heap
page read and write
6E8000
unkown
page execute and read and write
767000
heap
page read and write
1A8AF000
stack
page read and write
400000
unkown
page readonly
243E000
stack
page read and write
7C0000
heap
page read and write
266F000
stack
page read and write
1AA4E000
stack
page read and write
9C000
stack
page read and write
26D4000
heap
page read and write
247E000
stack
page read and write
B8E000
stack
page read and write
1AB9E000
stack
page read and write
806000
heap
page read and write
26D0000
heap
page read and write
1AF60000
trusted library allocation
page read and write
A8F000
stack
page read and write
1AE61000
heap
page read and write
81D000
heap
page read and write
51B000
unkown
page execute and read and write
7CA000
heap
page read and write
1AB4D000
stack
page read and write
2330000
direct allocation
page execute and read and write
1F0000
heap
page read and write
There are 49 hidden memdumps, click here to show them.