Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
uxnkmJzTjK.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_uxnkmJzTjK.exe_2758b5a6727ed414df83f22680b3fca6bee45aca_7d3e508a_21fb4e6d-b425-4a5d-96c5-dcfe67d27b2c\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD2A4.tmp.dmp
|
Mini DuMP crash report, 14 streams, Mon Oct 28 16:37:25 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD3CE.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD3FE.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\uxnkmJzTjK.exe
|
"C:\Users\user\Desktop\uxnkmJzTjK.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6444 -s 1336
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://194.15.46.65
|
unknown
|
||
http://194.15.46.65/7e57db3b864b30f1.php
|
|||
http://194.15.46.65/
|
194.15.46.65
|
||
http://upx.sf.net
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
15.164.165.52.in-addr.arpa
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
194.15.46.65
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
|
ProgramId
|
||
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
|
FileId
|
||
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
|
LowerCaseLongPath
|
||
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
|
LongPathHash
|
||
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
|
Name
|
||
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
|
OriginalFileName
|
||
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
|
Publisher
|
||
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
|
Version
|
||
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
|
BinFileVersion
|
||
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
|
BinaryType
|
||
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
|
ProductName
|
||
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
|
ProductVersion
|
||
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
|
LinkDate
|
||
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
|
BinProductVersion
|
||
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
|
AppxPackageFullName
|
||
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
|
Size
|
||
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
|
Language
|
||
\REGISTRY\A\{7770b5cc-4f33-db3a-db49-4d400bc26e93}\Root\InventoryApplicationFile\uxnkmjztjk.exe|82b52e41624c0a2
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2570000
|
direct allocation
|
page read and write
|
||
514000
|
unkown
|
page execute and read and write
|
||
7CE000
|
heap
|
page read and write
|
||
526000
|
unkown
|
page execute and read and write
|
||
2490000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
1AC9E000
|
stack
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
26AE000
|
stack
|
page read and write
|
||
495000
|
unkown
|
page write copy
|
||
6EB000
|
unkown
|
page readonly
|
||
1A90E000
|
stack
|
page read and write
|
||
1A7AF000
|
stack
|
page read and write
|
||
4EE000
|
unkown
|
page execute and read and write
|
||
809000
|
heap
|
page read and write
|
||
833000
|
heap
|
page read and write
|
||
511000
|
unkown
|
page execute and read and write
|
||
1ADFF000
|
stack
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
194000
|
stack
|
page read and write
|
||
1AA0F000
|
stack
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
1ACFE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4E6000
|
unkown
|
page execute and read and write
|
||
4A7000
|
unkown
|
page readonly
|
||
2480000
|
heap
|
page read and write
|
||
765000
|
heap
|
page read and write
|
||
19E000
|
stack
|
page read and write
|
||
817000
|
heap
|
page read and write
|
||
23E0000
|
heap
|
page read and write
|
||
41E000
|
unkown
|
page execute read
|
||
7AE000
|
stack
|
page read and write
|
||
1AE60000
|
heap
|
page read and write
|
||
26C0000
|
heap
|
page read and write
|
||
6E8000
|
unkown
|
page execute and read and write
|
||
767000
|
heap
|
page read and write
|
||
1A8AF000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
243E000
|
stack
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
266F000
|
stack
|
page read and write
|
||
1AA4E000
|
stack
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
26D4000
|
heap
|
page read and write
|
||
247E000
|
stack
|
page read and write
|
||
B8E000
|
stack
|
page read and write
|
||
1AB9E000
|
stack
|
page read and write
|
||
806000
|
heap
|
page read and write
|
||
26D0000
|
heap
|
page read and write
|
||
1AF60000
|
trusted library allocation
|
page read and write
|
||
A8F000
|
stack
|
page read and write
|
||
1AE61000
|
heap
|
page read and write
|
||
81D000
|
heap
|
page read and write
|
||
51B000
|
unkown
|
page execute and read and write
|
||
7CA000
|
heap
|
page read and write
|
||
1AB4D000
|
stack
|
page read and write
|
||
2330000
|
direct allocation
|
page execute and read and write
|
||
1F0000
|
heap
|
page read and write
|
There are 49 hidden memdumps, click here to show them.