IOC Report
uwa78qqv0x.exe

loading gif

Files

File Path
Type
Category
Malicious
uwa78qqv0x.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_uwa78qqv0x.exe_48a44e25356dcac01dc63e486932e2a2d4eecb3c_7c1cd271_5544698b-a6f2-4784-a8f8-d05a9453646b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2A54.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Dec 23 06:21:10 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2B3F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2B6F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\uwa78qqv0x.exe
"C:\Users\user\Desktop\uwa78qqv0x.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7616 -s 1136

URLs

Name
IP
Malicious
https://curl.se/docs/hsts.html
unknown
http://html4/loose.dtd
unknown
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851http://home.fivetk5ht.top/zldPRFrmVFHTtKntGp
unknown
https://httpbin.org/ipbefore
unknown
https://curl.se/docs/http-cookies.html
unknown
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851
unknown
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv17345798516963
unknown
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv17
unknown
http://upx.sf.net
unknown
https://curl.se/docs/alt-svc.html
unknown
http://.css
unknown
http://.jpg
unknown
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851l
unknown
https://httpbin.org/ip
98.85.100.80
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
httpbin.org
98.85.100.80
home.fivetk5ht.top
unknown

IPs

IP
Domain
Country
Malicious
98.85.100.80
httpbin.org
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{712b4126-c06f-27ba-998f-d4ae2da3827b}\Root\InventoryApplicationFile\uwa78qqv0x.exe|f72d796f29c34d9b
ProgramId
malicious
\REGISTRY\A\{712b4126-c06f-27ba-998f-d4ae2da3827b}\Root\InventoryApplicationFile\uwa78qqv0x.exe|f72d796f29c34d9b
FileId
malicious
\REGISTRY\A\{712b4126-c06f-27ba-998f-d4ae2da3827b}\Root\InventoryApplicationFile\uwa78qqv0x.exe|f72d796f29c34d9b
LowerCaseLongPath
malicious
\REGISTRY\A\{712b4126-c06f-27ba-998f-d4ae2da3827b}\Root\InventoryApplicationFile\uwa78qqv0x.exe|f72d796f29c34d9b
LongPathHash
malicious
\REGISTRY\A\{712b4126-c06f-27ba-998f-d4ae2da3827b}\Root\InventoryApplicationFile\uwa78qqv0x.exe|f72d796f29c34d9b
Name
malicious
\REGISTRY\A\{712b4126-c06f-27ba-998f-d4ae2da3827b}\Root\InventoryApplicationFile\uwa78qqv0x.exe|f72d796f29c34d9b
OriginalFileName
malicious
\REGISTRY\A\{712b4126-c06f-27ba-998f-d4ae2da3827b}\Root\InventoryApplicationFile\uwa78qqv0x.exe|f72d796f29c34d9b
Publisher
malicious
\REGISTRY\A\{712b4126-c06f-27ba-998f-d4ae2da3827b}\Root\InventoryApplicationFile\uwa78qqv0x.exe|f72d796f29c34d9b
Version
malicious
\REGISTRY\A\{712b4126-c06f-27ba-998f-d4ae2da3827b}\Root\InventoryApplicationFile\uwa78qqv0x.exe|f72d796f29c34d9b
BinFileVersion
malicious
\REGISTRY\A\{712b4126-c06f-27ba-998f-d4ae2da3827b}\Root\InventoryApplicationFile\uwa78qqv0x.exe|f72d796f29c34d9b
BinaryType
malicious
\REGISTRY\A\{712b4126-c06f-27ba-998f-d4ae2da3827b}\Root\InventoryApplicationFile\uwa78qqv0x.exe|f72d796f29c34d9b
ProductName
malicious
\REGISTRY\A\{712b4126-c06f-27ba-998f-d4ae2da3827b}\Root\InventoryApplicationFile\uwa78qqv0x.exe|f72d796f29c34d9b
ProductVersion
malicious
\REGISTRY\A\{712b4126-c06f-27ba-998f-d4ae2da3827b}\Root\InventoryApplicationFile\uwa78qqv0x.exe|f72d796f29c34d9b
LinkDate
malicious
\REGISTRY\A\{712b4126-c06f-27ba-998f-d4ae2da3827b}\Root\InventoryApplicationFile\uwa78qqv0x.exe|f72d796f29c34d9b
BinProductVersion
malicious
\REGISTRY\A\{712b4126-c06f-27ba-998f-d4ae2da3827b}\Root\InventoryApplicationFile\uwa78qqv0x.exe|f72d796f29c34d9b
AppxPackageFullName
malicious
\REGISTRY\A\{712b4126-c06f-27ba-998f-d4ae2da3827b}\Root\InventoryApplicationFile\uwa78qqv0x.exe|f72d796f29c34d9b
AppxPackageRelativeId
malicious
\REGISTRY\A\{712b4126-c06f-27ba-998f-d4ae2da3827b}\Root\InventoryApplicationFile\uwa78qqv0x.exe|f72d796f29c34d9b
Size
malicious
\REGISTRY\A\{712b4126-c06f-27ba-998f-d4ae2da3827b}\Root\InventoryApplicationFile\uwa78qqv0x.exe|f72d796f29c34d9b
Language
malicious
\REGISTRY\A\{712b4126-c06f-27ba-998f-d4ae2da3827b}\Root\InventoryApplicationFile\uwa78qqv0x.exe|f72d796f29c34d9b
Usn
malicious
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
69A1000
heap
page read and write
69A1000
heap
page read and write
3410000
heap
page read and write
69A1000
heap
page read and write
60DE000
stack
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
339E000
stack
page read and write
57DE000
stack
page read and write
7150000
direct allocation
page execute and read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
7080000
direct allocation
page execute and read and write
69A1000
heap
page read and write
990000
direct allocation
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
990000
direct allocation
page read and write
559E000
stack
page read and write
71C0000
direct allocation
page execute and read and write
990000
direct allocation
page read and write
70B0000
direct allocation
page execute and read and write
70B0000
direct allocation
page execute and read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
59DF000
stack
page read and write
1B76000
unkown
page execute and read and write
69A1000
heap
page read and write
A2D000
heap
page read and write
69A1000
heap
page read and write
6DE0000
trusted library allocation
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
7160000
direct allocation
page execute and read and write
69A1000
heap
page read and write
1626000
unkown
page write copy
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
7130000
direct allocation
page execute and read and write
69A1000
heap
page read and write
A36000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
70B0000
direct allocation
page execute and read and write
70B0000
direct allocation
page execute and read and write
69A1000
heap
page read and write
7140000
direct allocation
page execute and read and write
69A1000
heap
page read and write
7570000
direct allocation
page read and write
69A1000
heap
page read and write
6DE0000
trusted library allocation
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
3F1E000
stack
page read and write
A37000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
511E000
stack
page read and write
69A1000
heap
page read and write
A56000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
CDF000
stack
page read and write
69A1000
heap
page read and write
70B0000
direct allocation
page execute and read and write
69A1000
heap
page read and write
890000
heap
page read and write
5E5F000
stack
page read and write
69A1000
heap
page read and write
6E20000
direct allocation
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
70B0000
direct allocation
page execute and read and write
7357000
heap
page read and write
740C000
direct allocation
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
70B0000
direct allocation
page execute and read and write
4A5E000
stack
page read and write
6E6C000
stack
page read and write
69A1000
heap
page read and write
990000
direct allocation
page read and write
7416000
direct allocation
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
A56000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
70A0000
direct allocation
page execute and read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
A60000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
990000
direct allocation
page read and write
7190000
direct allocation
page execute and read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
7170000
direct allocation
page execute and read and write
69A1000
heap
page read and write
651F000
stack
page read and write
70B0000
direct allocation
page execute and read and write
69A1000
heap
page read and write
19BA000
unkown
page execute and read and write
69A1000
heap
page read and write
18CB000
unkown
page execute and read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
6AA0000
trusted library allocation
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
3CDE000
stack
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
A36000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
70B0000
direct allocation
page execute and read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
33E0000
heap
page read and write
69A1000
heap
page read and write
7090000
direct allocation
page execute and read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
4EDE000
stack
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
361F000
stack
page read and write
69A1000
heap
page read and write
70E0000
direct allocation
page execute and read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
7120000
direct allocation
page execute and read and write
69A1000
heap
page read and write
3A5F000
stack
page read and write
5C5E000
stack
page read and write
18D0000
unkown
page execute and read and write
69A1000
heap
page read and write
71A0000
direct allocation
page execute and read and write
4E9F000
stack
page read and write
6E20000
direct allocation
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
679E000
stack
page read and write
69A1000
heap
page read and write
895000
heap
page read and write
990000
direct allocation
page read and write
7242000
heap
page read and write
70B0000
direct allocation
page execute and read and write
69A1000
heap
page read and write
70B0000
direct allocation
page execute and read and write
69A1000
heap
page read and write
EE0000
unkown
page readonly
A4D000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
385E000
stack
page read and write
A40000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
70C0000
direct allocation
page execute and read and write
EE1000
unkown
page execute and write copy
69A1000
heap
page read and write
69A1000
heap
page read and write
1B78000
unkown
page execute and write copy
69A1000
heap
page read and write
69A1000
heap
page read and write
ADE000
stack
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
840000
heap
page read and write
71D1000
heap
page read and write
990000
direct allocation
page read and write
69A1000
heap
page read and write
3A9E000
stack
page read and write
69A1000
heap
page read and write
EE1000
unkown
page execute and read and write
1623000
unkown
page execute and read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
A44000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
19BB000
unkown
page execute and write copy
7180000
direct allocation
page execute and read and write
70B0000
direct allocation
page execute and read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
75BA000
heap
page read and write
69A1000
heap
page read and write
7243000
heap
page read and write
69A1000
heap
page read and write
6E30000
direct allocation
page read and write
555F000
stack
page read and write
69A1000
heap
page read and write
70B0000
direct allocation
page execute and read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
9AA000
heap
page read and write
990000
direct allocation
page read and write
14BD000
unkown
page execute and read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
70B0000
direct allocation
page execute and read and write
609F000
stack
page read and write
5C1F000
stack
page read and write
990000
direct allocation
page read and write
69A1000
heap
page read and write
A44000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
19A3000
unkown
page execute and read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
4C5F000
stack
page read and write
69A1000
heap
page read and write
706F000
stack
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
A40000
heap
page read and write
47DF000
stack
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
990000
direct allocation
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
699F000
stack
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
655E000
stack
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
335E000
stack
page read and write
439E000
stack
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
631E000
stack
page read and write
EE0000
unkown
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
535E000
stack
page read and write
70B0000
direct allocation
page execute and read and write
A30000
heap
page read and write
71EF000
heap
page read and write
6DE0000
trusted library allocation
page read and write
75B0000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
70B0000
direct allocation
page execute and read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
7430000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
70B0000
direct allocation
page execute and read and write
69A1000
heap
page read and write
70B0000
direct allocation
page execute and read and write
411F000
stack
page read and write
69A1000
heap
page read and write
50DF000
stack
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
3EDF000
stack
page read and write
69A1000
heap
page read and write
315E000
stack
page read and write
69A1000
heap
page read and write
71B0000
direct allocation
page execute and read and write
7572000
direct allocation
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
675F000
stack
page read and write
69A1000
heap
page read and write
7410000
heap
page read and write
33DB000
stack
page read and write
45DE000
stack
page read and write
3C9F000
stack
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
70B0000
direct allocation
page execute and read and write
69A1000
heap
page read and write
990000
direct allocation
page read and write
69A1000
heap
page read and write
17B5000
unkown
page execute and read and write
1621000
unkown
page execute and read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
7FB000
stack
page read and write
69A1000
heap
page read and write
A5A000
heap
page read and write
381F000
stack
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
4C9E000
stack
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
980000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
990000
direct allocation
page read and write
69A1000
heap
page read and write
4A1F000
stack
page read and write
69A1000
heap
page read and write
69A0000
heap
page read and write
69A1000
heap
page read and write
7100000
direct allocation
page execute and read and write
69A1000
heap
page read and write
A44000
heap
page read and write
415E000
stack
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
531F000
stack
page read and write
6E20000
direct allocation
page read and write
69A1000
heap
page read and write
1628000
unkown
page execute and read and write
1626000
unkown
page read and write
69A1000
heap
page read and write
19BA000
unkown
page execute and write copy
990000
direct allocation
page read and write
69A1000
heap
page read and write
A54000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
70B0000
direct allocation
page execute and read and write
7CCE000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
70B0000
direct allocation
page execute and read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
A3D000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
9A0000
heap
page read and write
459F000
stack
page read and write
19AD000
unkown
page execute and read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
A40000
heap
page read and write
435F000
stack
page read and write
69A1000
heap
page read and write
579F000
stack
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
481E000
stack
page read and write
70F0000
direct allocation
page execute and read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
62DF000
stack
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
70D0000
direct allocation
page execute and read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
70B0000
direct allocation
page execute and read and write
7110000
direct allocation
page execute and read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
71D0000
heap
page read and write
69A1000
heap
page read and write
70B0000
direct allocation
page execute and read and write
3417000
heap
page read and write
990000
direct allocation
page read and write
5E9E000
stack
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
7421000
heap
page read and write
7420000
heap
page read and write
69A1000
heap
page read and write
850000
heap
page read and write
5A1E000
stack
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
70B0000
direct allocation
page execute and read and write
69A1000
heap
page read and write
9AE000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
3DB000
stack
page read and write
A0A000
heap
page read and write
69A1000
heap
page read and write
7356000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
69A1000
heap
page read and write
There are 472 hidden memdumps, click here to show them.