Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
uivxeWogXy.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_uivxeWogXy.exe_3a75715d36fb4b3fb75dc3912284dcd3246dd0bb_c7e9d4d8_ef782520-ad57-44b0-920c-456a690d0399\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5D67.tmp.dmp
|
Mini DuMP crash report, 16 streams, Sat Oct 26 20:49:27 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5EA0.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5EFF.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\uivxeWogXy.exe
|
"C:\Users\user\Desktop\uivxeWogXy.exe"
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 7060 -s 800
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://upx.sf.net
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
|
ProgramId
|
||
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
|
FileId
|
||
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
|
LowerCaseLongPath
|
||
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
|
LongPathHash
|
||
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
|
Name
|
||
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
|
OriginalFileName
|
||
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
|
Publisher
|
||
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
|
Version
|
||
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
|
BinFileVersion
|
||
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
|
BinaryType
|
||
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
|
ProductName
|
||
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
|
ProductVersion
|
||
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
|
LinkDate
|
||
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
|
BinProductVersion
|
||
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
|
AppxPackageFullName
|
||
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
|
Size
|
||
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
|
Language
|
||
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1F0B4C30000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page execute and read and write
|
||
D9B17F0000
|
stack
|
page read and write
|
||
1F0B4CC0000
|
trusted library allocation
|
page read and write
|
||
1F0C693D000
|
trusted library allocation
|
page read and write
|
||
1F0B4D5F000
|
heap
|
page read and write
|
||
1F0B4F20000
|
heap
|
page read and write
|
||
D9B1BFE000
|
stack
|
page read and write
|
||
1F0B4E63000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page read and write
|
||
1F0B4CF7000
|
heap
|
page read and write
|
||
7FFD9B78C000
|
trusted library allocation
|
page execute and read and write
|
||
D9B27FC000
|
stack
|
page read and write
|
||
1F0B5110000
|
heap
|
page read and write
|
||
1F0C6931000
|
trusted library allocation
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
1F0C6933000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7F0000
|
trusted library allocation
|
page execute and read and write
|
||
1F0B4C70000
|
heap
|
page read and write
|
||
D9B23FF000
|
stack
|
page read and write
|
||
1F0B4B50000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
1F0B4E80000
|
heap
|
page read and write
|
||
1F0B4F25000
|
heap
|
page read and write
|
||
1F0B4A72000
|
unkown
|
page readonly
|
||
7FFD9B6D3000
|
trusted library allocation
|
page execute and read and write
|
||
1F0B5115000
|
heap
|
page read and write
|
||
1F0B6928000
|
heap
|
page read and write
|
||
1F0B4E60000
|
trusted library allocation
|
page read and write
|
||
D9B33FE000
|
stack
|
page read and write
|
||
1F0B4E70000
|
heap
|
page execute and read and write
|
||
1F0B4EA0000
|
heap
|
page execute and read and write
|
||
7FFD9B6E7000
|
trusted library allocation
|
page read and write
|
||
1F0CF190000
|
heap
|
page read and write
|
||
7FFD9B72C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7B6000
|
trusted library allocation
|
page execute and read and write
|
||
1F0B4DC5000
|
heap
|
page read and write
|
||
7FFD9B6D2000
|
trusted library allocation
|
page read and write
|
||
1F0B6920000
|
heap
|
page read and write
|
||
1F0B4A70000
|
unkown
|
page readonly
|
||
1F0B4D5C000
|
heap
|
page read and write
|
||
1F0C6938000
|
trusted library allocation
|
page read and write
|
||
7FF4BA420000
|
trusted library allocation
|
page execute and read and write
|
||
1F0B4CF0000
|
heap
|
page read and write
|
||
7FFD9B6E2000
|
trusted library allocation
|
page read and write
|
||
1F0B4CE0000
|
trusted library allocation
|
page read and write
|
||
D9B2BFF000
|
stack
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page read and write
|
||
D9B2FFE000
|
stack
|
page read and write
|
||
7FFD9B6EA000
|
trusted library allocation
|
page read and write
|
||
1F0B4D1F000
|
heap
|
page read and write
|
||
7FFD9B6FD000
|
trusted library allocation
|
page execute and read and write
|
||
1F0B4D31000
|
heap
|
page read and write
|
||
D9B1FFE000
|
stack
|
page read and write
|
||
1F0B6931000
|
trusted library allocation
|
page read and write
|
||
1F0B4D16000
|
heap
|
page read and write
|
||
1F0B4D19000
|
heap
|
page read and write
|
||
1F0C6941000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6DD000
|
trusted library allocation
|
page execute and read and write
|
||
1F0B4C50000
|
heap
|
page read and write
|
||
1F0B4D2E000
|
heap
|
page read and write
|
There are 52 hidden memdumps, click here to show them.