IOC Report
uivxeWogXy.exe

loading gif

Files

File Path
Type
Category
Malicious
uivxeWogXy.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_uivxeWogXy.exe_3a75715d36fb4b3fb75dc3912284dcd3246dd0bb_c7e9d4d8_ef782520-ad57-44b0-920c-456a690d0399\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5D67.tmp.dmp
Mini DuMP crash report, 16 streams, Sat Oct 26 20:49:27 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5EA0.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5EFF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\uivxeWogXy.exe
"C:\Users\user\Desktop\uivxeWogXy.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7060 -s 800

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
ProgramId
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
FileId
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
LowerCaseLongPath
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
LongPathHash
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
Name
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
OriginalFileName
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
Publisher
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
Version
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
BinFileVersion
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
BinaryType
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
ProductName
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
ProductVersion
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
LinkDate
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
BinProductVersion
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
AppxPackageFullName
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
AppxPackageRelativeId
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
Size
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
Language
\REGISTRY\A\{002e876b-92c3-19e8-1918-c7907f1709d7}\Root\InventoryApplicationFile\uivxewogxy.exe|b8b59a2740d4dcf7
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1F0B4C30000
heap
page read and write
7FFD9B790000
trusted library allocation
page execute and read and write
D9B17F0000
stack
page read and write
1F0B4CC0000
trusted library allocation
page read and write
1F0C693D000
trusted library allocation
page read and write
1F0B4D5F000
heap
page read and write
1F0B4F20000
heap
page read and write
D9B1BFE000
stack
page read and write
1F0B4E63000
trusted library allocation
page read and write
7FFD9B6E0000
trusted library allocation
page read and write
1F0B4CF7000
heap
page read and write
7FFD9B78C000
trusted library allocation
page execute and read and write
D9B27FC000
stack
page read and write
1F0B5110000
heap
page read and write
1F0C6931000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page read and write
1F0C6933000
trusted library allocation
page read and write
7FFD9B7F0000
trusted library allocation
page execute and read and write
1F0B4C70000
heap
page read and write
D9B23FF000
stack
page read and write
1F0B4B50000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
1F0B4E80000
heap
page read and write
1F0B4F25000
heap
page read and write
1F0B4A72000
unkown
page readonly
7FFD9B6D3000
trusted library allocation
page execute and read and write
1F0B5115000
heap
page read and write
1F0B6928000
heap
page read and write
1F0B4E60000
trusted library allocation
page read and write
D9B33FE000
stack
page read and write
1F0B4E70000
heap
page execute and read and write
1F0B4EA0000
heap
page execute and read and write
7FFD9B6E7000
trusted library allocation
page read and write
1F0CF190000
heap
page read and write
7FFD9B72C000
trusted library allocation
page execute and read and write
7FFD9B7B6000
trusted library allocation
page execute and read and write
1F0B4DC5000
heap
page read and write
7FFD9B6D2000
trusted library allocation
page read and write
1F0B6920000
heap
page read and write
1F0B4A70000
unkown
page readonly
1F0B4D5C000
heap
page read and write
1F0C6938000
trusted library allocation
page read and write
7FF4BA420000
trusted library allocation
page execute and read and write
1F0B4CF0000
heap
page read and write
7FFD9B6E2000
trusted library allocation
page read and write
1F0B4CE0000
trusted library allocation
page read and write
D9B2BFF000
stack
page read and write
7FFD9B880000
trusted library allocation
page read and write
D9B2FFE000
stack
page read and write
7FFD9B6EA000
trusted library allocation
page read and write
1F0B4D1F000
heap
page read and write
7FFD9B6FD000
trusted library allocation
page execute and read and write
1F0B4D31000
heap
page read and write
D9B1FFE000
stack
page read and write
1F0B6931000
trusted library allocation
page read and write
1F0B4D16000
heap
page read and write
1F0B4D19000
heap
page read and write
1F0C6941000
trusted library allocation
page read and write
7FFD9B6D4000
trusted library allocation
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
1F0B4C50000
heap
page read and write
1F0B4D2E000
heap
page read and write
There are 52 hidden memdumps, click here to show them.