IOC Report
UIxMarketPlugin.dll

loading gif

Files

File Path
Type
Category
Malicious
UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_6a4b12cc5ab5a864a1114bf7acfd58aabbffc_7522e4b5_2ed9bbc9-d9dc-40e8-8bc1-c2b2b18dc67e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_6a4b12cc5ab5a864a1114bf7acfd58aabbffc_7522e4b5_6d591dea-2ba8-4815-b033-90e29eb221c5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_f4a2262f4d43d5b9ac2196a348f57232fa6b6712_7522e4b5_4a8c2699-ff11-4fe9-b765-eff75ae06606\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_f4a2262f4d43d5b9ac2196a348f57232fa6b6712_7522e4b5_881e2de0-372e-410d-9f8d-be4be5931c9d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1C48.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Apr 20 09:35:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1C67.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Apr 20 09:35:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E8B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1ED9.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1F28.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1F76.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER26A8.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Apr 20 09:35:02 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2716.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER27D3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3E85.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Apr 20 09:35:08 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3EE4.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3F14.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\UIxMarketPlugin.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\UIxMarketPlugin.dll",#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\UIxMarketPlugin.dll,MarketCreate
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\UIxMarketPlugin.dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 664
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6680 -s 672
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\UIxMarketPlugin.dll,MarketRelease
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7396 -s 664
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\UIxMarketPlugin.dll,_Finalize@0
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\UIxMarketPlugin.dll",MarketCreate
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\UIxMarketPlugin.dll",MarketRelease
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\UIxMarketPlugin.dll",_Finalize@0
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\UIxMarketPlugin.dll",_Initialize@4
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7628 -s 664
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
\REGISTRY\A\{edf5fc96-a67f-f995-f15e-b06eaa9e8c20}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProgramId
\REGISTRY\A\{edf5fc96-a67f-f995-f15e-b06eaa9e8c20}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
FileId
\REGISTRY\A\{edf5fc96-a67f-f995-f15e-b06eaa9e8c20}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LowerCaseLongPath
\REGISTRY\A\{edf5fc96-a67f-f995-f15e-b06eaa9e8c20}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LongPathHash
\REGISTRY\A\{edf5fc96-a67f-f995-f15e-b06eaa9e8c20}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Name
\REGISTRY\A\{edf5fc96-a67f-f995-f15e-b06eaa9e8c20}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
OriginalFileName
\REGISTRY\A\{edf5fc96-a67f-f995-f15e-b06eaa9e8c20}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Publisher
\REGISTRY\A\{edf5fc96-a67f-f995-f15e-b06eaa9e8c20}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Version
\REGISTRY\A\{edf5fc96-a67f-f995-f15e-b06eaa9e8c20}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinFileVersion
\REGISTRY\A\{edf5fc96-a67f-f995-f15e-b06eaa9e8c20}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinaryType
\REGISTRY\A\{edf5fc96-a67f-f995-f15e-b06eaa9e8c20}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductName
\REGISTRY\A\{edf5fc96-a67f-f995-f15e-b06eaa9e8c20}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductVersion
\REGISTRY\A\{edf5fc96-a67f-f995-f15e-b06eaa9e8c20}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LinkDate
\REGISTRY\A\{edf5fc96-a67f-f995-f15e-b06eaa9e8c20}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinProductVersion
\REGISTRY\A\{edf5fc96-a67f-f995-f15e-b06eaa9e8c20}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageFullName
\REGISTRY\A\{edf5fc96-a67f-f995-f15e-b06eaa9e8c20}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageRelativeId
\REGISTRY\A\{edf5fc96-a67f-f995-f15e-b06eaa9e8c20}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Size
\REGISTRY\A\{edf5fc96-a67f-f995-f15e-b06eaa9e8c20}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Language
\REGISTRY\A\{edf5fc96-a67f-f995-f15e-b06eaa9e8c20}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
IsOsComponent
\REGISTRY\A\{edf5fc96-a67f-f995-f15e-b06eaa9e8c20}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018800EC2355F6C
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 15 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2B60000
heap
page read and write
2AFE000
stack
page read and write
346E000
stack
page read and write
166B000
heap
page read and write
2D40000
heap
page read and write
61E000
stack
page read and write
5030000
heap
page read and write
2A70000
heap
page read and write
3210000
heap
page read and write
65F000
stack
page read and write
27F0000
heap
page read and write
13E0000
heap
page read and write
45B0000
heap
page read and write
34BA000
heap
page read and write
6CCA3000
unkown
page read and write
4244000
heap
page read and write
4C0000
heap
page read and write
448F000
stack
page read and write
3E9E000
stack
page read and write
2C00000
heap
page read and write
48A0000
heap
page read and write
61B000
stack
page read and write
660000
heap
page read and write
6CCAA000
unkown
page read and write
4DA000
heap
page read and write
3280000
heap
page read and write
4FB7000
heap
page read and write
670000
heap
page read and write
450F000
stack
page read and write
4F00000
remote allocation
page read and write
329C000
stack
page read and write
2CF0000
heap
page read and write
4210000
heap
page read and write
4240000
heap
page read and write
4E50000
heap
page read and write
323C000
stack
page read and write
14F0000
heap
page read and write
2CE0000
heap
page read and write
6CCA3000
unkown
page read and write
400000
heap
page read and write
34B0000
heap
page read and write
4FB0000
heap
page read and write
4590000
heap
page read and write
2D76000
heap
page read and write
6CB40000
unkown
page readonly
27FE000
stack
page read and write
362F000
stack
page read and write
6CCB1000
unkown
page readonly
142E000
stack
page read and write
6CB40000
unkown
page readonly
2FC0000
heap
page read and write
6CB41000
unkown
page execute read
4AA0000
heap
page read and write
146E000
stack
page read and write
2BD0000
heap
page read and write
34AF000
stack
page read and write
2BD7000
heap
page read and write
1660000
heap
page read and write
2B90000
heap
page read and write
27B0000
heap
page read and write
6CCB1000
unkown
page readonly
1694000
heap
page read and write
2F5E000
stack
page read and write
4800000
heap
page read and write
166F000
heap
page read and write
325B000
stack
page read and write
27C0000
heap
page read and write
33E0000
heap
page read and write
15B000
stack
page read and write
4C0000
heap
page read and write
2C7C000
stack
page read and write
6CC5F000
unkown
page readonly
6CB40000
unkown
page readonly
47C000
stack
page read and write
2B90000
heap
page read and write
42EE000
stack
page read and write
65C000
stack
page read and write
4DF0000
heap
page read and write
16AE000
heap
page read and write
3527000
heap
page read and write
6CCB1000
unkown
page readonly
47AE000
stack
page read and write
26FE000
stack
page read and write
4D0000
heap
page read and write
185F000
stack
page read and write
6CCAA000
unkown
page read and write
41C0000
heap
page read and write
2AD0000
heap
page read and write
3524000
heap
page read and write
6CCA3000
unkown
page read and write
410F000
stack
page read and write
3710000
heap
page read and write
3360000
heap
page read and write
410000
heap
page read and write
3237000
heap
page read and write
6CB40000
unkown
page readonly
19C000
stack
page read and write
41D0000
heap
page read and write
3EDF000
stack
page read and write
2747000
heap
page read and write
3520000
heap
page read and write
2ABF000
stack
page read and write
34AE000
stack
page read and write
3410000
heap
page read and write
4FB4000
heap
page read and write
2FDB000
stack
page read and write
3120000
heap
page read and write
6CC5F000
unkown
page readonly
2D40000
heap
page read and write
F9B000
stack
page read and write
2F9F000
stack
page read and write
2CEA000
heap
page read and write
6CCA3000
unkown
page read and write
2AB0000
heap
page read and write
4970000
heap
page read and write
43B000
stack
page read and write
480000
heap
page read and write
34EF000
stack
page read and write
4977000
heap
page read and write
6CCB1000
unkown
page readonly
4247000
heap
page read and write
26E0000
heap
page read and write
4010000
heap
page read and write
16AE000
heap
page read and write
3230000
heap
page read and write
278C000
stack
page read and write
2830000
heap
page read and write
4F0000
heap
page read and write
3540000
heap
page read and write
14C0000
heap
page read and write
2820000
heap
page read and write
4EE0000
heap
page read and write
1300000
heap
page read and write
4620000
heap
page read and write
6CB40000
unkown
page readonly
2D4A000
heap
page read and write
6CCAA000
unkown
page read and write
3F54000
heap
page read and write
4974000
heap
page read and write
6CCA3000
unkown
page read and write
3BB000
stack
page read and write
2740000
heap
page read and write
3F57000
heap
page read and write
6CB41000
unkown
page execute read
346F000
stack
page read and write
4200000
heap
page read and write
3F50000
heap
page read and write
6CC5F000
unkown
page readonly
6CB41000
unkown
page execute read
283A000
heap
page read and write
2D5A000
heap
page read and write
2A3E000
stack
page read and write
1678000
heap
page read and write
33C0000
heap
page read and write
35EE000
stack
page read and write
680000
heap
page read and write
2BD4000
heap
page read and write
6CCAA000
unkown
page read and write
6CCB1000
unkown
page readonly
273F000
stack
page read and write
4B0000
heap
page read and write
340E000
stack
page read and write
405F000
stack
page read and write
2AF0000
heap
page read and write
432F000
stack
page read and write
2810000
heap
page read and write
6CC5F000
unkown
page readonly
3420000
heap
page read and write
44CE000
stack
page read and write
3FC000
stack
page read and write
2B70000
heap
page read and write
2856000
heap
page read and write
6CCAA000
unkown
page read and write
3F1E000
stack
page read and write
6CB41000
unkown
page execute read
2D50000
heap
page read and write
15FF000
stack
page read and write
6CB41000
unkown
page execute read
31D0000
heap
page read and write
3510000
heap
page read and write
6CC5F000
unkown
page readonly
274B000
stack
page read and write
2744000
heap
page read and write
27F0000
heap
page read and write
354A000
heap
page read and write
2820000
heap
page read and write
45D0000
heap
page read and write
47EF000
stack
page read and write
12FC000
stack
page read and write
2B5E000
stack
page read and write
3234000
heap
page read and write
3300000
heap
page read and write
3700000
heap
page read and write
4F6000
heap
page read and write
282A000
heap
page read and write
2C3B000
stack
page read and write
2B3F000
stack
page read and write
4B0000
heap
page read and write
4597000
heap
page read and write
4594000
heap
page read and write
3090000
heap
page read and write
2CE0000
heap
page read and write
There are 192 hidden memdumps, click here to show them.