IOC Report
asbpKOngY0.exe

loading gif

Files

File Path
Type
Category
Malicious
asbpKOngY0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_asbpKOngY0.exe_2caf974d11786772f56eeade9062141c51f1e48_347c9851_fbf69d2b-2a12-4891-bf94-e897ad82cb62\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7C35.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Apr 22 19:44:08 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7DEB.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7E2B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\asbpKOngY0.exe
"C:\Users\user\Desktop\asbpKOngY0.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 1488

URLs

Name
IP
Malicious
incredibleextedwj.shop
malicious
shortsvelventysjo.shop
malicious
tolerateilusidjukl.shop
malicious
liabilitynighstjsko.shop
malicious
shatterbreathepsw.shop
malicious
demonstationfukewko.shop
malicious
productivelookewr.shop
malicious
strollheavengwu.shop
malicious
alcojoldwograpciw.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://strollheavengwu.shop/api
172.67.163.209
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://strollheavengwu.shop/apisE
unknown
https://strollheavengwu.shop/apir
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://strollheavengwu.shop/api7bu
unknown
https://strollheavengwu.shop/apiC
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://strollheavengwu.shop/
unknown
There are 31 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
strollheavengwu.shop
172.67.163.209
malicious

IPs

IP
Domain
Country
Malicious
172.67.163.209
strollheavengwu.shop
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
ProgramId
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
FileId
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
LowerCaseLongPath
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
LongPathHash
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
Name
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
OriginalFileName
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
Publisher
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
Version
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
BinFileVersion
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
BinaryType
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
ProductName
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
ProductVersion
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
LinkDate
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
BinProductVersion
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
AppxPackageFullName
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
AppxPackageRelativeId
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
Size
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
Language
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3060000
direct allocation
page read and write
malicious
5631000
trusted library allocation
page read and write
2DFB000
heap
page read and write
546F000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
5487000
trusted library allocation
page read and write
5467000
trusted library allocation
page read and write
5438000
trusted library allocation
page read and write
4D6F000
stack
page read and write
5470000
trusted library allocation
page read and write
2CA5000
heap
page read and write
4E6F000
stack
page read and write
543E000
trusted library allocation
page read and write
30E0000
remote allocation
page read and write
5486000
trusted library allocation
page read and write
532E000
stack
page read and write
2DD4000
heap
page read and write
548E000
trusted library allocation
page read and write
5487000
trusted library allocation
page read and write
5534000
trusted library allocation
page read and write
2D51000
heap
page read and write
30DE000
stack
page read and write
449000
unkown
page execute and read and write
5631000
trusted library allocation
page read and write
5473000
trusted library allocation
page read and write
2D8E000
heap
page read and write
5484000
trusted library allocation
page read and write
5487000
trusted library allocation
page read and write
2DD7000
heap
page read and write
548E000
trusted library allocation
page read and write
5A92000
trusted library allocation
page read and write
546D000
trusted library allocation
page read and write
2D43000
heap
page read and write
5457000
trusted library allocation
page read and write
54B9000
trusted library allocation
page read and write
5432000
trusted library allocation
page read and write
2DD5000
heap
page read and write
5497000
trusted library allocation
page read and write
546F000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
5484000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
597F000
stack
page read and write
400000
unkown
page readonly
5484000
trusted library allocation
page read and write
2DD6000
heap
page read and write
2DF4000
heap
page read and write
54BC000
trusted library allocation
page read and write
54AC000
trusted library allocation
page read and write
2FCF000
stack
page read and write
5431000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
5638000
trusted library allocation
page read and write
546F000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
5631000
trusted library allocation
page read and write
641F000
trusted library allocation
page read and write
2C40000
heap
page read and write
543D000
trusted library allocation
page read and write
543E000
trusted library allocation
page read and write
4C6D000
stack
page read and write
5493000
trusted library allocation
page read and write
5434000
trusted library allocation
page read and write
44C000
unkown
page write copy
5430000
trusted library allocation
page read and write
5467000
trusted library allocation
page read and write
2D0E000
heap
page read and write
5603000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
2DD6000
heap
page read and write
2DF9000
heap
page read and write
2C8E000
stack
page read and write
548E000
trusted library allocation
page read and write
5434000
trusted library allocation
page read and write
5613000
trusted library allocation
page read and write
2DF8000
heap
page read and write
548D000
trusted library allocation
page read and write
56A3000
trusted library allocation
page read and write
543E000
trusted library allocation
page read and write
2DFB000
heap
page read and write
543D000
trusted library allocation
page read and write
2CA7000
heap
page read and write
5630000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
54C7000
trusted library allocation
page read and write
2D62000
heap
page read and write
5497000
trusted library allocation
page read and write
544F000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
30E0000
remote allocation
page read and write
548E000
trusted library allocation
page read and write
546E000
trusted library allocation
page read and write
5661000
trusted library allocation
page read and write
565F000
trusted library allocation
page read and write
5649000
trusted library allocation
page read and write
546D000
trusted library allocation
page read and write
5633000
trusted library allocation
page read and write
548C000
trusted library allocation
page read and write
2D7A000
heap
page read and write
5431000
trusted library allocation
page read and write
5438000
trusted library allocation
page read and write
5456000
trusted library allocation
page read and write
543E000
trusted library allocation
page read and write
2DF4000
heap
page read and write
5436000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
547E000
trusted library allocation
page read and write
5465000
trusted library allocation
page read and write
545F000
trusted library allocation
page read and write
5495000
trusted library allocation
page read and write
5649000
trusted library allocation
page read and write
5451000
trusted library allocation
page read and write
587E000
stack
page read and write
5468000
trusted library allocation
page read and write
5495000
trusted library allocation
page read and write
5476000
trusted library allocation
page read and write
54AC000
trusted library allocation
page read and write
2C2F000
unkown
page readonly
2DE5000
heap
page read and write
5439000
trusted library allocation
page read and write
309D000
stack
page read and write
2D0A000
heap
page read and write
5432000
trusted library allocation
page read and write
546F000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
5467000
trusted library allocation
page read and write
548D000
trusted library allocation
page read and write
5446000
trusted library allocation
page read and write
565A000
trusted library allocation
page read and write
543E000
trusted library allocation
page read and write
4AAE000
stack
page read and write
546F000
trusted library allocation
page read and write
2D6E000
heap
page read and write
2DFE000
heap
page read and write
543E000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
558B000
trusted library allocation
page read and write
2DE9000
heap
page read and write
5491000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
5488000
trusted library allocation
page read and write
2D00000
heap
page read and write
3050000
heap
page read and write
54C2000
trusted library allocation
page read and write
54B8000
trusted library allocation
page read and write
4AEE000
stack
page read and write
5451000
trusted library allocation
page read and write
5463000
trusted library allocation
page read and write
5438000
trusted library allocation
page read and write
2DFB000
heap
page read and write
544C000
trusted library allocation
page read and write
2D17000
heap
page execute and read and write
544F000
trusted library allocation
page read and write
553A000
trusted library allocation
page read and write
5488000
trusted library allocation
page read and write
5631000
trusted library allocation
page read and write
5487000
trusted library allocation
page read and write
543E000
trusted library allocation
page read and write
5479000
trusted library allocation
page read and write
2DDE000
heap
page read and write
2DB7000
heap
page read and write
5442000
trusted library allocation
page read and write
5484000
trusted library allocation
page read and write
542E000
stack
page read and write
546F000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
5447000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
549F000
trusted library allocation
page read and write
546F000
trusted library allocation
page read and write
2DFC000
heap
page read and write
2CA0000
heap
page read and write
2D77000
heap
page read and write
546D000
trusted library allocation
page read and write
5484000
trusted library allocation
page read and write
548C000
trusted library allocation
page read and write
5439000
trusted library allocation
page read and write
5484000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
5444000
trusted library allocation
page read and write
5438000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
2C2F000
unkown
page readonly
1F0000
heap
page read and write
54B8000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
5BA9000
trusted library allocation
page read and write
546D000
trusted library allocation
page read and write
5488000
trusted library allocation
page read and write
5434000
trusted library allocation
page read and write
5442000
trusted library allocation
page read and write
3100000
heap
page read and write
5467000
trusted library allocation
page read and write
5530000
heap
page read and write
5432000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
54B7000
trusted library allocation
page read and write
543E000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
54B4000
trusted library allocation
page read and write
548F000
trusted library allocation
page read and write
54A8000
trusted library allocation
page read and write
5486000
trusted library allocation
page read and write
543E000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
2DFD000
heap
page read and write
2DE4000
heap
page read and write
5460000
trusted library allocation
page read and write
5484000
trusted library allocation
page read and write
30E0000
remote allocation
page read and write
320F000
stack
page read and write
5661000
trusted library allocation
page read and write
5497000
trusted library allocation
page read and write
41F000
unkown
page readonly
544F000
trusted library allocation
page read and write
54C7000
trusted library allocation
page read and write
544F000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
44E000
unkown
page read and write
5460000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
543E000
trusted library allocation
page read and write
5457000
trusted library allocation
page read and write
54AC000
trusted library allocation
page read and write
2DFB000
heap
page read and write
5446000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
5464000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
5F09000
trusted library allocation
page read and write
2DF8000
heap
page read and write
544F000
trusted library allocation
page read and write
401000
unkown
page execute read
5437000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
546D000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
5432000
trusted library allocation
page read and write
5475000
trusted library allocation
page read and write
545E000
trusted library allocation
page read and write
5669000
trusted library allocation
page read and write
5A07000
trusted library allocation
page read and write
5439000
trusted library allocation
page read and write
2DFC000
heap
page read and write
5460000
trusted library allocation
page read and write
2DF4000
heap
page read and write
5444000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
543E000
trusted library allocation
page read and write
5476000
trusted library allocation
page read and write
9B000
stack
page read and write
40C000
unkown
page readonly
2DE2000
heap
page read and write
556B000
trusted library allocation
page read and write
5446000
trusted library allocation
page read and write
5466000
trusted library allocation
page read and write
5467000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
5444000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
3020000
heap
page read and write
54C8000
trusted library allocation
page read and write
544C000
trusted library allocation
page read and write
5455000
trusted library allocation
page read and write
54C7000
trusted library allocation
page read and write
5531000
heap
page read and write
544F000
trusted library allocation
page read and write
544F000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
546E000
trusted library allocation
page read and write
5446000
trusted library allocation
page read and write
5441000
trusted library allocation
page read and write
5464000
trusted library allocation
page read and write
2DF4000
heap
page read and write
560B000
trusted library allocation
page read and write
54BF000
trusted library allocation
page read and write
5432000
trusted library allocation
page read and write
5476000
trusted library allocation
page read and write
544D000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
544C000
trusted library allocation
page read and write
5454000
trusted library allocation
page read and write
54B8000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
5553000
trusted library allocation
page read and write
4B2E000
stack
page read and write
5434000
trusted library allocation
page read and write
2DE7000
heap
page read and write
2CEE000
stack
page read and write
5440000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
5669000
trusted library allocation
page read and write
51EE000
stack
page read and write
59F0000
heap
page read and write
548E000
trusted library allocation
page read and write
5638000
trusted library allocation
page read and write
4B60000
heap
page read and write
198000
stack
page read and write
544F000
trusted library allocation
page read and write
2DD4000
heap
page read and write
5467000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
5484000
trusted library allocation
page read and write
5476000
trusted library allocation
page read and write
547E000
trusted library allocation
page read and write
2FD0000
direct allocation
page execute and read and write
54C7000
trusted library allocation
page read and write
54B8000
trusted library allocation
page read and write
52EF000
stack
page read and write
There are 305 hidden memdumps, click here to show them.