Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Awb# 1294440291; 2 ki_n; G.W 3.30 KG.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SIV50C2VQTB0P0PT_c32e84ebc64fed548d6828e72decc9907242fb41_3d54c267_e087f265-1305-4ae3-80f3-8ef54b7d0dee\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER63DD.tmp.dmp
|
Mini DuMP crash report, 15 streams, Thu Apr 25 07:41:56 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6555.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6575.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Awb# 1294440291; 2 ki_n; G.W 3.30 KG.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Roaming\188E93\31437F.lck
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\bc49718863ee53e026d805ec372039e9_9e146be9-c76a-4720-bcdb-53011b87bd06
|
data
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Awb# 1294440291; 2 ki_n; G.W 3.30 KG.exe
|
"C:\Users\user\Desktop\Awb# 1294440291; 2 ki_n; G.W 3.30 KG.exe"
|
||
C:\Users\user\Desktop\Awb# 1294440291; 2 ki_n; G.W 3.30 KG.exe
|
"C:\Users\user\Desktop\Awb# 1294440291; 2 ki_n; G.W 3.30 KG.exe"
|
||
C:\Users\user\Desktop\Awb# 1294440291; 2 ki_n; G.W 3.30 KG.exe
|
"C:\Users\user\Desktop\Awb# 1294440291; 2 ki_n; G.W 3.30 KG.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5516 -s 1376
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://kbfvzoboss.bid/alien/fre.php
|
|||
http://alphastand.top/alien/fre.php
|
|||
http://alphastand.win/alien/fre.php
|
|||
http://alphastand.trade/alien/fre.php
|
|||
http://45.77.223.48/~blog/?ajax=ee
|
45.77.223.48
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
http://www.ibsensoftware.com/
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlN
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
http://www.fontbureau.com/designers/frere-user.html
|
unknown
|
||
http://www.jiyu-kobo.co.jp/
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://www.fontbureau.com/designers8
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
There are 23 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.77.223.48
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
|
ProgramId
|
||
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
|
FileId
|
||
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
|
LowerCaseLongPath
|
||
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
|
LongPathHash
|
||
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
|
Name
|
||
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
|
OriginalFileName
|
||
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
|
Publisher
|
||
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
|
Version
|
||
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
|
BinFileVersion
|
||
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
|
BinaryType
|
||
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
|
ProductName
|
||
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
|
ProductVersion
|
||
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
|
LinkDate
|
||
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
|
BinProductVersion
|
||
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
|
AppxPackageFullName
|
||
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
|
Size
|
||
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
|
Language
|
||
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 11 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
FC8000
|
heap
|
page read and write
|
||
9480000
|
trusted library section
|
page read and write
|
||
40C9000
|
trusted library allocation
|
page read and write
|
||
313D000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
4C4D000
|
trusted library allocation
|
page read and write
|
||
4AB7000
|
trusted library allocation
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
2DB6000
|
trusted library allocation
|
page execute and read and write
|
||
582B000
|
stack
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
1300000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page execute and read and write
|
||
5BCE000
|
stack
|
page read and write
|
||
5590000
|
heap
|
page execute and read and write
|
||
DA9000
|
stack
|
page read and write
|
||
30BF000
|
stack
|
page read and write
|
||
5690000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
trusted library allocation
|
page read and write
|
||
C90000
|
unkown
|
page readonly
|
||
1303000
|
trusted library allocation
|
page read and write
|
||
7B81000
|
trusted library allocation
|
page read and write
|
||
125E000
|
stack
|
page read and write
|
||
150E000
|
stack
|
page read and write
|
||
7AA7000
|
heap
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
3366000
|
trusted library allocation
|
page read and write
|
||
2DC2000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
497E000
|
trusted library allocation
|
page read and write
|
||
969E000
|
stack
|
page read and write
|
||
130D000
|
trusted library allocation
|
page execute and read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
8010000
|
trusted library allocation
|
page read and write
|
||
3070000
|
trusted library allocation
|
page read and write
|
||
586E000
|
stack
|
page read and write
|
||
2DC0000
|
trusted library allocation
|
page read and write
|
||
D1C000
|
unkown
|
page readonly
|
||
336C000
|
trusted library allocation
|
page read and write
|
||
58EE000
|
stack
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
32D9000
|
trusted library allocation
|
page read and write
|
||
35F2000
|
trusted library allocation
|
page read and write
|
||
B85000
|
heap
|
page read and write
|
||
2E90000
|
trusted library allocation
|
page execute and read and write
|
||
947E000
|
stack
|
page read and write
|
||
3368000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
5580000
|
heap
|
page read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
B9A0000
|
trusted library allocation
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
59FD000
|
stack
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
7B60000
|
trusted library allocation
|
page execute and read and write
|
||
5679000
|
trusted library allocation
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
33D0000
|
trusted library allocation
|
page read and write
|
||
4A0000
|
remote allocation
|
page execute and read and write
|
||
12FD000
|
trusted library allocation
|
page execute and read and write
|
||
131A000
|
heap
|
page read and write
|
||
40C1000
|
trusted library allocation
|
page read and write
|
||
7C80000
|
trusted library allocation
|
page execute and read and write
|
||
1120000
|
heap
|
page read and write
|
||
2DAF000
|
stack
|
page read and write
|
||
102D000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
56F3000
|
heap
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page execute and read and write
|
||
128F000
|
stack
|
page read and write
|
||
13E8000
|
heap
|
page read and write
|
||
56E0000
|
heap
|
page read and write
|
||
4930000
|
trusted library allocation
|
page read and write
|
||
12F4000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
7BCE000
|
stack
|
page read and write
|
||
5AC5000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
7960000
|
heap
|
page read and write
|
||
7BE0000
|
trusted library section
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
EFB000
|
stack
|
page read and write
|
||
7A60000
|
heap
|
page read and write
|
||
1344000
|
heap
|
page read and write
|
||
C92000
|
unkown
|
page readonly
|
||
B4D9000
|
trusted library allocation
|
page read and write
|
||
3362000
|
trusted library allocation
|
page read and write
|
||
58AE000
|
stack
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
2DE0000
|
trusted library allocation
|
page read and write
|
||
635F000
|
stack
|
page read and write
|
||
5670000
|
trusted library allocation
|
page read and write
|
||
3347000
|
trusted library allocation
|
page read and write
|
||
6470000
|
heap
|
page read and write
|
||
7BD0000
|
trusted library allocation
|
page read and write
|
||
B1C000
|
stack
|
page read and write
|
||
12F3000
|
trusted library allocation
|
page execute and read and write
|
||
3126000
|
trusted library allocation
|
page read and write
|
||
7FB0000
|
trusted library section
|
page read and write
|
||
56A0000
|
trusted library allocation
|
page read and write
|
||
5650000
|
trusted library allocation
|
page read and write
|
||
1145000
|
heap
|
page read and write
|
||
56C0000
|
trusted library section
|
page readonly
|
||
7AA2000
|
heap
|
page read and write
|
||
FEE000
|
heap
|
page read and write
|
||
13DA000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
2EA0000
|
trusted library allocation
|
page read and write
|
||
B930000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
49CC000
|
trusted library allocation
|
page read and write
|
||
56D0000
|
heap
|
page read and write
|
||
1337000
|
heap
|
page read and write
|
||
51B9000
|
stack
|
page read and write
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
6460000
|
heap
|
page read and write
|
||
7A7C000
|
heap
|
page read and write
|
||
7D9E000
|
stack
|
page read and write
|
||
5A90000
|
trusted library allocation
|
page execute and read and write
|
||
2DBA000
|
trusted library allocation
|
page execute and read and write
|
||
645E000
|
stack
|
page read and write
|
||
58F0000
|
heap
|
page read and write
|
||
7C70000
|
trusted library allocation
|
page read and write
|
||
12A8000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
3091000
|
trusted library allocation
|
page read and write
|
||
3096000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
3172000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page execute and read and write
|
||
B8CE000
|
heap
|
page read and write
|
||
2DB2000
|
trusted library allocation
|
page read and write
|
||
64AB000
|
heap
|
page read and write
|
||
309D000
|
trusted library allocation
|
page read and write
|
||
1352000
|
heap
|
page read and write
|
||
300E000
|
stack
|
page read and write
|
||
56F0000
|
heap
|
page read and write
|
||
937E000
|
stack
|
page read and write
|
||
10F7000
|
stack
|
page read and write
|
||
30B0000
|
heap
|
page execute and read and write
|
||
3364000
|
trusted library allocation
|
page read and write
|
||
5680000
|
trusted library allocation
|
page execute and read and write
|
||
30C0000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
5AC0000
|
heap
|
page read and write
|
||
5515000
|
trusted library allocation
|
page read and write
|
||
64A7000
|
heap
|
page read and write
|
||
94A0000
|
heap
|
page read and write
|
||
7582000
|
trusted library allocation
|
page read and write
|
||
30C1000
|
trusted library allocation
|
page read and write
|
||
2DCB000
|
trusted library allocation
|
page execute and read and write
|
||
5510000
|
trusted library allocation
|
page read and write
|
||
2E6B000
|
stack
|
page read and write
|
||
308E000
|
trusted library allocation
|
page read and write
|
||
8015000
|
trusted library allocation
|
page read and write
|
||
129E000
|
stack
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
4C67000
|
trusted library allocation
|
page read and write
|
||
5540000
|
trusted library allocation
|
page read and write
|
||
7B70000
|
trusted library section
|
page read and write
|
||
33D2000
|
trusted library allocation
|
page read and write
|
||
7A68000
|
heap
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
2DC7000
|
trusted library allocation
|
page execute and read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
7ACA000
|
heap
|
page read and write
|
||
131E000
|
heap
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
313A000
|
trusted library allocation
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
There are 165 hidden memdumps, click here to show them.