IOC Report
Awb# 1294440291; 2 ki_n; G.W 3.30 KG.exe

loading gif

Files

File Path
Type
Category
Malicious
Awb# 1294440291; 2 ki_n; G.W 3.30 KG.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SIV50C2VQTB0P0PT_c32e84ebc64fed548d6828e72decc9907242fb41_3d54c267_e087f265-1305-4ae3-80f3-8ef54b7d0dee\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER63DD.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 25 07:41:56 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6555.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6575.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Awb# 1294440291; 2 ki_n; G.W 3.30 KG.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\188E93\31437F.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\bc49718863ee53e026d805ec372039e9_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Awb# 1294440291; 2 ki_n; G.W 3.30 KG.exe
"C:\Users\user\Desktop\Awb# 1294440291; 2 ki_n; G.W 3.30 KG.exe"
malicious
C:\Users\user\Desktop\Awb# 1294440291; 2 ki_n; G.W 3.30 KG.exe
"C:\Users\user\Desktop\Awb# 1294440291; 2 ki_n; G.W 3.30 KG.exe"
malicious
C:\Users\user\Desktop\Awb# 1294440291; 2 ki_n; G.W 3.30 KG.exe
"C:\Users\user\Desktop\Awb# 1294440291; 2 ki_n; G.W 3.30 KG.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5516 -s 1376

URLs

Name
IP
Malicious
http://kbfvzoboss.bid/alien/fre.php
malicious
http://alphastand.top/alien/fre.php
malicious
http://alphastand.win/alien/fre.php
malicious
http://alphastand.trade/alien/fre.php
malicious
http://45.77.223.48/~blog/?ajax=ee
45.77.223.48
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.ibsensoftware.com/
unknown
http://www.tiro.com
unknown
http://upx.sf.net
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
There are 23 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
45.77.223.48
unknown
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
ProgramId
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
FileId
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
LowerCaseLongPath
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
LongPathHash
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
Name
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
OriginalFileName
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
Publisher
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
Version
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
BinFileVersion
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
BinaryType
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
ProductName
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
ProductVersion
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
LinkDate
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
BinProductVersion
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
AppxPackageFullName
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
AppxPackageRelativeId
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
Size
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
Language
\REGISTRY\A\{355664cc-30fa-5001-cf8f-baf7494a6839}\Root\InventoryApplicationFile\awb# 1294440291;|a535341c17150b8d
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
FC8000
heap
page read and write
malicious
9480000
trusted library section
page read and write
malicious
40C9000
trusted library allocation
page read and write
malicious
313D000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
4C4D000
trusted library allocation
page read and write
malicious
4AB7000
trusted library allocation
page read and write
malicious
1110000
heap
page read and write
2DB6000
trusted library allocation
page execute and read and write
582B000
stack
page read and write
1310000
heap
page read and write
1300000
trusted library allocation
page read and write
55A0000
trusted library allocation
page execute and read and write
5BCE000
stack
page read and write
5590000
heap
page execute and read and write
DA9000
stack
page read and write
30BF000
stack
page read and write
5690000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
C90000
unkown
page readonly
1303000
trusted library allocation
page read and write
7B81000
trusted library allocation
page read and write
125E000
stack
page read and write
150E000
stack
page read and write
7AA7000
heap
page read and write
5520000
trusted library allocation
page read and write
3366000
trusted library allocation
page read and write
2DC2000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
497E000
trusted library allocation
page read and write
969E000
stack
page read and write
130D000
trusted library allocation
page execute and read and write
2EC0000
heap
page read and write
8010000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
586E000
stack
page read and write
2DC0000
trusted library allocation
page read and write
D1C000
unkown
page readonly
336C000
trusted library allocation
page read and write
58EE000
stack
page read and write
B80000
heap
page read and write
32D9000
trusted library allocation
page read and write
35F2000
trusted library allocation
page read and write
B85000
heap
page read and write
2E90000
trusted library allocation
page execute and read and write
947E000
stack
page read and write
3368000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
5580000
heap
page read and write
2E2E000
stack
page read and write
B9A0000
trusted library allocation
page read and write
2F6F000
stack
page read and write
59FD000
stack
page read and write
FBE000
stack
page read and write
2E70000
heap
page read and write
2FBE000
stack
page read and write
7B60000
trusted library allocation
page execute and read and write
5679000
trusted library allocation
page read and write
1140000
heap
page read and write
33D0000
trusted library allocation
page read and write
4A0000
remote allocation
page execute and read and write
12FD000
trusted library allocation
page execute and read and write
131A000
heap
page read and write
40C1000
trusted library allocation
page read and write
7C80000
trusted library allocation
page execute and read and write
1120000
heap
page read and write
2DAF000
stack
page read and write
102D000
heap
page read and write
FC0000
heap
page read and write
56F3000
heap
page read and write
7C90000
trusted library allocation
page execute and read and write
128F000
stack
page read and write
13E8000
heap
page read and write
56E0000
heap
page read and write
4930000
trusted library allocation
page read and write
12F4000
trusted library allocation
page read and write
12C0000
heap
page read and write
7BCE000
stack
page read and write
5AC5000
heap
page read and write
BE0000
heap
page read and write
7960000
heap
page read and write
7BE0000
trusted library section
page read and write
F40000
heap
page read and write
5A80000
trusted library allocation
page read and write
EFB000
stack
page read and write
7A60000
heap
page read and write
1344000
heap
page read and write
C92000
unkown
page readonly
B4D9000
trusted library allocation
page read and write
3362000
trusted library allocation
page read and write
58AE000
stack
page read and write
30D0000
heap
page read and write
2DE0000
trusted library allocation
page read and write
635F000
stack
page read and write
5670000
trusted library allocation
page read and write
3347000
trusted library allocation
page read and write
6470000
heap
page read and write
7BD0000
trusted library allocation
page read and write
B1C000
stack
page read and write
12F3000
trusted library allocation
page execute and read and write
3126000
trusted library allocation
page read and write
7FB0000
trusted library section
page read and write
56A0000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
1145000
heap
page read and write
56C0000
trusted library section
page readonly
7AA2000
heap
page read and write
FEE000
heap
page read and write
13DA000
heap
page read and write
12A0000
heap
page read and write
2EA0000
trusted library allocation
page read and write
B930000
heap
page read and write
3360000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
49CC000
trusted library allocation
page read and write
56D0000
heap
page read and write
1337000
heap
page read and write
51B9000
stack
page read and write
7C10000
trusted library allocation
page read and write
6460000
heap
page read and write
7A7C000
heap
page read and write
7D9E000
stack
page read and write
5A90000
trusted library allocation
page execute and read and write
2DBA000
trusted library allocation
page execute and read and write
645E000
stack
page read and write
58F0000
heap
page read and write
7C70000
trusted library allocation
page read and write
12A8000
heap
page read and write
1350000
heap
page read and write
3091000
trusted library allocation
page read and write
3096000
trusted library allocation
page read and write
B90000
heap
page read and write
3172000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page execute and read and write
B8CE000
heap
page read and write
2DB2000
trusted library allocation
page read and write
64AB000
heap
page read and write
309D000
trusted library allocation
page read and write
1352000
heap
page read and write
300E000
stack
page read and write
56F0000
heap
page read and write
937E000
stack
page read and write
10F7000
stack
page read and write
30B0000
heap
page execute and read and write
3364000
trusted library allocation
page read and write
5680000
trusted library allocation
page execute and read and write
30C0000
heap
page read and write
F50000
heap
page read and write
5AC0000
heap
page read and write
5515000
trusted library allocation
page read and write
64A7000
heap
page read and write
94A0000
heap
page read and write
7582000
trusted library allocation
page read and write
30C1000
trusted library allocation
page read and write
2DCB000
trusted library allocation
page execute and read and write
5510000
trusted library allocation
page read and write
2E6B000
stack
page read and write
308E000
trusted library allocation
page read and write
8015000
trusted library allocation
page read and write
129E000
stack
page read and write
5500000
trusted library allocation
page read and write
4C67000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
7B70000
trusted library section
page read and write
33D2000
trusted library allocation
page read and write
7A68000
heap
page read and write
BDE000
stack
page read and write
2DC7000
trusted library allocation
page execute and read and write
12F0000
trusted library allocation
page read and write
7ACA000
heap
page read and write
131E000
heap
page read and write
336A000
trusted library allocation
page read and write
313A000
trusted library allocation
page read and write
2FCE000
stack
page read and write
There are 165 hidden memdumps, click here to show them.