IOC Report
kNp6KbvVoz.exe

loading gif

Files

File Path
Type
Category
Malicious
kNp6KbvVoz.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_kNp6KbvVoz.exe_f5bb9ea57f41118ff9028f6b65fba858f0329_fde4ec36_2783d4ed-b81a-4a78-a482-9f28c8a6aa9e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2140.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 03:42:23 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER224B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER22AA.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\kNp6KbvVoz.exe
"C:\Users\user\Desktop\kNp6KbvVoz.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6920 -s 1332

URLs

Name
IP
Malicious
http://194.15.46.65
unknown
malicious
http://194.15.46.65/7e57db3b864b30f1.php
malicious
http://194.15.46.65/
194.15.46.65
malicious
http://upx.sf.net
unknown
http://194.15.46.65/stemDrive=C:SystemRoot=L
unknown
http://194.15.46.65/#Q-
unknown
http://194.15.46.65b
unknown
http://194.15.46.65/_Q
unknown
http://194.15.46.65/#
unknown
http://194.15.46.65/D
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
194.15.46.65
unknown
unknown
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{a45a1e12-f887-c466-19fc-eeaf9b0ff982}\Root\InventoryApplicationFile\knp6kbvvoz.exe|40daf5505b13aaaf
ProgramId
\REGISTRY\A\{a45a1e12-f887-c466-19fc-eeaf9b0ff982}\Root\InventoryApplicationFile\knp6kbvvoz.exe|40daf5505b13aaaf
FileId
\REGISTRY\A\{a45a1e12-f887-c466-19fc-eeaf9b0ff982}\Root\InventoryApplicationFile\knp6kbvvoz.exe|40daf5505b13aaaf
LowerCaseLongPath
\REGISTRY\A\{a45a1e12-f887-c466-19fc-eeaf9b0ff982}\Root\InventoryApplicationFile\knp6kbvvoz.exe|40daf5505b13aaaf
LongPathHash
\REGISTRY\A\{a45a1e12-f887-c466-19fc-eeaf9b0ff982}\Root\InventoryApplicationFile\knp6kbvvoz.exe|40daf5505b13aaaf
Name
\REGISTRY\A\{a45a1e12-f887-c466-19fc-eeaf9b0ff982}\Root\InventoryApplicationFile\knp6kbvvoz.exe|40daf5505b13aaaf
OriginalFileName
\REGISTRY\A\{a45a1e12-f887-c466-19fc-eeaf9b0ff982}\Root\InventoryApplicationFile\knp6kbvvoz.exe|40daf5505b13aaaf
Publisher
\REGISTRY\A\{a45a1e12-f887-c466-19fc-eeaf9b0ff982}\Root\InventoryApplicationFile\knp6kbvvoz.exe|40daf5505b13aaaf
Version
\REGISTRY\A\{a45a1e12-f887-c466-19fc-eeaf9b0ff982}\Root\InventoryApplicationFile\knp6kbvvoz.exe|40daf5505b13aaaf
BinFileVersion
\REGISTRY\A\{a45a1e12-f887-c466-19fc-eeaf9b0ff982}\Root\InventoryApplicationFile\knp6kbvvoz.exe|40daf5505b13aaaf
BinaryType
\REGISTRY\A\{a45a1e12-f887-c466-19fc-eeaf9b0ff982}\Root\InventoryApplicationFile\knp6kbvvoz.exe|40daf5505b13aaaf
ProductName
\REGISTRY\A\{a45a1e12-f887-c466-19fc-eeaf9b0ff982}\Root\InventoryApplicationFile\knp6kbvvoz.exe|40daf5505b13aaaf
ProductVersion
\REGISTRY\A\{a45a1e12-f887-c466-19fc-eeaf9b0ff982}\Root\InventoryApplicationFile\knp6kbvvoz.exe|40daf5505b13aaaf
LinkDate
\REGISTRY\A\{a45a1e12-f887-c466-19fc-eeaf9b0ff982}\Root\InventoryApplicationFile\knp6kbvvoz.exe|40daf5505b13aaaf
BinProductVersion
\REGISTRY\A\{a45a1e12-f887-c466-19fc-eeaf9b0ff982}\Root\InventoryApplicationFile\knp6kbvvoz.exe|40daf5505b13aaaf
AppxPackageFullName
\REGISTRY\A\{a45a1e12-f887-c466-19fc-eeaf9b0ff982}\Root\InventoryApplicationFile\knp6kbvvoz.exe|40daf5505b13aaaf
AppxPackageRelativeId
\REGISTRY\A\{a45a1e12-f887-c466-19fc-eeaf9b0ff982}\Root\InventoryApplicationFile\knp6kbvvoz.exe|40daf5505b13aaaf
Size
\REGISTRY\A\{a45a1e12-f887-c466-19fc-eeaf9b0ff982}\Root\InventoryApplicationFile\knp6kbvvoz.exe|40daf5505b13aaaf
Language
\REGISTRY\A\{a45a1e12-f887-c466-19fc-eeaf9b0ff982}\Root\InventoryApplicationFile\knp6kbvvoz.exe|40daf5505b13aaaf
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2EAF000
heap
page read and write
malicious
526000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
48C0000
direct allocation
page execute and read and write
malicious
49A0000
direct allocation
page read and write
malicious
2E39000
heap
page execute and read and write
1D23D000
stack
page read and write
4EE000
unkown
page execute and read and write
489000
unkown
page readonly
2E2A000
heap
page read and write
2B95000
unkown
page readonly
48F000
unkown
page write copy
1CDBF000
stack
page read and write
19E000
stack
page read and write
51B000
unkown
page execute and read and write
2B95000
unkown
page readonly
1CEBF000
stack
page read and write
1CFFE000
stack
page read and write
2D45000
heap
page read and write
4CBE000
stack
page read and write
2D47000
heap
page read and write
6E8000
unkown
page execute and read and write
4CE0000
heap
page read and write
2E2E000
heap
page read and write
2EF2000
heap
page read and write
4C2E000
stack
page read and write
48F000
unkown
page read and write
9C000
stack
page read and write
1F0000
heap
page read and write
2D40000
heap
page read and write
2E20000
heap
page read and write
4E6000
unkown
page execute and read and write
1D2B1000
heap
page read and write
401000
unkown
page execute read
514000
unkown
page execute and read and write
4C6E000
stack
page read and write
2D10000
heap
page read and write
4BEF000
stack
page read and write
2DA0000
heap
page read and write
1D3B0000
trusted library allocation
page read and write
1CFBE000
stack
page read and write
2CDE000
stack
page read and write
2EE8000
heap
page read and write
1D13E000
stack
page read and write
19C000
stack
page read and write
1D2B0000
heap
page read and write
195000
stack
page read and write
4ADE000
stack
page read and write
2C90000
heap
page read and write
301F000
stack
page read and write
400000
unkown
page readonly
2F01000
heap
page read and write
4AE3000
heap
page read and write
1D0FF000
stack
page read and write
4AE0000
heap
page read and write
6D6000
unkown
page execute and read and write
4A9F000
stack
page read and write
311F000
stack
page read and write
2DFE000
stack
page read and write
40F000
unkown
page execute read
511000
unkown
page execute and read and write
2D8E000
stack
page read and write
48C000
unkown
page write copy
There are 53 hidden memdumps, click here to show them.