IOC Report
werkernel.exe

loading gif

Files

File Path
Type
Category
Malicious
werkernel.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Users\Public\Documents\s1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\werkernel.exe
"C:\Users\user\Desktop\werkernel.exe"
malicious
C:\Users\user\Desktop\werkernel.exe
C:\Users\user\Desktop\werkernel.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1C0EE82E000
heap
page read and write
1EAC732E000
heap
page read and write
1C0EE5B6000
heap
page read and write
1EACB050000
direct allocation
page read and write
1EAC72A0000
heap
page read and write
1C0EE4DC000
heap
page read and write
1C0EE52C000
heap
page read and write
AAFDFFB000
stack
page read and write
1EACB0F7000
heap
page read and write
1C0F0051000
heap
page read and write
7FF74DCBC000
unkown
page readonly
1EAC74AE000
heap
page read and write
1C0F0051000
heap
page read and write
7FF74DCA1000
unkown
page execute read
1EAC7240000
trusted library allocation
page read and write
1C0EE517000
heap
page read and write
1C0EE470000
heap
page read and write
1EAC72EB000
heap
page read and write
7FF74DD11000
unkown
page readonly
1EAC72DA000
heap
page read and write
1EAC7240000
trusted library allocation
page read and write
1EACB178000
heap
page read and write
AAFDDFE000
stack
page read and write
1EAC7240000
trusted library allocation
page read and write
1EAC7334000
heap
page read and write
84A11A9000
stack
page read and write
1C0F005C000
heap
page read and write
1C0F235D000
heap
page read and write
7FF4F8FB2000
trusted library allocation
page readonly
1C0EE7F0000
trusted library allocation
page read and write
1EAC8DD0000
trusted library allocation
page read and write
1C0F2329000
heap
page read and write
1EAC8CD8000
heap
page read and write
7FF74DCA1000
unkown
page execute read
1C0F2B30000
trusted library allocation
page read and write
1C0EE5C3000
heap
page read and write
1EAC8DF0000
trusted library allocation
page read and write
1EAC72A8000
heap
page read and write
1C0F23F7000
heap
page read and write
1EAC74A5000
heap
page read and write
7FF4F8FB5000
trusted library allocation
page execute read
1C0EE5BB000
heap
page read and write
1EAC7363000
heap
page read and write
1C0F2434000
heap
page read and write
1C0F005A000
heap
page read and write
1EAC8CD1000
heap
page read and write
1EACB027000
heap
page read and write
7FF74DCA0000
unkown
page readonly
1C0F005C000
heap
page read and write
1C0EE810000
trusted library allocation
page read and write
1EAC7240000
trusted library allocation
page read and write
1C0F0120000
heap
page read and write
1C0EE5C1000
heap
page read and write
7FF74DCC8000
unkown
page read and write
1EAC7359000
heap
page read and write
1EAC7362000
heap
page read and write
7FF74DD0F000
unkown
page read and write
1EAC8CBE000
heap
page read and write
1C0F0133000
trusted library allocation
page read and write
1EAC7240000
trusted library allocation
page read and write
7FFBC91B0000
direct allocation
page execute and read and write
1EAC8CD8000
heap
page read and write
1EACB0B0000
heap
page read and write
1EACAF50000
heap
page read and write
1EAC8E10000
heap
page read and write
1EAC7301000
heap
page read and write
7FF4A1381000
trusted library allocation
page execute read
1EAC7381000
heap
page read and write
1C0EE57F000
heap
page read and write
7FF74DCC8000
unkown
page read and write
7FF4A1382000
trusted library allocation
page readonly
1C0EE6A0000
trusted library allocation
page read and write
7FF74DD11000
unkown
page readonly
7FF74DCBC000
unkown
page readonly
1C0EE5C3000
heap
page read and write
7FF74DCA1000
unkown
page execute read
1C0EE5C5000
heap
page read and write
1EAC72F9000
heap
page read and write
1EACB810000
trusted library allocation
page read and write
1EACB0B0000
trusted library allocation
page read and write
1C0EE5B1000
heap
page read and write
1EAC7370000
heap
page read and write
1EAC8CBE000
heap
page read and write
84A14FD000
stack
page read and write
7FF4A1384000
trusted library allocation
page readonly
1C0EE825000
heap
page read and write
1C0F0058000
heap
page read and write
1C0EE4A0000
trusted library allocation
page read and write
1C0EE5A1000
heap
page read and write
1C0EE440000
heap
page read and write
1C0EE587000
heap
page read and write
7FF4F8FB0000
trusted library allocation
page readonly
84A19FF000
stack
page read and write
1EAC74AE000
heap
page read and write
7FF74DCC9000
unkown
page write copy
7FF74DD11000
unkown
page readonly
1EAC8DE0000
heap
page read and write
1EAC7305000
heap
page read and write
1EAC7110000
heap
page read and write
AAFE2FE000
stack
page read and write
1EAC8DF0000
trusted library allocation
page read and write
1C0EE511000
heap
page read and write
1EAC71F0000
heap
page read and write
1EAC736B000
heap
page read and write
1EAC8DB0000
trusted library allocation
page read and write
7FF4F8FB3000
trusted library allocation
page execute read
1C0F0193000
trusted library allocation
page read and write
1C0EE576000
heap
page read and write
1EAC7240000
trusted library allocation
page read and write
84A18FF000
stack
page read and write
1EACAFBD000
heap
page read and write
1C0F005A000
heap
page read and write
1C0EE5B1000
heap
page read and write
7FF4A1380000
trusted library allocation
page readonly
1C0EE549000
heap
page read and write
1C0EE6E0000
heap
page read and write
1C0EE6A0000
trusted library allocation
page read and write
1EAC8CD1000
heap
page read and write
1C0EE597000
heap
page read and write
1EACB134000
heap
page read and write
1C0EE532000
heap
page read and write
84A16FB000
stack
page read and write
1C0F0130000
trusted library allocation
page read and write
1EAC7316000
heap
page read and write
1C0EE4A0000
trusted library allocation
page read and write
1C0EE4D0000
heap
page read and write
1EAC7240000
trusted library allocation
page read and write
1EAC8DC0000
trusted library allocation
page read and write
84A17FB000
stack
page read and write
1C0EE4A0000
trusted library allocation
page read and write
1C0F23C0000
trusted library allocation
page read and write
1C0F0058000
heap
page read and write
1EAC7303000
heap
page read and write
AAFD967000
stack
page read and write
1EACB143000
heap
page read and write
1EAC74A0000
heap
page read and write
AAFDEFB000
stack
page read and write
1EAC7210000
heap
page read and write
1EAC8DF3000
trusted library allocation
page read and write
1EAC74A8000
heap
page read and write
1C0F22B0000
heap
page read and write
1C0EE5C4000
heap
page read and write
AAFE0FE000
stack
page read and write
1C0F2351000
heap
page read and write
1C0F0051000
heap
page read and write
1C0EE5A6000
heap
page read and write
7FF74DCA0000
unkown
page readonly
1C0EE5C3000
heap
page read and write
1C0F0190000
trusted library allocation
page read and write
1C0EE5AA000
heap
page read and write
1C0F25B0000
trusted library allocation
page read and write
1C0F23B0000
heap
page read and write
1EAC7366000
heap
page read and write
1C0EE524000
heap
page read and write
1C0EE514000
heap
page read and write
1C0EE6A0000
trusted library allocation
page read and write
7FF74DCA0000
unkown
page readonly
1EAC8E10000
trusted library allocation
page read and write
1C0F0140000
trusted library allocation
page read and write
1EAC8E10000
trusted library allocation
page read and write
1EACAFF1000
heap
page read and write
1C0F26D0000
heap
page read and write
1EAC8CDA000
heap
page read and write
1EAC8CDA000
heap
page read and write
AAFE1FF000
stack
page read and write
1C0F005C000
heap
page read and write
1C0F2478000
heap
page read and write
1C0EE5C3000
heap
page read and write
1C0F23B0000
trusted library allocation
page read and write
1EAC7346000
heap
page read and write
1EACAFF3000
heap
page read and write
7FF74DCC8000
unkown
page write copy
7FF74DCC8000
unkown
page write copy
1C0EE565000
heap
page read and write
1C0F2443000
heap
page read and write
1C0EE5A4000
heap
page read and write
1C0F003E000
heap
page read and write
1C0EE56A000
heap
page read and write
1EAC8E20000
trusted library allocation
page read and write
1EAC72F1000
heap
page read and write
1C0EE5B6000
heap
page read and write
7FF74DD0F000
unkown
page read and write
1C0EE5C5000
heap
page read and write
1C0EE828000
heap
page read and write
1EAC8CD8000
heap
page read and write
1C0EE4FF000
heap
page read and write
1C0EE593000
heap
page read and write
7FFBC91B0000
direct allocation
page execute and read and write
1C0F23B3000
heap
page read and write
1C0F0130000
direct allocation
page read and write
1EAC734F000
heap
page read and write
1C0EE536000
heap
page read and write
1C0EE450000
heap
page read and write
1EAC74A8000
heap
page read and write
1C0EE800000
trusted library allocation
page read and write
1C0EE509000
heap
page read and write
1C0EE538000
heap
page read and write
1C0EE520000
heap
page read and write
1C0EE828000
heap
page read and write
1EAC8CBE000
heap
page read and write
1EAC72DE000
heap
page read and write
84A1AFE000
stack
page read and write
AAFDCFE000
stack
page read and write
1EAC730E000
heap
page read and write
1C0F005A000
heap
page read and write
7FF74DCC9000
unkown
page write copy
7FF74DCA1000
unkown
page execute read
1C0EE4A0000
trusted library allocation
page read and write
1C0EE59E000
heap
page read and write
1EAC735E000
heap
page read and write
1EAC737F000
heap
page read and write
1C0EE6A0000
trusted library allocation
page read and write
1EAC8E33000
trusted library allocation
page read and write
1C0EE53A000
heap
page read and write
7FF4A1385000
trusted library allocation
page execute read
1EAC72FF000
heap
page read and write
1EAC7341000
heap
page read and write
1EAC8DF3000
trusted library allocation
page read and write
1EAC8CD1000
heap
page read and write
7FF74DCBC000
unkown
page readonly
7FF74DD11000
unkown
page readonly
1C0EE534000
heap
page read and write
AAFE3FB000
stack
page read and write
1C0F0190000
trusted library allocation
page read and write
7FF74DCA0000
unkown
page readonly
1C0EE5C1000
heap
page read and write
1C0F0193000
trusted library allocation
page read and write
1C0EE541000
heap
page read and write
1C0F0058000
heap
page read and write
1EACB027000
heap
page read and write
1C0EE5C1000
heap
page read and write
1C0EE5C5000
heap
page read and write
7FF4F8FB4000
trusted library allocation
page readonly
1EACAFD4000
heap
page read and write
1EAC7240000
trusted library allocation
page read and write
1C0F003E000
heap
page read and write
1EACB0B3000
heap
page read and write
1EAC8E30000
trusted library allocation
page read and write
1EAC8CDA000
heap
page read and write
1C0F2386000
heap
page read and write
84A15FE000
stack
page read and write
1EAC8E40000
heap
page read and write
1EAC8E00000
heap
page read and write
1C0EE82E000
heap
page read and write
1C0F003E000
heap
page read and write
7FF74DCBC000
unkown
page readonly
1C0EE820000
heap
page read and write
1C0F01A0000
heap
page read and write
7FF4F8FB1000
trusted library allocation
page execute read
1EAC7375000
heap
page read and write
1C0F01A3000
heap
page read and write
7FF4A1383000
trusted library allocation
page execute read
1EAC7307000
heap
page read and write
1EAC737A000
heap
page read and write
1EAC8E03000
heap
page read and write
1C0EE58C000
heap
page read and write
1EAC7354000
heap
page read and write
There are 247 hidden memdumps, click here to show them.