IOC Report
JVi84k2SSG.exe

loading gif

Files

File Path
Type
Category
Malicious
JVi84k2SSG.exe
MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_JVi84k2SSG.exe_aaf5fb1229312d3629a7c2d9a95c3d927f59b_bb82a7eb_366d3244-1402-4362-b5e5-cfb8e92736bd\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3272.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 24 00:34:53 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER32B1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER32D1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\JVi84k2SSG.exe
"C:\Users\user\Desktop\JVi84k2SSG.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7324 -s 236

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{963adffb-f8c8-e39e-7a71-d4a53b80cf83}\Root\InventoryApplicationFile\jvi84k2ssg.exe|a856a995aee508f5
ProgramId
\REGISTRY\A\{963adffb-f8c8-e39e-7a71-d4a53b80cf83}\Root\InventoryApplicationFile\jvi84k2ssg.exe|a856a995aee508f5
FileId
\REGISTRY\A\{963adffb-f8c8-e39e-7a71-d4a53b80cf83}\Root\InventoryApplicationFile\jvi84k2ssg.exe|a856a995aee508f5
LowerCaseLongPath
\REGISTRY\A\{963adffb-f8c8-e39e-7a71-d4a53b80cf83}\Root\InventoryApplicationFile\jvi84k2ssg.exe|a856a995aee508f5
LongPathHash
\REGISTRY\A\{963adffb-f8c8-e39e-7a71-d4a53b80cf83}\Root\InventoryApplicationFile\jvi84k2ssg.exe|a856a995aee508f5
Name
\REGISTRY\A\{963adffb-f8c8-e39e-7a71-d4a53b80cf83}\Root\InventoryApplicationFile\jvi84k2ssg.exe|a856a995aee508f5
OriginalFileName
\REGISTRY\A\{963adffb-f8c8-e39e-7a71-d4a53b80cf83}\Root\InventoryApplicationFile\jvi84k2ssg.exe|a856a995aee508f5
Publisher
\REGISTRY\A\{963adffb-f8c8-e39e-7a71-d4a53b80cf83}\Root\InventoryApplicationFile\jvi84k2ssg.exe|a856a995aee508f5
Version
\REGISTRY\A\{963adffb-f8c8-e39e-7a71-d4a53b80cf83}\Root\InventoryApplicationFile\jvi84k2ssg.exe|a856a995aee508f5
BinFileVersion
\REGISTRY\A\{963adffb-f8c8-e39e-7a71-d4a53b80cf83}\Root\InventoryApplicationFile\jvi84k2ssg.exe|a856a995aee508f5
BinaryType
\REGISTRY\A\{963adffb-f8c8-e39e-7a71-d4a53b80cf83}\Root\InventoryApplicationFile\jvi84k2ssg.exe|a856a995aee508f5
ProductName
\REGISTRY\A\{963adffb-f8c8-e39e-7a71-d4a53b80cf83}\Root\InventoryApplicationFile\jvi84k2ssg.exe|a856a995aee508f5
ProductVersion
\REGISTRY\A\{963adffb-f8c8-e39e-7a71-d4a53b80cf83}\Root\InventoryApplicationFile\jvi84k2ssg.exe|a856a995aee508f5
LinkDate
\REGISTRY\A\{963adffb-f8c8-e39e-7a71-d4a53b80cf83}\Root\InventoryApplicationFile\jvi84k2ssg.exe|a856a995aee508f5
BinProductVersion
\REGISTRY\A\{963adffb-f8c8-e39e-7a71-d4a53b80cf83}\Root\InventoryApplicationFile\jvi84k2ssg.exe|a856a995aee508f5
AppxPackageFullName
\REGISTRY\A\{963adffb-f8c8-e39e-7a71-d4a53b80cf83}\Root\InventoryApplicationFile\jvi84k2ssg.exe|a856a995aee508f5
AppxPackageRelativeId
\REGISTRY\A\{963adffb-f8c8-e39e-7a71-d4a53b80cf83}\Root\InventoryApplicationFile\jvi84k2ssg.exe|a856a995aee508f5
Size
\REGISTRY\A\{963adffb-f8c8-e39e-7a71-d4a53b80cf83}\Root\InventoryApplicationFile\jvi84k2ssg.exe|a856a995aee508f5
Language
\REGISTRY\A\{963adffb-f8c8-e39e-7a71-d4a53b80cf83}\Root\InventoryApplicationFile\jvi84k2ssg.exe|a856a995aee508f5
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
19D000
stack
page read and write
411000
unkown
page readonly
1F0000
heap
page read and write
40F000
unkown
page execute and write copy
51E000
heap
page read and write
400000
unkown
page readonly
4C0000
heap
page read and write
411000
unkown
page readonly
51A000
heap
page read and write
40F000
unkown
page execute and read and write
430000
heap
page read and write
510000
heap
page read and write
400000
unkown
page readonly
9D000
stack
page read and write
There are 4 hidden memdumps, click here to show them.