IOCReport

loading gif

Files

File Path
Type
Category
Malicious
jesovROZ8A.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_jesovROZ8A.exe_43fc5ffcbae1f11637667ee26b773884583759_76289d07_1ac5feab\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF4E7.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Jan 31 23:48:57 2021, 0x1205a4 type
dropped
clean
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF6DC.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
clean
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF74A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
clean

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\jesovROZ8A.exe
'C:\Users\user\Desktop\jesovROZ8A.exe'
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6760 -s 588
clean

Registry

Path
Value
Malicious
C:\Windows\SysWOW64\WerFault.exe
AmiHivePermissionsCorrect
clean
C:\Windows\SysWOW64\WerFault.exe
AmiHiveOwnerCorrect
clean
C:\Windows\SysWOW64\WerFault.exe
ProgramId
clean
C:\Windows\SysWOW64\WerFault.exe
FileId
clean
C:\Windows\SysWOW64\WerFault.exe
LowerCaseLongPath
clean
C:\Windows\SysWOW64\WerFault.exe
LongPathHash
clean
C:\Windows\SysWOW64\WerFault.exe
Name
clean
C:\Windows\SysWOW64\WerFault.exe
Publisher
clean
C:\Windows\SysWOW64\WerFault.exe
Version
clean
C:\Windows\SysWOW64\WerFault.exe
BinFileVersion
clean
C:\Windows\SysWOW64\WerFault.exe
BinaryType
clean
C:\Windows\SysWOW64\WerFault.exe
ProductName
clean
C:\Windows\SysWOW64\WerFault.exe
ProductVersion
clean
C:\Windows\SysWOW64\WerFault.exe
LinkDate
clean
C:\Windows\SysWOW64\WerFault.exe
BinProductVersion
clean
C:\Windows\SysWOW64\WerFault.exe
Size
clean
C:\Windows\SysWOW64\WerFault.exe
Language
clean
C:\Windows\SysWOW64\WerFault.exe
IsPeFile
clean
C:\Windows\SysWOW64\WerFault.exe
IsOsComponent
clean
C:\Windows\SysWOW64\WerFault.exe
ExceptionRecord
clean
C:\Windows\SysWOW64\WerFault.exe
DeviceTicket
clean
C:\Windows\SysWOW64\WerFault.exe
DeviceId
clean
C:\Windows\SysWOW64\WerFault.exe
ApplicationFlags
clean
C:\Windows\SysWOW64\WerFault.exe
00184004E81B760A
clean
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
unkown image
page readonly
clean
9D000
unkown
page read and write
clean
401000
unkown image
page execute and read and write
clean
446000
unkown image
page write copy
clean
AE0000
unkown
page readonly
clean
62E000
unkown
page read and write
clean
5EE000
unkown
page read and write
clean
400000
unkown image
page readonly
clean
AD0000
heap private
page read and write
clean
450000
unkown
page readonly
clean
97D000
stack
page read and write
clean
680000
heap default
page read and write
clean
520000
unkown
page read and write
clean
87F000
stack
page read and write
clean
22D0000
heap private
page read and write
clean
308000
unkown
page read and write
clean
30C000
unkown
page read and write
clean
446000
unkown image
page read and write
clean
445000
unkown image
page execute and write copy
clean
5AE000
unkown
page read and write
clean
540000
unkown
page execute and read and write
clean
442000
unkown image
page execute and read and write
clean
530000
unkown
page readonly
clean
19C000
stack
page read and write
clean
560000
heap default
page read and write
clean
68A000
heap default
page read and write
clean
400000
unkown image
page readonly
clean
416000
unkown image
page execute and write copy
clean
A7F000
stack
page read and write
clean
There are 19 hidden memdumps, click here to show them.