IOCReport

loading gif

Files

File Path
Type
Category
Malicious
jesovROZ8A.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_jesovROZ8A.exe_43fc5ffcbae1f11637667ee26b773884583759_76289d07_174609fe\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_jesovROZ8A.exe_43fc5ffcbae1f11637667ee26b773884583759_76289d07_1ac5feab\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER28C.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
clean
C:\ProgramData\Microsoft\Windows\WER\Temp\WER32A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
clean
C:\ProgramData\Microsoft\Windows\WER\Temp\WER97.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Jan 31 23:52:05 2021, 0x1205a4 type
dropped
clean
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF4E7.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Jan 31 23:48:57 2021, 0x1205a4 type
dropped
clean
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF6DC.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
clean
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF74A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
clean

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\jesovROZ8A.exe
'C:\Users\user\Desktop\jesovROZ8A.exe'
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 588
clean
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6760 -s 588
clean

Registry

Path
Value
Malicious
C:\Windows\SysWOW64\WerFault.exe
AmiHivePermissionsCorrect
clean
C:\Windows\SysWOW64\WerFault.exe
AmiHiveOwnerCorrect
clean
C:\Windows\SysWOW64\WerFault.exe
ProgramId
clean
C:\Windows\SysWOW64\WerFault.exe
FileId
clean
C:\Windows\SysWOW64\WerFault.exe
LowerCaseLongPath
clean
C:\Windows\SysWOW64\WerFault.exe
LongPathHash
clean
C:\Windows\SysWOW64\WerFault.exe
Name
clean
C:\Windows\SysWOW64\WerFault.exe
Publisher
clean
C:\Windows\SysWOW64\WerFault.exe
Version
clean
C:\Windows\SysWOW64\WerFault.exe
BinFileVersion
clean
C:\Windows\SysWOW64\WerFault.exe
BinaryType
clean
C:\Windows\SysWOW64\WerFault.exe
ProductName
clean
C:\Windows\SysWOW64\WerFault.exe
ProductVersion
clean
C:\Windows\SysWOW64\WerFault.exe
LinkDate
clean
C:\Windows\SysWOW64\WerFault.exe
BinProductVersion
clean
C:\Windows\SysWOW64\WerFault.exe
Size
clean
C:\Windows\SysWOW64\WerFault.exe
Language
clean
C:\Windows\SysWOW64\WerFault.exe
IsPeFile
clean
C:\Windows\SysWOW64\WerFault.exe
IsOsComponent
clean
C:\Windows\SysWOW64\WerFault.exe
ExceptionRecord
clean
C:\Windows\SysWOW64\WerFault.exe
DeviceTicket
clean
C:\Windows\SysWOW64\WerFault.exe
DeviceId
clean
C:\Windows\SysWOW64\WerFault.exe
ApplicationFlags
clean
C:\Windows\SysWOW64\WerFault.exe
00184004E81BE713
clean
C:\Windows\SysWOW64\WerFault.exe
ProgramId
clean
C:\Windows\SysWOW64\WerFault.exe
FileId
clean
C:\Windows\SysWOW64\WerFault.exe
LowerCaseLongPath
clean
C:\Windows\SysWOW64\WerFault.exe
LongPathHash
clean
C:\Windows\SysWOW64\WerFault.exe
Name
clean
C:\Windows\SysWOW64\WerFault.exe
Publisher
clean
C:\Windows\SysWOW64\WerFault.exe
Version
clean
C:\Windows\SysWOW64\WerFault.exe
BinFileVersion
clean
C:\Windows\SysWOW64\WerFault.exe
BinaryType
clean
C:\Windows\SysWOW64\WerFault.exe
ProductName
clean
C:\Windows\SysWOW64\WerFault.exe
ProductVersion
clean
C:\Windows\SysWOW64\WerFault.exe
LinkDate
clean
C:\Windows\SysWOW64\WerFault.exe
BinProductVersion
clean
C:\Windows\SysWOW64\WerFault.exe
Size
clean
C:\Windows\SysWOW64\WerFault.exe
Language
clean
C:\Windows\SysWOW64\WerFault.exe
IsPeFile
clean
C:\Windows\SysWOW64\WerFault.exe
IsOsComponent
clean
C:\Windows\SysWOW64\WerFault.exe
00184004E81B760A
clean
There are 32 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A60000
unkown
page readonly
clean
442000
unkown image
page execute and read and write
clean
80F000
stack
page read and write
clean
446000
unkown image
page read and write
clean
2A3000
unkown
page read and write
clean
90F000
stack
page read and write
clean
400000
unkown image
page readonly
clean
29F000
unkown
page read and write
clean
401000
unkown image
page execute and read and write
clean
61A000
heap default
page read and write
clean
400000
unkown image
page readonly
clean
610000
heap default
page read and write
clean
5E0000
unkown
page execute and read and write
clean
416000
unkown image
page execute and write copy
clean
530000
unkown
page readonly
clean
400000
unkown image
page readonly
clean
445000
unkown image
page execute and write copy
clean
446000
unkown image
page write copy
clean
59E000
unkown
page read and write
clean
550000
heap default
page read and write
clean
520000
unkown
page read and write
clean
A50000
heap private
page read and write
clean
450000
unkown
page readonly
clean
19C000
stack
page read and write
clean
A20000
heap private
page read and write
clean
5DE000
unkown
page read and write
clean
9D000
unkown
page read and write
clean
There are 17 hidden memdumps, click here to show them.