IOC Report
PO ACTUATOR JC35FA2.exe

loading gif

Files

File Path
Type
Category
Malicious
PO ACTUATOR JC35FA2.exe
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_PO ACTUATOR JC35_9dea9cbe367daabf8a1de1fa599ddbad7f1b116a_16a8a9ff_2c87c150-5266-48a6-9715-9b75bd0be811\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8D6F.tmp.dmp
Mini DuMP crash report, 16 streams, Fri Oct 25 05:35:49 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9000.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER906F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0fvvqjr4.wsw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aqxitdmq.3ym.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zike3wmt.pcv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ziw33o3a.aph.psm1
ASCII text, with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PO ACTUATOR JC35FA2.exe
"C:\Users\user\Desktop\PO ACTUATOR JC35FA2.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO ACTUATOR JC35FA2.exe" -Force
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6504 -s 1432

URLs

Name
IP
Malicious
http://upx.sf.net
unknown
https://account.dyn.com/
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
EnableLUA
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance
Enabled
\REGISTRY\A\{9f97aa65-9af0-59f2-a31a-ea70f98f9f79}\Root\InventoryApplicationFile\po actuator jc35|d4b52e9f48981422
ProgramId
\REGISTRY\A\{9f97aa65-9af0-59f2-a31a-ea70f98f9f79}\Root\InventoryApplicationFile\po actuator jc35|d4b52e9f48981422
FileId
\REGISTRY\A\{9f97aa65-9af0-59f2-a31a-ea70f98f9f79}\Root\InventoryApplicationFile\po actuator jc35|d4b52e9f48981422
LowerCaseLongPath
\REGISTRY\A\{9f97aa65-9af0-59f2-a31a-ea70f98f9f79}\Root\InventoryApplicationFile\po actuator jc35|d4b52e9f48981422
LongPathHash
\REGISTRY\A\{9f97aa65-9af0-59f2-a31a-ea70f98f9f79}\Root\InventoryApplicationFile\po actuator jc35|d4b52e9f48981422
Name
\REGISTRY\A\{9f97aa65-9af0-59f2-a31a-ea70f98f9f79}\Root\InventoryApplicationFile\po actuator jc35|d4b52e9f48981422
OriginalFileName
\REGISTRY\A\{9f97aa65-9af0-59f2-a31a-ea70f98f9f79}\Root\InventoryApplicationFile\po actuator jc35|d4b52e9f48981422
Publisher
\REGISTRY\A\{9f97aa65-9af0-59f2-a31a-ea70f98f9f79}\Root\InventoryApplicationFile\po actuator jc35|d4b52e9f48981422
Version
\REGISTRY\A\{9f97aa65-9af0-59f2-a31a-ea70f98f9f79}\Root\InventoryApplicationFile\po actuator jc35|d4b52e9f48981422
BinFileVersion
\REGISTRY\A\{9f97aa65-9af0-59f2-a31a-ea70f98f9f79}\Root\InventoryApplicationFile\po actuator jc35|d4b52e9f48981422
BinaryType
\REGISTRY\A\{9f97aa65-9af0-59f2-a31a-ea70f98f9f79}\Root\InventoryApplicationFile\po actuator jc35|d4b52e9f48981422
ProductName
\REGISTRY\A\{9f97aa65-9af0-59f2-a31a-ea70f98f9f79}\Root\InventoryApplicationFile\po actuator jc35|d4b52e9f48981422
ProductVersion
\REGISTRY\A\{9f97aa65-9af0-59f2-a31a-ea70f98f9f79}\Root\InventoryApplicationFile\po actuator jc35|d4b52e9f48981422
LinkDate
\REGISTRY\A\{9f97aa65-9af0-59f2-a31a-ea70f98f9f79}\Root\InventoryApplicationFile\po actuator jc35|d4b52e9f48981422
BinProductVersion
\REGISTRY\A\{9f97aa65-9af0-59f2-a31a-ea70f98f9f79}\Root\InventoryApplicationFile\po actuator jc35|d4b52e9f48981422
AppxPackageFullName
\REGISTRY\A\{9f97aa65-9af0-59f2-a31a-ea70f98f9f79}\Root\InventoryApplicationFile\po actuator jc35|d4b52e9f48981422
AppxPackageRelativeId
\REGISTRY\A\{9f97aa65-9af0-59f2-a31a-ea70f98f9f79}\Root\InventoryApplicationFile\po actuator jc35|d4b52e9f48981422
Size
\REGISTRY\A\{9f97aa65-9af0-59f2-a31a-ea70f98f9f79}\Root\InventoryApplicationFile\po actuator jc35|d4b52e9f48981422
Language
\REGISTRY\A\{9f97aa65-9af0-59f2-a31a-ea70f98f9f79}\Root\InventoryApplicationFile\po actuator jc35|d4b52e9f48981422
Usn
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2DD65058000
trusted library allocation
page read and write
malicious
36DE000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2DD74D51000
trusted library allocation
page read and write
malicious
3691000
trusted library allocation
page read and write
malicious
1706000
trusted library allocation
page execute and read and write
6800000
trusted library allocation
page read and write
7FF848D52000
trusted library allocation
page read and write
1198000
stack
page read and write
1712000
trusted library allocation
page read and write
16ED000
trusted library allocation
page execute and read and write
3206000
trusted library allocation
page read and write
648E000
stack
page read and write
65DF000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
EB58DFF000
stack
page read and write
19F0000
trusted library allocation
page execute and read and write
693E000
stack
page read and write
7FF848D50000
trusted library allocation
page read and write
1730000
trusted library allocation
page read and write
2DD63160000
unkown
page readonly
7FF848E36000
trusted library allocation
page execute and read and write
2DD7CD70000
trusted library allocation
page read and write
EB58EFE000
stack
page read and write
177F000
heap
page read and write
5DD0000
trusted library allocation
page read and write
6594000
heap
page read and write
5698000
trusted library allocation
page read and write
46B9000
trusted library allocation
page read and write
2DD6333C000
heap
page read and write
2DD7D7A0000
heap
page read and write
67F0000
trusted library allocation
page read and write
2DD75009000
trusted library allocation
page read and write
2DD632AD000
heap
page read and write
EB591FF000
stack
page read and write
65BC000
heap
page read and write
2DD634D5000
heap
page read and write
7FF848F3C000
trusted library allocation
page read and write
7FF848D7B000
trusted library allocation
page execute and read and write
1950000
heap
page read and write
2DD63230000
heap
page read and write
5840000
heap
page read and write
5830000
trusted library allocation
page read and write
2DD63250000
heap
page read and write
16E0000
trusted library allocation
page read and write
1580000
heap
page read and write
2DD7D80C000
heap
page read and write
46F9000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
6810000
trusted library allocation
page execute and read and write
31FA000
trusted library allocation
page read and write
1700000
trusted library allocation
page read and write
7FF848D70000
trusted library allocation
page read and write
EB593FD000
stack
page read and write
7FF848F55000
trusted library allocation
page read and write
2DD63220000
heap
page read and write
6AFE000
stack
page read and write
3230000
heap
page read and write
4699000
trusted library allocation
page read and write
EB590FE000
stack
page read and write
7FF848E0C000
trusted library allocation
page execute and read and write
EB58AF2000
stack
page read and write
EB596FD000
stack
page read and write
1715000
trusted library allocation
page execute and read and write
2DD632E2000
heap
page read and write
2DD74D47000
trusted library allocation
page read and write
6950000
trusted library allocation
page read and write
7FF848DAC000
trusted library allocation
page execute and read and write
2DD63360000
heap
page read and write
2DD63270000
heap
page read and write
7FF848E70000
trusted library allocation
page execute and read and write
7FF848D5D000
trusted library allocation
page execute and read and write
59DE000
stack
page read and write
3240000
heap
page execute and read and write
6806000
trusted library allocation
page read and write
31EE000
trusted library allocation
page read and write
16F0000
trusted library allocation
page read and write
2DD64DF9000
trusted library allocation
page read and write
5A20000
heap
page execute and read and write
7FF848F50000
trusted library allocation
page read and write
16FD000
trusted library allocation
page execute and read and write
7FF848D74000
trusted library allocation
page read and write
6B00000
trusted library allocation
page read and write
2DD7D790000
heap
page execute and read and write
170A000
trusted library allocation
page execute and read and write
5D6E000
stack
page read and write
68FE000
stack
page read and write
31C0000
trusted library allocation
page read and write
2DD751B1000
trusted library allocation
page read and write
334F000
stack
page read and write
400000
remote allocation
page execute and read and write
19DC000
stack
page read and write
2DD634F0000
heap
page read and write
7FF848D54000
trusted library allocation
page read and write
2DD63166000
unkown
page readonly
2DD63595000
heap
page read and write
2DD63440000
heap
page read and write
EB58FFC000
stack
page read and write
597C000
stack
page read and write
6EC0000
heap
page read and write
15C0000
heap
page read and write
2DD63510000
heap
page execute and read and write
2DD632DC000
heap
page read and write
6860000
trusted library allocation
page execute and read and write
7FF848F30000
trusted library allocation
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
5D2E000
stack
page read and write
3201000
trusted library allocation
page read and write
1717000
trusted library allocation
page execute and read and write
31EB000
trusted library allocation
page read and write
31F2000
trusted library allocation
page read and write
16E4000
trusted library allocation
page read and write
582D000
stack
page read and write
16D0000
trusted library allocation
page read and write
2DD632B1000
heap
page read and write
2DD634D0000
heap
page read and write
2DD64D41000
trusted library allocation
page read and write
7FF848D62000
trusted library allocation
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
4691000
trusted library allocation
page read and write
6E80000
heap
page read and write
177C000
heap
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
2DD634C3000
trusted library allocation
page read and write
3220000
trusted library allocation
page read and write
6947000
trusted library allocation
page read and write
6E90000
trusted library allocation
page execute and read and write
65DA000
heap
page read and write
320D000
trusted library allocation
page read and write
36E6000
trusted library allocation
page read and write
31FE000
trusted library allocation
page read and write
2DD64E0E000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
7FF848EF0000
trusted library allocation
page read and write
1702000
trusted library allocation
page read and write
16E3000
trusted library allocation
page execute and read and write
7FF848D53000
trusted library allocation
page execute and read and write
1400000
heap
page read and write
31E6000
trusted library allocation
page read and write
5DC9000
trusted library allocation
page read and write
685D000
stack
page read and write
19E0000
heap
page read and write
2DD7D650000
trusted library section
page read and write
3233000
heap
page read and write
EB58CFE000
stack
page read and write
7FF4DAE40000
trusted library allocation
page execute and read and write
36DC000
trusted library allocation
page read and write
1748000
heap
page read and write
5C2E000
stack
page read and write
6590000
heap
page read and write
7FF848F04000
trusted library allocation
page read and write
1710000
trusted library allocation
page read and write
2DD74D41000
trusted library allocation
page read and write
2DD63590000
heap
page read and write
171B000
trusted library allocation
page execute and read and write
2DD6327C000
heap
page read and write
EB58BFE000
stack
page read and write
EB597FE000
stack
page read and write
7FF848F61000
trusted library allocation
page read and write
1A10000
heap
page read and write
7FF848F00000
trusted library allocation
page read and write
7F2F0000
trusted library allocation
page execute and read and write
7FF848E10000
trusted library allocation
page execute and read and write
6940000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
65B1000
heap
page read and write
5A1E000
stack
page read and write
2DD63299000
heap
page read and write
5B2C000
stack
page read and write
2DD64D66000
trusted library allocation
page read and write
15C5000
heap
page read and write
7FF848F09000
trusted library allocation
page read and write
199E000
stack
page read and write
2DD63490000
trusted library allocation
page read and write
65D8000
heap
page read and write
2DD64E18000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
109A000
stack
page read and write
1520000
heap
page read and write
7FF848F20000
trusted library allocation
page read and write
2DD634B0000
trusted library allocation
page read and write
1740000
heap
page read and write
2DD7D770000
heap
page read and write
180F000
heap
page read and write
2DD63162000
unkown
page readonly
5DDC000
trusted library allocation
page read and write
EB592FE000
stack
page read and write
2DD632AF000
heap
page read and write
2DD632DA000
heap
page read and write
EB598FB000
stack
page read and write
7FF848E06000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
2DD634C0000
trusted library allocation
page read and write
There are 183 hidden memdumps, click here to show them.