IOC Report
techno POORD035338.exe

loading gif

Files

File Path
Type
Category
Malicious
techno POORD035338.exe
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_techno POORD0353_737df471f3d4707e2576043dad1822d6d9fb458_8d646ceb_696b2f17-e9eb-4dec-987d-5eb09c41ff94\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC1F.tmp.dmp
Mini DuMP crash report, 16 streams, Fri Oct 25 05:52:30 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREB0.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREE0.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hf0vdf5i.0ea.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ldwe3j55.2g2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xnw0gpsf.iix.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xoltasl4.53i.psm1
ASCII text, with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\techno POORD035338.exe
"C:\Users\user\Desktop\techno POORD035338.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\techno POORD035338.exe" -Force
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7472 -s 1600

URLs

Name
IP
Malicious
http://mail.iaa-airferight.com
unknown
malicious
http://upx.sf.net
unknown
https://account.dyn.com/
unknown
http://go.mic
unknown

Domains

Name
IP
Malicious
mail.iaa-airferight.com
46.175.148.58
malicious

IPs

IP
Domain
Country
Malicious
46.175.148.58
mail.iaa-airferight.com
Ukraine
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
EnableLUA
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance
Enabled
\REGISTRY\A\{1cfd0ec7-903c-8f66-40ed-11830f0c378a}\Root\InventoryApplicationFile\techno poord0353|e8df6217b15dac3b
ProgramId
\REGISTRY\A\{1cfd0ec7-903c-8f66-40ed-11830f0c378a}\Root\InventoryApplicationFile\techno poord0353|e8df6217b15dac3b
FileId
\REGISTRY\A\{1cfd0ec7-903c-8f66-40ed-11830f0c378a}\Root\InventoryApplicationFile\techno poord0353|e8df6217b15dac3b
LowerCaseLongPath
\REGISTRY\A\{1cfd0ec7-903c-8f66-40ed-11830f0c378a}\Root\InventoryApplicationFile\techno poord0353|e8df6217b15dac3b
LongPathHash
\REGISTRY\A\{1cfd0ec7-903c-8f66-40ed-11830f0c378a}\Root\InventoryApplicationFile\techno poord0353|e8df6217b15dac3b
Name
\REGISTRY\A\{1cfd0ec7-903c-8f66-40ed-11830f0c378a}\Root\InventoryApplicationFile\techno poord0353|e8df6217b15dac3b
OriginalFileName
\REGISTRY\A\{1cfd0ec7-903c-8f66-40ed-11830f0c378a}\Root\InventoryApplicationFile\techno poord0353|e8df6217b15dac3b
Publisher
\REGISTRY\A\{1cfd0ec7-903c-8f66-40ed-11830f0c378a}\Root\InventoryApplicationFile\techno poord0353|e8df6217b15dac3b
Version
\REGISTRY\A\{1cfd0ec7-903c-8f66-40ed-11830f0c378a}\Root\InventoryApplicationFile\techno poord0353|e8df6217b15dac3b
BinFileVersion
\REGISTRY\A\{1cfd0ec7-903c-8f66-40ed-11830f0c378a}\Root\InventoryApplicationFile\techno poord0353|e8df6217b15dac3b
BinaryType
\REGISTRY\A\{1cfd0ec7-903c-8f66-40ed-11830f0c378a}\Root\InventoryApplicationFile\techno poord0353|e8df6217b15dac3b
ProductName
\REGISTRY\A\{1cfd0ec7-903c-8f66-40ed-11830f0c378a}\Root\InventoryApplicationFile\techno poord0353|e8df6217b15dac3b
ProductVersion
\REGISTRY\A\{1cfd0ec7-903c-8f66-40ed-11830f0c378a}\Root\InventoryApplicationFile\techno poord0353|e8df6217b15dac3b
LinkDate
\REGISTRY\A\{1cfd0ec7-903c-8f66-40ed-11830f0c378a}\Root\InventoryApplicationFile\techno poord0353|e8df6217b15dac3b
BinProductVersion
\REGISTRY\A\{1cfd0ec7-903c-8f66-40ed-11830f0c378a}\Root\InventoryApplicationFile\techno poord0353|e8df6217b15dac3b
AppxPackageFullName
\REGISTRY\A\{1cfd0ec7-903c-8f66-40ed-11830f0c378a}\Root\InventoryApplicationFile\techno poord0353|e8df6217b15dac3b
AppxPackageRelativeId
\REGISTRY\A\{1cfd0ec7-903c-8f66-40ed-11830f0c378a}\Root\InventoryApplicationFile\techno poord0353|e8df6217b15dac3b
Size
\REGISTRY\A\{1cfd0ec7-903c-8f66-40ed-11830f0c378a}\Root\InventoryApplicationFile\techno poord0353|e8df6217b15dac3b
Language
\REGISTRY\A\{1cfd0ec7-903c-8f66-40ed-11830f0c378a}\Root\InventoryApplicationFile\techno poord0353|e8df6217b15dac3b
Usn
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2EE1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2F2E000
trusted library allocation
page read and write
malicious
16880371000
trusted library allocation
page read and write
malicious
16890011000
trusted library allocation
page read and write
malicious
6B70000
trusted library allocation
page read and write
7FF4A2F60000
trusted library allocation
page execute and read and write
168ED3DF000
heap
page read and write
541D000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
5422000
trusted library allocation
page read and write
3EE1000
trusted library allocation
page read and write
1190000
heap
page read and write
7FFD9B5ED000
trusted library allocation
page execute and read and write
7FFD9B5C2000
trusted library allocation
page read and write
168ED415000
heap
page read and write
168EED80000
heap
page read and write
1201000
heap
page read and write
36C46FD000
stack
page read and write
599E000
stack
page read and write
570E000
stack
page read and write
168ED3EC000
heap
page read and write
2F2C000
trusted library allocation
page read and write
7FFD9B6E0000
trusted library allocation
page execute and read and write
61F0000
heap
page read and write
168EF755000
heap
page read and write
656E000
stack
page read and write
168ED160000
heap
page read and write
168ED38C000
heap
page read and write
11FE000
heap
page read and write
1355000
trusted library allocation
page execute and read and write
7FFD9B5DD000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
168EF74C000
heap
page read and write
7FFD9B680000
trusted library allocation
page execute and read and write
2E8F000
stack
page read and write
16880001000
trusted library allocation
page read and write
1298000
heap
page read and write
1324000
trusted library allocation
page read and write
168EEBF0000
heap
page execute and read and write
11F4000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
168EF708000
heap
page read and write
36C40FF000
stack
page read and write
7FFD9B7B0000
trusted library allocation
page execute and read and write
7F580000
trusted library allocation
page execute and read and write
135B000
trusted library allocation
page execute and read and write
1310000
trusted library allocation
page read and write
16880079000
trusted library allocation
page read and write
16880050000
trusted library allocation
page read and write
168ED240000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
36C3DFE000
stack
page read and write
1040000
heap
page read and write
7FFD9B5CD000
trusted library allocation
page execute and read and write
5416000
trusted library allocation
page read and write
6260000
heap
page read and write
1352000
trusted library allocation
page read and write
1340000
trusted library allocation
page read and write
36C3EFE000
stack
page read and write
7FFD9B5E0000
trusted library allocation
page read and write
36C42FE000
stack
page read and write
3F4D000
trusted library allocation
page read and write
7FFD9B5E4000
trusted library allocation
page read and write
7FFD9B5C3000
trusted library allocation
page execute and read and write
168ED290000
heap
page read and write
12AB000
heap
page read and write
134A000
trusted library allocation
page execute and read and write
55AC000
stack
page read and write
5411000
trusted library allocation
page read and write
6233000
heap
page read and write
2ED0000
heap
page execute and read and write
53C0000
trusted library allocation
page execute and read and write
7FFD9B790000
trusted library allocation
page read and write
5402000
trusted library allocation
page read and write
6490000
trusted library allocation
page read and write
36C47FE000
stack
page read and write
1330000
trusted library allocation
page read and write
7FFD9B5C0000
trusted library allocation
page read and write
168ED260000
heap
page read and write
4EE8000
trusted library allocation
page read and write
7FFD9B7C5000
trusted library allocation
page read and write
6570000
trusted library allocation
page execute and read and write
6436000
trusted library allocation
page read and write
168ED280000
heap
page read and write
6E30000
heap
page read and write
648D000
stack
page read and write
5560000
heap
page read and write
36C48FB000
stack
page read and write
6205000
heap
page read and write
540A000
trusted library allocation
page read and write
36C3BFE000
stack
page read and write
168ED0A6000
unkown
page readonly
7FFD9B67C000
trusted library allocation
page execute and read and write
36C3AF2000
stack
page read and write
595E000
stack
page read and write
672E000
stack
page read and write
1248000
heap
page read and write
168ED362000
heap
page read and write
7FFD9B5EB000
trusted library allocation
page execute and read and write
7FFD9B676000
trusted library allocation
page read and write
168ED320000
heap
page read and write
16880118000
trusted library allocation
page read and write
1323000
trusted library allocation
page execute and read and write
168EEBC3000
trusted library allocation
page read and write
168ED0A0000
unkown
page readonly
7FFD9B7A0000
trusted library allocation
page read and write
7FFD9B5D0000
trusted library allocation
page read and write
36C43FD000
stack
page read and write
168ED38A000
heap
page read and write
6580000
trusted library allocation
page read and write
1050000
heap
page read and write
CCA000
stack
page read and write
540E000
trusted library allocation
page read and write
11C0000
heap
page read and write
11CB000
heap
page read and write
61D0000
heap
page read and write
7FFD9B7AC000
trusted library allocation
page read and write
168EEBC0000
trusted library allocation
page read and write
53FE000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
7FFD9B5C4000
trusted library allocation
page read and write
168ED300000
heap
page read and write
574E000
stack
page read and write
16890007000
trusted library allocation
page read and write
168ED310000
trusted library allocation
page read and write
168ED0A2000
unkown
page readonly
1370000
trusted library allocation
page read and write
168EF860000
heap
page read and write
168EF716000
heap
page read and write
6410000
trusted library allocation
page read and write
168ED34B000
heap
page read and write
7FFD9B5D2000
trusted library allocation
page read and write
1380000
heap
page read and write
6BB0000
heap
page read and write
14A6000
heap
page read and write
1236000
heap
page read and write
53E0000
trusted library allocation
page read and write
168EF590000
trusted library section
page read and write
6243000
heap
page read and write
168ED285000
heap
page read and write
1055000
heap
page read and write
7FFD9B7D1000
trusted library allocation
page read and write
53F6000
trusted library allocation
page read and write
53FB000
trusted library allocation
page read and write
6440000
trusted library allocation
page execute and read and write
168EF6C0000
heap
page execute and read and write
5440000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
7FFD9B61C000
trusted library allocation
page execute and read and write
2F44000
trusted library allocation
page read and write
168ED32C000
heap
page read and write
1320000
trusted library allocation
page read and write
6257000
heap
page read and write
12A6000
heap
page read and write
61DC000
heap
page read and write
1030000
heap
page read and write
5460000
heap
page read and write
36C3FFC000
stack
page read and write
652E000
stack
page read and write
5A9E000
stack
page read and write
168ED35F000
heap
page read and write
5750000
heap
page execute and read and write
168EF70B000
heap
page read and write
16890471000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
36C3CFE000
stack
page read and write
168ED2E0000
trusted library allocation
page read and write
168ED3E1000
heap
page read and write
2D8E000
stack
page read and write
DC8000
stack
page read and write
1346000
trusted library allocation
page execute and read and write
5563000
heap
page read and write
6430000
trusted library allocation
page read and write
3F09000
trusted library allocation
page read and write
1688012B000
trusted library allocation
page read and write
1490000
heap
page read and write
168EF759000
heap
page read and write
2ECC000
stack
page read and write
585E000
stack
page read and write
132D000
trusted library allocation
page execute and read and write
1342000
trusted library allocation
page read and write
7FFD9B7C0000
trusted library allocation
page read and write
6209000
heap
page read and write
16890001000
trusted library allocation
page read and write
5AF9000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B779000
trusted library allocation
page read and write
3EE9000
trusted library allocation
page read and write
133D000
trusted library allocation
page execute and read and write
7FFD9B670000
trusted library allocation
page read and write
61D4000
heap
page read and write
507D000
stack
page read and write
14A0000
heap
page read and write
624C000
heap
page read and write
56AC000
stack
page read and write
168EF6D0000
heap
page read and write
1350000
trusted library allocation
page read and write
1262000
heap
page read and write
1357000
trusted library allocation
page execute and read and write
2F36000
trusted library allocation
page read and write
6213000
heap
page read and write
7FFD9B6A6000
trusted library allocation
page execute and read and write
36C41FE000
stack
page read and write
6587000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page execute and read and write
168EEDC0000
trusted library allocation
page read and write
6420000
heap
page read and write
168ED305000
heap
page read and write
641C000
trusted library allocation
page read and write
168902C9000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
There are 203 hidden memdumps, click here to show them.