Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\ProgramData\Google\Chrome\updater.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\drivers\etc\hosts
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1d245st2.f03.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oq1ndhks.u4t.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u4i3bxw0.wii.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zjpnm1vs.e5r.psm1
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData)
-ExclusionExtension '.exe' -Force
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop UsoSvc
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop WaaSMedicSvc
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop wuauserv
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop bits
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop dosvc
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop eventlog
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"
|
||
C:\ProgramData\Google\Chrome\updater.exe
|
C:\ProgramData\Google\Chrome\updater.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wusa.exe
|
wusa /uninstall /kb:890830 /quiet /norestart
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 24 hidden processes, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bg.microsoft.map.fastly.net
|
199.232.214.172
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
|
DontOfferThroughWUAU
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
21B10C30000
|
heap
|
page read and write
|
||
277939B0000
|
heap
|
page read and write
|
||
23A03095000
|
heap
|
page read and write
|
||
7FF7CEC30000
|
unkown
|
page readonly
|
||
1CDB1E18000
|
heap
|
page read and write
|
||
1D634DE0000
|
heap
|
page read and write
|
||
7FF7CF313000
|
unkown
|
page read and write
|
||
1D634CA8000
|
heap
|
page read and write
|
||
1EB35130000
|
heap
|
page read and write
|
||
1FAE3370000
|
heap
|
page read and write
|
||
23A02D00000
|
heap
|
page read and write
|
||
1AE88330000
|
heap
|
page read and write
|
||
9D54E7E000
|
stack
|
page read and write
|
||
7FF7CF696000
|
unkown
|
page execute and read and write
|
||
7FF7CEC30000
|
unkown
|
page readonly
|
||
21B10CDC000
|
heap
|
page read and write
|
||
1FA0B299000
|
heap
|
page read and write
|
||
1F7C19EC000
|
heap
|
page read and write
|
||
1CDB2115000
|
heap
|
page read and write
|
||
21B10C80000
|
direct allocation
|
page read and write
|
||
63D83FE000
|
stack
|
page read and write
|
||
1CDB1DA0000
|
heap
|
page read and write
|
||
7FF7CEC42000
|
unkown
|
page readonly
|
||
FD836FF000
|
stack
|
page read and write
|
||
2891A928000
|
heap
|
page read and write
|
||
1FAE3187000
|
heap
|
page read and write
|
||
E3436DC000
|
stack
|
page read and write
|
||
7FF663241000
|
unkown
|
page readonly
|
||
FD8377E000
|
unkown
|
page readonly
|
||
21B10CD0000
|
heap
|
page read and write
|
||
21B10C80000
|
direct allocation
|
page read and write
|
||
1F7C1C20000
|
direct allocation
|
page read and write
|
||
24FDF950000
|
heap
|
page read and write
|
||
7FF663243000
|
unkown
|
page write copy
|
||
7FF7CEC45000
|
unkown
|
page write copy
|
||
24EE31F0000
|
heap
|
page read and write
|
||
2891A800000
|
heap
|
page read and write
|
||
24EE2EC0000
|
heap
|
page read and write
|
||
7FF66378C000
|
unkown
|
page execute read
|
||
1CDB1DC0000
|
heap
|
page read and write
|
||
21B10F45000
|
heap
|
page read and write
|
||
A3DCB0D000
|
stack
|
page read and write
|
||
21B10C80000
|
direct allocation
|
page read and write
|
||
2891A8E0000
|
heap
|
page read and write
|
||
19ABC9A0000
|
heap
|
page read and write
|
||
DAA7F7F000
|
stack
|
page read and write
|
||
1FA0B290000
|
heap
|
page read and write
|
||
9D54B8C000
|
stack
|
page read and write
|
||
7FF7CF313000
|
unkown
|
page write copy
|
||
19ABCA00000
|
heap
|
page read and write
|
||
7FF662B60000
|
unkown
|
page readonly
|
||
DAA7E7D000
|
stack
|
page read and write
|
||
549427E000
|
stack
|
page read and write
|
||
1F7C1C20000
|
direct allocation
|
page read and write
|
||
7FF66323E000
|
unkown
|
page readonly
|
||
21B10C80000
|
direct allocation
|
page read and write
|
||
7FF662B60000
|
unkown
|
page readonly
|
||
27793C15000
|
heap
|
page read and write
|
||
24AAC1D0000
|
heap
|
page read and write
|
||
5493F2C000
|
stack
|
page read and write
|
||
7FF7CF690000
|
unkown
|
page execute and read and write
|
||
21B10C80000
|
direct allocation
|
page read and write
|
||
23A03090000
|
heap
|
page read and write
|
||
93608FE000
|
stack
|
page read and write
|
||
7FF7CF311000
|
unkown
|
page readonly
|
||
1FA0B210000
|
heap
|
page read and write
|
||
24936918000
|
heap
|
page read and write
|
||
1F7C1C20000
|
direct allocation
|
page read and write
|
||
277939F7000
|
heap
|
page read and write
|
||
1F7C23E0000
|
direct allocation
|
page read and write
|
||
24FDF9A8000
|
heap
|
page read and write
|
||
9D54EFF000
|
stack
|
page read and write
|
||
7FF7CFB57000
|
unkown
|
page readonly
|
||
7FF7CF311000
|
unkown
|
page readonly
|
||
19ABC980000
|
heap
|
page read and write
|
||
2891A920000
|
heap
|
page read and write
|
||
7FF663246000
|
unkown
|
page execute and read and write
|
||
6DA387E000
|
stack
|
page read and write
|
||
5028F7E000
|
stack
|
page read and write
|
||
24AAC505000
|
heap
|
page read and write
|
||
1FA0B440000
|
heap
|
page read and write
|
||
19ABCA08000
|
heap
|
page read and write
|
||
1AE88110000
|
heap
|
page read and write
|
||
7FF7CF315000
|
unkown
|
page readonly
|
||
7FF7CFB57000
|
unkown
|
page readonly
|
||
1FAE3180000
|
heap
|
page read and write
|
||
7FF7CEC42000
|
unkown
|
page readonly
|
||
7FF7CF648000
|
unkown
|
page execute and read and write
|
||
7FF662B75000
|
unkown
|
page write copy
|
||
21B10C50000
|
heap
|
page read and write
|
||
7FF663517000
|
unkown
|
page execute and read and write
|
||
A3DCB8F000
|
stack
|
page read and write
|
||
24EE2DE0000
|
heap
|
page read and write
|
||
1F7C1C30000
|
heap
|
page read and write
|
||
24FDF980000
|
heap
|
page read and write
|
||
24936B20000
|
heap
|
page read and write
|
||
21B10C80000
|
direct allocation
|
page read and write
|
||
1F7C1C20000
|
direct allocation
|
page read and write
|
||
7FF663A87000
|
unkown
|
page readonly
|
||
1EB35040000
|
heap
|
page read and write
|
||
1F7C1C20000
|
direct allocation
|
page read and write
|
||
1F7C1AF0000
|
heap
|
page read and write
|
||
7FF662B72000
|
unkown
|
page readonly
|
||
1CDB1E10000
|
heap
|
page read and write
|
||
24EE31F5000
|
heap
|
page read and write
|
||
277939D0000
|
heap
|
page read and write
|
||
1FA0B445000
|
heap
|
page read and write
|
||
1EB34E30000
|
heap
|
page read and write
|
||
1F7C1C20000
|
direct allocation
|
page read and write
|
||
24AAC500000
|
heap
|
page read and write
|
||
24AAC1C0000
|
heap
|
page read and write
|
||
1D634CA0000
|
heap
|
page read and write
|
||
1AE881F0000
|
heap
|
page read and write
|
||
7FF6635C0000
|
unkown
|
page execute and read and write
|
||
63D7F4C000
|
stack
|
page read and write
|
||
23A02D20000
|
heap
|
page read and write
|
||
4DAA07F000
|
stack
|
page read and write
|
||
24AAC238000
|
heap
|
page read and write
|
||
277939F9000
|
heap
|
page read and write
|
||
1F7C1C20000
|
direct allocation
|
page read and write
|
||
7FF7CF85C000
|
unkown
|
page execute read
|
||
FD8328C000
|
stack
|
page read and write
|
||
1EB34E58000
|
heap
|
page read and write
|
||
936050D000
|
stack
|
page read and write
|
||
B3B16AC000
|
stack
|
page read and write
|
||
1FAE3400000
|
heap
|
page read and write
|
||
E9F1E7E000
|
stack
|
page read and write
|
||
B3B17AE000
|
stack
|
page read and write
|
||
2891ABA5000
|
heap
|
page read and write
|
||
7FF7CF315000
|
unkown
|
page readonly
|
||
5465FCF000
|
stack
|
page read and write
|
||
1D634BB0000
|
heap
|
page read and write
|
||
249368C0000
|
heap
|
page read and write
|
||
24FDFC25000
|
heap
|
page read and write
|
||
7FF66378C000
|
unkown
|
page execute read
|
||
24EE2EE0000
|
heap
|
page read and write
|
||
24FDF9A0000
|
heap
|
page read and write
|
||
24AAC1F0000
|
heap
|
page read and write
|
||
93609FF000
|
stack
|
page read and write
|
||
24EE2F88000
|
heap
|
page read and write
|
||
1FA0B1F0000
|
heap
|
page read and write
|
||
A3DCE7F000
|
stack
|
page read and write
|
||
21B10C80000
|
direct allocation
|
page read and write
|
||
7FF66323E000
|
unkown
|
page readonly
|
||
24EE2F80000
|
heap
|
page read and write
|
||
93604FD000
|
stack
|
page read and write
|
||
1D634DA0000
|
heap
|
page read and write
|
||
1FAE3290000
|
heap
|
page read and write
|
||
21B10CD9000
|
heap
|
page read and write
|
||
2891A900000
|
heap
|
page read and write
|
||
7FF7CF30E000
|
unkown
|
page readonly
|
||
E9F1D7F000
|
stack
|
page read and write
|
||
7FF7CEC45000
|
unkown
|
page read and write
|
||
19ABC880000
|
heap
|
page read and write
|
||
1FAE3405000
|
heap
|
page read and write
|
||
FD8338F000
|
stack
|
page read and write
|
||
9BA367F000
|
stack
|
page read and write
|
||
21B10F40000
|
heap
|
page read and write
|
||
7FF663245000
|
unkown
|
page readonly
|
||
7FF662B72000
|
unkown
|
page readonly
|
||
19ABC975000
|
heap
|
page read and write
|
||
249368D0000
|
heap
|
page read and write
|
||
21B10C80000
|
direct allocation
|
page read and write
|
||
7FF7CEC31000
|
unkown
|
page execute read
|
||
1F7C1C20000
|
direct allocation
|
page read and write
|
||
DAA7EFF000
|
stack
|
page read and write
|
||
7FF6635C6000
|
unkown
|
page execute and read and write
|
||
B3B1AFF000
|
stack
|
page read and write
|
||
24AAC230000
|
heap
|
page read and write
|
||
7FF7CF85C000
|
unkown
|
page execute read
|
||
1EB34E50000
|
heap
|
page read and write
|
||
1FA0B110000
|
heap
|
page read and write
|
||
7FF7CF5E7000
|
unkown
|
page execute and read and write
|
||
21B10C80000
|
direct allocation
|
page read and write
|
||
1D634DD0000
|
heap
|
page read and write
|
||
1FAE3390000
|
heap
|
page read and write
|
||
63D84FF000
|
stack
|
page read and write
|
||
7FF663241000
|
unkown
|
page readonly
|
||
1F7C1C20000
|
direct allocation
|
page read and write
|
||
4DA9D1C000
|
stack
|
page read and write
|
||
1F7C1BD0000
|
heap
|
page read and write
|
||
E3437DE000
|
stack
|
page read and write
|
||
1F7C19E0000
|
heap
|
page read and write
|
||
27793C10000
|
heap
|
page read and write
|
||
19ABC970000
|
heap
|
page read and write
|
||
23A02DE8000
|
heap
|
page read and write
|
||
1CDB1D90000
|
heap
|
page read and write
|
||
5028B2D000
|
stack
|
page read and write
|
||
21B10C80000
|
direct allocation
|
page read and write
|
||
7FF663245000
|
unkown
|
page readonly
|
||
24FDF960000
|
heap
|
page read and write
|
||
7FF663A87000
|
unkown
|
page readonly
|
||
24936910000
|
heap
|
page read and write
|
||
7FF662B61000
|
unkown
|
page execute read
|
||
6DA351D000
|
stack
|
page read and write
|
||
554127F000
|
stack
|
page read and write
|
||
24FDFC20000
|
heap
|
page read and write
|
||
23A02DE0000
|
heap
|
page read and write
|
||
7FF7CF316000
|
unkown
|
page execute and read and write
|
||
21B12A30000
|
unkown
|
page read and write
|
||
23A02C20000
|
heap
|
page read and write
|
||
7FF7CEC31000
|
unkown
|
page execute read
|
||
9BA33BD000
|
stack
|
page read and write
|
||
1F7C1C35000
|
heap
|
page read and write
|
||
277939F0000
|
heap
|
page read and write
|
||
549437E000
|
stack
|
page read and write
|
||
554137F000
|
stack
|
page read and write
|
||
1F7C23E0000
|
direct allocation
|
page read and write
|
||
7FF662B75000
|
unkown
|
page read and write
|
||
7FF662B61000
|
unkown
|
page execute read
|
||
21B10C80000
|
direct allocation
|
page read and write
|
||
249368F0000
|
heap
|
page read and write
|
||
5465ECD000
|
stack
|
page read and write
|
||
7FF663578000
|
unkown
|
page execute and read and write
|
||
1AE88230000
|
heap
|
page read and write
|
||
1EB35135000
|
heap
|
page read and write
|
||
1AE88238000
|
heap
|
page read and write
|
||
4DAA17F000
|
stack
|
page read and write
|
||
1D634DD5000
|
heap
|
page read and write
|
||
6DA397F000
|
stack
|
page read and write
|
||
1EB35020000
|
heap
|
page read and write
|
||
21B10C80000
|
direct allocation
|
page read and write
|
||
7FF663243000
|
unkown
|
page read and write
|
||
277938D0000
|
heap
|
page read and write
|
||
9360AFF000
|
stack
|
page read and write
|
||
1AE88210000
|
heap
|
page read and write
|
||
1AE88215000
|
heap
|
page read and write
|
||
21B10C20000
|
heap
|
page read and write
|
||
5540F4D000
|
stack
|
page read and write
|
||
1F7C1C20000
|
direct allocation
|
page read and write
|
||
9BA36FF000
|
stack
|
page read and write
|
||
E343AFE000
|
stack
|
page read and write
|
||
21B10CA0000
|
unkown
|
page read and write
|
||
21B13252000
|
unkown
|
page read and write
|
||
7FF7CF30E000
|
unkown
|
page readonly
|
||
E9F1C7C000
|
stack
|
page read and write
|
||
63D82FF000
|
stack
|
page read and write
|
||
1CDB20E0000
|
heap
|
page read and write
|
||
1F7C1C20000
|
direct allocation
|
page read and write
|
||
24936B25000
|
heap
|
page read and write
|
||
1CDB2110000
|
heap
|
page read and write
|
||
2891ABA0000
|
heap
|
page read and write
|
||
5465F4F000
|
stack
|
page read and write
|
||
5028E7F000
|
stack
|
page read and write
|
||
21B10CB0000
|
unkown
|
page read and write
|
||
21B10C80000
|
direct allocation
|
page read and write
|
||
21B12A30000
|
direct allocation
|
page read and write
|
||
1F7C1BF0000
|
heap
|
page read and write
|
There are 238 hidden memdumps, click here to show them.