IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Google\Chrome\updater.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\drivers\etc\hosts
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1d245st2.f03.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oq1ndhks.u4t.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u4i3bxw0.wii.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zjpnm1vs.e5r.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop UsoSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop WaaSMedicSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop wuauserv
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop bits
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop dosvc
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop eventlog
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"
malicious
C:\ProgramData\Google\Chrome\updater.exe
C:\ProgramData\Google\Chrome\updater.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 24 hidden processes, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
DontOfferThroughWUAU

Memdumps

Base Address
Regiontype
Protect
Malicious
21B10C30000
heap
page read and write
277939B0000
heap
page read and write
23A03095000
heap
page read and write
7FF7CEC30000
unkown
page readonly
1CDB1E18000
heap
page read and write
1D634DE0000
heap
page read and write
7FF7CF313000
unkown
page read and write
1D634CA8000
heap
page read and write
1EB35130000
heap
page read and write
1FAE3370000
heap
page read and write
23A02D00000
heap
page read and write
1AE88330000
heap
page read and write
9D54E7E000
stack
page read and write
7FF7CF696000
unkown
page execute and read and write
7FF7CEC30000
unkown
page readonly
21B10CDC000
heap
page read and write
1FA0B299000
heap
page read and write
1F7C19EC000
heap
page read and write
1CDB2115000
heap
page read and write
21B10C80000
direct allocation
page read and write
63D83FE000
stack
page read and write
1CDB1DA0000
heap
page read and write
7FF7CEC42000
unkown
page readonly
FD836FF000
stack
page read and write
2891A928000
heap
page read and write
1FAE3187000
heap
page read and write
E3436DC000
stack
page read and write
7FF663241000
unkown
page readonly
FD8377E000
unkown
page readonly
21B10CD0000
heap
page read and write
21B10C80000
direct allocation
page read and write
1F7C1C20000
direct allocation
page read and write
24FDF950000
heap
page read and write
7FF663243000
unkown
page write copy
7FF7CEC45000
unkown
page write copy
24EE31F0000
heap
page read and write
2891A800000
heap
page read and write
24EE2EC0000
heap
page read and write
7FF66378C000
unkown
page execute read
1CDB1DC0000
heap
page read and write
21B10F45000
heap
page read and write
A3DCB0D000
stack
page read and write
21B10C80000
direct allocation
page read and write
2891A8E0000
heap
page read and write
19ABC9A0000
heap
page read and write
DAA7F7F000
stack
page read and write
1FA0B290000
heap
page read and write
9D54B8C000
stack
page read and write
7FF7CF313000
unkown
page write copy
19ABCA00000
heap
page read and write
7FF662B60000
unkown
page readonly
DAA7E7D000
stack
page read and write
549427E000
stack
page read and write
1F7C1C20000
direct allocation
page read and write
7FF66323E000
unkown
page readonly
21B10C80000
direct allocation
page read and write
7FF662B60000
unkown
page readonly
27793C15000
heap
page read and write
24AAC1D0000
heap
page read and write
5493F2C000
stack
page read and write
7FF7CF690000
unkown
page execute and read and write
21B10C80000
direct allocation
page read and write
23A03090000
heap
page read and write
93608FE000
stack
page read and write
7FF7CF311000
unkown
page readonly
1FA0B210000
heap
page read and write
24936918000
heap
page read and write
1F7C1C20000
direct allocation
page read and write
277939F7000
heap
page read and write
1F7C23E0000
direct allocation
page read and write
24FDF9A8000
heap
page read and write
9D54EFF000
stack
page read and write
7FF7CFB57000
unkown
page readonly
7FF7CF311000
unkown
page readonly
19ABC980000
heap
page read and write
2891A920000
heap
page read and write
7FF663246000
unkown
page execute and read and write
6DA387E000
stack
page read and write
5028F7E000
stack
page read and write
24AAC505000
heap
page read and write
1FA0B440000
heap
page read and write
19ABCA08000
heap
page read and write
1AE88110000
heap
page read and write
7FF7CF315000
unkown
page readonly
7FF7CFB57000
unkown
page readonly
1FAE3180000
heap
page read and write
7FF7CEC42000
unkown
page readonly
7FF7CF648000
unkown
page execute and read and write
7FF662B75000
unkown
page write copy
21B10C50000
heap
page read and write
7FF663517000
unkown
page execute and read and write
A3DCB8F000
stack
page read and write
24EE2DE0000
heap
page read and write
1F7C1C30000
heap
page read and write
24FDF980000
heap
page read and write
24936B20000
heap
page read and write
21B10C80000
direct allocation
page read and write
1F7C1C20000
direct allocation
page read and write
7FF663A87000
unkown
page readonly
1EB35040000
heap
page read and write
1F7C1C20000
direct allocation
page read and write
1F7C1AF0000
heap
page read and write
7FF662B72000
unkown
page readonly
1CDB1E10000
heap
page read and write
24EE31F5000
heap
page read and write
277939D0000
heap
page read and write
1FA0B445000
heap
page read and write
1EB34E30000
heap
page read and write
1F7C1C20000
direct allocation
page read and write
24AAC500000
heap
page read and write
24AAC1C0000
heap
page read and write
1D634CA0000
heap
page read and write
1AE881F0000
heap
page read and write
7FF6635C0000
unkown
page execute and read and write
63D7F4C000
stack
page read and write
23A02D20000
heap
page read and write
4DAA07F000
stack
page read and write
24AAC238000
heap
page read and write
277939F9000
heap
page read and write
1F7C1C20000
direct allocation
page read and write
7FF7CF85C000
unkown
page execute read
FD8328C000
stack
page read and write
1EB34E58000
heap
page read and write
936050D000
stack
page read and write
B3B16AC000
stack
page read and write
1FAE3400000
heap
page read and write
E9F1E7E000
stack
page read and write
B3B17AE000
stack
page read and write
2891ABA5000
heap
page read and write
7FF7CF315000
unkown
page readonly
5465FCF000
stack
page read and write
1D634BB0000
heap
page read and write
249368C0000
heap
page read and write
24FDFC25000
heap
page read and write
7FF66378C000
unkown
page execute read
24EE2EE0000
heap
page read and write
24FDF9A0000
heap
page read and write
24AAC1F0000
heap
page read and write
93609FF000
stack
page read and write
24EE2F88000
heap
page read and write
1FA0B1F0000
heap
page read and write
A3DCE7F000
stack
page read and write
21B10C80000
direct allocation
page read and write
7FF66323E000
unkown
page readonly
24EE2F80000
heap
page read and write
93604FD000
stack
page read and write
1D634DA0000
heap
page read and write
1FAE3290000
heap
page read and write
21B10CD9000
heap
page read and write
2891A900000
heap
page read and write
7FF7CF30E000
unkown
page readonly
E9F1D7F000
stack
page read and write
7FF7CEC45000
unkown
page read and write
19ABC880000
heap
page read and write
1FAE3405000
heap
page read and write
FD8338F000
stack
page read and write
9BA367F000
stack
page read and write
21B10F40000
heap
page read and write
7FF663245000
unkown
page readonly
7FF662B72000
unkown
page readonly
19ABC975000
heap
page read and write
249368D0000
heap
page read and write
21B10C80000
direct allocation
page read and write
7FF7CEC31000
unkown
page execute read
1F7C1C20000
direct allocation
page read and write
DAA7EFF000
stack
page read and write
7FF6635C6000
unkown
page execute and read and write
B3B1AFF000
stack
page read and write
24AAC230000
heap
page read and write
7FF7CF85C000
unkown
page execute read
1EB34E50000
heap
page read and write
1FA0B110000
heap
page read and write
7FF7CF5E7000
unkown
page execute and read and write
21B10C80000
direct allocation
page read and write
1D634DD0000
heap
page read and write
1FAE3390000
heap
page read and write
63D84FF000
stack
page read and write
7FF663241000
unkown
page readonly
1F7C1C20000
direct allocation
page read and write
4DA9D1C000
stack
page read and write
1F7C1BD0000
heap
page read and write
E3437DE000
stack
page read and write
1F7C19E0000
heap
page read and write
27793C10000
heap
page read and write
19ABC970000
heap
page read and write
23A02DE8000
heap
page read and write
1CDB1D90000
heap
page read and write
5028B2D000
stack
page read and write
21B10C80000
direct allocation
page read and write
7FF663245000
unkown
page readonly
24FDF960000
heap
page read and write
7FF663A87000
unkown
page readonly
24936910000
heap
page read and write
7FF662B61000
unkown
page execute read
6DA351D000
stack
page read and write
554127F000
stack
page read and write
24FDFC20000
heap
page read and write
23A02DE0000
heap
page read and write
7FF7CF316000
unkown
page execute and read and write
21B12A30000
unkown
page read and write
23A02C20000
heap
page read and write
7FF7CEC31000
unkown
page execute read
9BA33BD000
stack
page read and write
1F7C1C35000
heap
page read and write
277939F0000
heap
page read and write
549437E000
stack
page read and write
554137F000
stack
page read and write
1F7C23E0000
direct allocation
page read and write
7FF662B75000
unkown
page read and write
7FF662B61000
unkown
page execute read
21B10C80000
direct allocation
page read and write
249368F0000
heap
page read and write
5465ECD000
stack
page read and write
7FF663578000
unkown
page execute and read and write
1AE88230000
heap
page read and write
1EB35135000
heap
page read and write
1AE88238000
heap
page read and write
4DAA17F000
stack
page read and write
1D634DD5000
heap
page read and write
6DA397F000
stack
page read and write
1EB35020000
heap
page read and write
21B10C80000
direct allocation
page read and write
7FF663243000
unkown
page read and write
277938D0000
heap
page read and write
9360AFF000
stack
page read and write
1AE88210000
heap
page read and write
1AE88215000
heap
page read and write
21B10C20000
heap
page read and write
5540F4D000
stack
page read and write
1F7C1C20000
direct allocation
page read and write
9BA36FF000
stack
page read and write
E343AFE000
stack
page read and write
21B10CA0000
unkown
page read and write
21B13252000
unkown
page read and write
7FF7CF30E000
unkown
page readonly
E9F1C7C000
stack
page read and write
63D82FF000
stack
page read and write
1CDB20E0000
heap
page read and write
1F7C1C20000
direct allocation
page read and write
24936B25000
heap
page read and write
1CDB2110000
heap
page read and write
2891ABA0000
heap
page read and write
5465F4F000
stack
page read and write
5028E7F000
stack
page read and write
21B10CB0000
unkown
page read and write
21B10C80000
direct allocation
page read and write
21B12A30000
direct allocation
page read and write
1F7C1BF0000
heap
page read and write
There are 238 hidden memdumps, click here to show them.