IOC Report
prog.exe

loading gif

Files

File Path
Type
Category
Malicious
prog.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\win32\svhost.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\prog.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c14qiz0m.w44.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l2k44ady.woi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pya4eufh.ber.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xqt1u0o5.fl2.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\prog.exe
"C:\Users\user\Desktop\prog.exe"
malicious
C:\Users\user\AppData\Local\Temp\prog.exe
"C:\Users\user\AppData\Local\Temp\prog.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop UsoSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop WaaSMedicSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop wuauserv
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop bits
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop dosvc
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe delete "appdata"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe create "appdata" binpath= "C:\ProgramData\win32\svhost.exe" start= "auto"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop eventlog
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe start "appdata"
malicious
C:\ProgramData\win32\svhost.exe
C:\ProgramData\win32\svhost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 25 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://discord.com/2
unknown
https://discord.com/6
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
DontOfferThroughWUAU

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
unkown
page readonly
21C73860000
heap
page read and write
CCEE96F000
stack
page read and write
205352E9000
heap
page read and write
205352E0000
heap
page read and write
2AFE0A60000
heap
page read and write
1483F548000
heap
page read and write
1F30F940000
heap
page read and write
14722A90000
heap
page read and write
B70737F000
stack
page read and write
86D000
heap
page read and write
1F1D9600000
heap
page read and write
21C739D0000
heap
page read and write
48CF000
stack
page read and write
BCA8BCE000
stack
page read and write
278F6C70000
heap
page read and write
1483F460000
heap
page read and write
844000
heap
page read and write
245F000
stack
page read and write
7FF66486B000
unkown
page readonly
7FF7B7AF1000
unkown
page execute read
20535520000
unkown
page read and write
278F7035000
heap
page read and write
25A84E20000
heap
page read and write
21795890000
heap
page read and write
7FF7B7AFB000
unkown
page readonly
26BC0F60000
heap
page read and write
1C0000
heap
page read and write
142A1140000
heap
page read and write
3F00000
heap
page read and write
1F1D9500000
heap
page read and write
402000
unkown
page readonly
21C73670000
heap
page read and write
26BC1020000
heap
page read and write
DADC5FF000
stack
page read and write
205352E6000
heap
page read and write
2BBE4800000
heap
page read and write
A74000
heap
page read and write
1F4CBE10000
heap
page read and write
7FF66486F000
unkown
page write copy
14722A50000
heap
page read and write
82D000
heap
page read and write
142A14F0000
heap
page read and write
2A1C2DC5000
heap
page read and write
19C01580000
heap
page read and write
155937E000
stack
page read and write
2A1C2A80000
heap
page read and write
2AFE0980000
heap
page read and write
DADC19D000
stack
page read and write
4B0C000
stack
page read and write
7FF664860000
unkown
page readonly
266072E000
stack
page read and write
7FF7B7AFE000
unkown
page write copy
278F7030000
heap
page read and write
49AE77E000
unkown
page readonly
2BBE48E0000
heap
page read and write
C95A97F000
stack
page read and write
401000
unkown
page execute read
25A84C30000
heap
page read and write
1C5000
heap
page read and write
14722770000
heap
page read and write
A85000
heap
page read and write
205354C0000
heap
page read and write
1F30FCC5000
heap
page read and write
19C01600000
heap
page read and write
C55096D000
stack
page read and write
278F6C78000
heap
page read and write
20535515000
heap
page read and write
14722778000
heap
page read and write
49AE7FF000
stack
page read and write
7FF664861000
unkown
page execute read
402000
unkown
page readonly
21795870000
heap
page read and write
403000
unkown
page read and write
205352EB000
heap
page read and write
2C3E000
stack
page read and write
71E22FF000
stack
page read and write
A4F000
stack
page read and write
91F9EFE000
stack
page read and write
205353E0000
heap
page read and write
155927F000
stack
page read and write
26BC0F80000
heap
page read and write
71E227D000
stack
page read and write
217959C5000
heap
page read and write
27A0000
heap
page read and write
19C01980000
heap
page read and write
6DA000
unkown
page read and write
DADC4FF000
stack
page read and write
411000
unkown
page write copy
1F1D9400000
heap
page read and write
8AD000
heap
page read and write
142A14F5000
heap
page read and write
278F6BB0000
heap
page read and write
49AE3AC000
stack
page read and write
810000
heap
page read and write
C95A87D000
stack
page read and write
CCEE8ED000
stack
page read and write
ED2208D000
stack
page read and write
278F6BA0000
heap
page read and write
1F1D9620000
heap
page read and write
2A1C2B80000
heap
page read and write
98000
stack
page read and write
BCA8EFF000
stack
page read and write
2A1C2DC0000
heap
page read and write
19C01590000
heap
page read and write
2AFE0B60000
heap
page read and write
6E0000
heap
page read and write
1F4CBD55000
heap
page read and write
403000
unkown
page write copy
1F4CBC60000
heap
page read and write
1F1D95E0000
heap
page read and write
A8A000
heap
page read and write
C73F9D000
stack
page read and write
147226D0000
heap
page read and write
7FF7B7D80000
unkown
page readonly
7FF7B7AFB000
unkown
page readonly
19A000
stack
page read and write
20535510000
heap
page read and write
1F4CBD80000
heap
page read and write
851000
heap
page read and write
7FF7B7D7B000
unkown
page read and write
297E000
stack
page read and write
26BC1028000
heap
page read and write
854000
heap
page read and write
1F1D9414000
heap
page read and write
850000
heap
page read and write
C550C7E000
stack
page read and write
7FF7B7AFF000
unkown
page write copy
21C73690000
heap
page read and write
2A1C2B60000
heap
page read and write
8AD000
heap
page read and write
2BBE4988000
heap
page read and write
49AE87E000
unkown
page readonly
21C73880000
heap
page read and write
14722A95000
heap
page read and write
21795779000
heap
page read and write
142A1110000
heap
page read and write
27CB000
heap
page read and write
F57019D000
stack
page read and write
2BBE4910000
heap
page read and write
2A1C2BB0000
heap
page read and write
2BFE000
stack
page read and write
A70000
heap
page read and write
2AFE0BC0000
heap
page read and write
401000
unkown
page execute read
7FF7B7AF1000
unkown
page execute read
C95AA7E000
stack
page read and write
86C000
heap
page read and write
1F4CBE18000
heap
page read and write
21C739D5000
heap
page read and write
235E000
stack
page read and write
2AFE0BC5000
heap
page read and write
7FF664AEB000
unkown
page read and write
91F9BCD000
stack
page read and write
49CF000
stack
page read and write
26607AE000
stack
page read and write
ED2218E000
stack
page read and write
BCA8ACD000
stack
page read and write
1558F7C000
stack
page read and write
7FF66486E000
unkown
page read and write
19C01985000
heap
page read and write
26606AC000
stack
page read and write
7FF7B7D7D000
unkown
page readonly
2ABE000
stack
page read and write
25A84F85000
heap
page read and write
156047D000
stack
page read and write
26BC0F50000
heap
page read and write
91F9BDD000
stack
page read and write
2AFE0A68000
heap
page read and write
1F1D9408000
heap
page read and write
25A84C38000
heap
page read and write
7FF7B7D7D000
unkown
page readonly
7CE02FC000
stack
page read and write
1F4CBD60000
heap
page read and write
86C000
heap
page read and write
7FF66486E000
unkown
page write copy
47D9000
heap
page read and write
7FF7B7AF0000
unkown
page readonly
7FF664AF0000
unkown
page readonly
2A7F000
stack
page read and write
8B1000
heap
page read and write
25A84F80000
heap
page read and write
147226F0000
heap
page read and write
142A1120000
heap
page read and write
1483F380000
heap
page read and write
7FF7B7AF0000
unkown
page readonly
7C0000
heap
page read and write
3F10000
heap
page read and write
851000
heap
page read and write
21795680000
heap
page read and write
2BBE4980000
heap
page read and write
2C7E000
stack
page read and write
2BBF000
stack
page read and write
C550D7E000
stack
page read and write
1483F540000
heap
page read and write
F5704FF000
stack
page read and write
1F1D9625000
heap
page read and write
F57047F000
stack
page read and write
1483F7F0000
heap
page read and write
26BC12B5000
heap
page read and write
142A11C8000
heap
page read and write
142A11C0000
heap
page read and write
1F30F8F0000
heap
page read and write
4ACF000
stack
page read and write
1483F480000
heap
page read and write
1F30F8C0000
heap
page read and write
B70727D000
stack
page read and write
4C0C000
stack
page read and write
7CE06FF000
stack
page read and write
2A1C2BB8000
heap
page read and write
217959C0000
heap
page read and write
7FF664861000
unkown
page execute read
1483F7F5000
heap
page read and write
848000
heap
page read and write
400000
unkown
page readonly
2AFE0B80000
heap
page read and write
7FF664AF0000
unkown
page readonly
1F30F8D0000
heap
page read and write
7FF664AED000
unkown
page readonly
848000
heap
page read and write
850000
heap
page read and write
7FF664860000
unkown
page readonly
7CE03FF000
stack
page read and write
2BBE48F0000
heap
page read and write
3FD0000
trusted library allocation
page read and write
1F30F947000
heap
page read and write
A80000
heap
page read and write
7FF664AED000
unkown
page readonly
205354E0000
heap
page read and write
7FF66486B000
unkown
page readonly
7FF7B7AFE000
unkown
page read and write
408000
unkown
page read and write
21795770000
heap
page read and write
B7072FF000
stack
page read and write
1F30FCC0000
heap
page read and write
2BBE48E5000
heap
page read and write
278F6BD0000
heap
page read and write
94E000
stack
page read and write
7FF7B7D80000
unkown
page readonly
1F4CBD50000
heap
page read and write
49AE6FE000
stack
page read and write
ED224FF000
stack
page read and write
25A84D40000
heap
page read and write
81B000
heap
page read and write
26BC12B0000
heap
page read and write
147226C0000
heap
page read and write
1F30F94A000
heap
page read and write
21C73698000
heap
page read and write
411000
unkown
page write copy
25A84E40000
heap
page read and write
There are 240 hidden memdumps, click here to show them.