IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Google\Chrome\updater.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\drivers\etc\hosts
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_atx1kxze.b3p.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dttdhj3x.tsb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ouxzafp2.mzc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vqcv2kii.ovj.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop UsoSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop WaaSMedicSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop wuauserv
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop bits
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop dosvc
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop eventlog
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"
malicious
C:\ProgramData\Google\Chrome\updater.exe
C:\ProgramData\Google\Chrome\updater.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
There are 25 hidden processes, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
DontOfferThroughWUAU

Memdumps

Base Address
Regiontype
Protect
Malicious
794CEFF000
stack
page read and write
16671A20000
direct allocation
page read and write
17A81958000
heap
page read and write
C15DDAF000
stack
page read and write
7FF76C82E000
unkown
page execute read
F19CA7E000
unkown
page readonly
1FEA0470000
heap
page read and write
AD3F7F000
stack
page read and write
2AEF0202000
trusted library allocation
page read and write
270AE0D8000
heap
page read and write
1C8A38D0000
unkown
page read and write
276957B8000
heap
page read and write
7FF7A6685000
unkown
page read and write
16671DE0000
heap
page read and write
55A4D7F000
stack
page read and write
17A81890000
heap
page read and write
A0DF19E000
stack
page read and write
1C8A1B20000
direct allocation
page read and write
2162D510000
heap
page read and write
F19CCFE000
stack
page read and write
F19C374000
stack
page read and write
16671A20000
direct allocation
page read and write
7FF76CB3A000
unkown
page readonly
270AE040000
heap
page read and write
15C08F40000
heap
page read and write
7FF7A6D56000
unkown
page execute and read and write
2A57D0A0000
heap
page read and write
28CD3B10000
heap
page read and write
C562AFE000
stack
page read and write
7FF76C2AE000
unkown
page readonly
2A57CD00000
heap
page read and write
16671A20000
direct allocation
page read and write
F19CC7E000
unkown
page readonly
6A035DE000
stack
page read and write
17974FE0000
heap
page read and write
270AE0D0000
heap
page read and write
1350F935000
heap
page read and write
2A57CDB8000
heap
page read and write
7FF76C2B5000
unkown
page readonly
16671A20000
direct allocation
page read and write
7FF76C5E0000
unkown
page execute and read and write
7FF7A6D51000
unkown
page readonly
7FF76C5EC000
unkown
page execute and read and write
1FEA7D000
stack
page read and write
6A034DD000
stack
page read and write
276957B0000
heap
page read and write
151A8618000
heap
page read and write
16672400000
direct allocation
page read and write
17974D80000
heap
page read and write
16671A20000
direct allocation
page read and write
2162D4A0000
heap
page read and write
1C8A1B50000
unkown
page read and write
28CD3BA8000
heap
page read and write
F19CB7E000
stack
page read and write
270AE055000
heap
page read and write
27695A65000
heap
page read and write
304579F000
stack
page read and write
1C8A1B20000
direct allocation
page read and write
C15DCAD000
stack
page read and write
7FF7A75DA000
unkown
page readonly
7FF7A6670000
unkown
page readonly
7FF76BBD1000
unkown
page execute read
15C09120000
heap
page read and write
BCDC6AD000
stack
page read and write
AD3E7D000
stack
page read and write
C562CFF000
stack
page read and write
E99FAFF000
stack
page read and write
1C8A1B20000
direct allocation
page read and write
1C8A1B20000
direct allocation
page read and write
23CB3640000
heap
page read and write
1C8A1B20000
direct allocation
page read and write
7FF7A7084000
unkown
page execute and read and write
2DD18FF000
stack
page read and write
151A85D0000
heap
page read and write
E99F79E000
stack
page read and write
C562AED000
stack
page read and write
7FF7A6671000
unkown
page execute read
7FF7A707A000
unkown
page execute and read and write
7FF7A6670000
unkown
page readonly
16671A20000
direct allocation
page read and write
1C8A1B40000
unkown
page read and write
28CD3B30000
heap
page read and write
1FEA0810000
heap
page read and write
7FF76BBD0000
unkown
page readonly
2A57CCD0000
heap
page read and write
23CB3660000
heap
page read and write
C15E0FF000
stack
page read and write
2A57D0B5000
heap
page read and write
16671A20000
direct allocation
page read and write
1C8A1DE0000
heap
page read and write
1C8A1B20000
direct allocation
page read and write
270AE050000
heap
page read and write
217804E0000
heap
page read and write
21780915000
heap
page read and write
151A84D0000
heap
page read and write
7FF7A6671000
unkown
page execute read
AD3EFF000
stack
page read and write
7FF76BBE2000
unkown
page readonly
1C8A38D0000
direct allocation
page read and write
F19C67E000
unkown
page readonly
7FF76CB3A000
unkown
page readonly
7FF76C2B5000
unkown
page readonly
1FEB7E000
stack
page read and write
2AEEFA00000
heap
page read and write
7FF7A6682000
unkown
page readonly
F19C174000
stack
page read and write
1C8A1B60000
heap
page read and write
7FF76C2B1000
unkown
page readonly
26190FF000
stack
page read and write
C562BFE000
stack
page read and write
304569C000
stack
page read and write
217805B0000
heap
page read and write
7FF7A7082000
unkown
page execute and read and write
1FEA0400000
heap
page read and write
27695620000
heap
page read and write
F19CD7E000
unkown
page readonly
2AEEFB02000
heap
page read and write
23CB36A0000
heap
page read and write
7FF7A6D53000
unkown
page write copy
28CD3BA0000
heap
page read and write
1FEA03D0000
heap
page read and write
BCDCAFE000
stack
page read and write
7FF76C624000
unkown
page execute and read and write
7FF7A6D51000
unkown
page readonly
7FF7A6682000
unkown
page readonly
7FF7A7080000
unkown
page execute and read and write
17A81790000
heap
page read and write
7FF76BBE5000
unkown
page write copy
151A8610000
heap
page read and write
1C8A1B20000
direct allocation
page read and write
7FF76C2B6000
unkown
page execute and read and write
28CD3ED5000
heap
page read and write
B50E87C000
stack
page read and write
F19BD7D000
stack
page read and write
17A81BB5000
heap
page read and write
2A57D0B0000
heap
page read and write
A0DF09D000
stack
page read and write
2162D550000
heap
page read and write
2AEEFA02000
heap
page read and write
F19C07E000
unkown
page readonly
F19C77C000
stack
page read and write
1FEA03E0000
heap
page read and write
16671A20000
direct allocation
page read and write
7FF76C2B3000
unkown
page read and write
2162D4B0000
heap
page read and write
1C8A1B20000
direct allocation
page read and write
2AEEFA2B000
heap
page read and write
7FF7A6D53000
unkown
page read and write
2A57CD98000
heap
page read and write
F19C27E000
unkown
page readonly
1C8A1B20000
direct allocation
page read and write
270AE060000
heap
page read and write
7FF76C2B1000
unkown
page readonly
B58C4FE000
stack
page read and write
7FF7A6D55000
unkown
page readonly
16671A7E000
heap
page read and write
1C8A1AC0000
heap
page read and write
2162D4D0000
heap
page read and write
217805C5000
heap
page read and write
15C08F88000
heap
page read and write
2AEEFA6A000
heap
page read and write
F19BAFE000
stack
page read and write
16671A60000
heap
page read and write
2AEEFA44000
heap
page read and write
2A57CCE0000
heap
page read and write
217805B8000
heap
page read and write
F19C573000
stack
page read and write
10047E000
stack
page read and write
6A038FF000
stack
page read and write
270AE080000
heap
page read and write
10017F000
stack
page read and write
7FF7A70CA000
unkown
page execute and read and write
166719F0000
heap
page read and write
1350F580000
heap
page read and write
1C8A1B20000
direct allocation
page read and write
1C8A1B20000
direct allocation
page read and write
7FF7A75DA000
unkown
page readonly
2AEEF970000
heap
page read and write
2618B5D000
stack
page read and write
7FF76C82E000
unkown
page execute read
2AEEFA53000
heap
page read and write
10007C000
stack
page read and write
23CB3870000
heap
page read and write
15C08F60000
heap
page read and write
7FF76C5DA000
unkown
page execute and read and write
7FF76C5E4000
unkown
page execute and read and write
166719C0000
heap
page read and write
27695720000
heap
page read and write
2AEEF890000
heap
page read and write
2AEEF870000
heap
page read and write
55A4CFF000
stack
page read and write
166719D0000
heap
page read and write
217804F0000
heap
page read and write
B50E97F000
stack
page read and write
1350F750000
heap
page read and write
16671A20000
direct allocation
page read and write
17974DD8000
heap
page read and write
17A81870000
heap
page read and write
E99F69D000
stack
page read and write
7FF7A708C000
unkown
page execute and read and write
7FF7A6685000
unkown
page write copy
55A4C7D000
stack
page read and write
2618FFF000
stack
page read and write
1FEA0815000
heap
page read and write
27695700000
heap
page read and write
1350F589000
heap
page read and write
F19BBFF000
stack
page read and write
28CD3ED0000
heap
page read and write
23CB3665000
heap
page read and write
2162D515000
heap
page read and write
7FF76BBD0000
unkown
page readonly
7FF76BBE2000
unkown
page readonly
794CBCD000
stack
page read and write
F19C47E000
unkown
page readonly
151A85B0000
heap
page read and write
7FF76BBD1000
unkown
page execute read
17974DA0000
heap
page read and write
23CB36A8000
heap
page read and write
1350F770000
heap
page read and write
27695A60000
heap
page read and write
1AD37630000
heap
page read and write
7FF7A6D4E000
unkown
page readonly
1AD37448000
heap
page read and write
21780910000
heap
page read and write
16671A6C000
heap
page read and write
16671A20000
direct allocation
page read and write
F19B7AB000
stack
page read and write
1C8A1AF0000
heap
page read and write
1AD37440000
heap
page read and write
17974CA0000
heap
page read and write
1C8A1B20000
direct allocation
page read and write
16671DE5000
heap
page read and write
7FF7A6D55000
unkown
page readonly
1C8A1DE5000
heap
page read and write
2DD15CD000
stack
page read and write
7FF7A70C4000
unkown
page execute and read and write
23CB3670000
heap
page read and write
2162D558000
heap
page read and write
7FF76C62A000
unkown
page execute and read and write
21780510000
heap
page read and write
7FF7A72CE000
unkown
page execute read
15C08F80000
heap
page read and write
1FEA0478000
heap
page read and write
1AD37845000
heap
page read and write
17A81BB0000
heap
page read and write
7FF76C2AE000
unkown
page readonly
15C08E60000
heap
page read and write
1AD37840000
heap
page read and write
C562DFF000
stack
page read and write
2AEEFA13000
heap
page read and write
1350F560000
heap
page read and write
2DD187F000
stack
page read and write
15C09125000
heap
page read and write
A0DF11F000
stack
page read and write
7FF76BBE5000
unkown
page read and write
F19C87E000
unkown
page readonly
16671A20000
direct allocation
page read and write
1C8A1AD0000
heap
page read and write
7FF7A72CE000
unkown
page execute read
2618EFE000
stack
page read and write
1350F930000
heap
page read and write
7FF76C5DC000
unkown
page execute and read and write
B58C1CD000
stack
page read and write
7FF76C5E2000
unkown
page execute and read and write
B58C47E000
stack
page read and write
F19BF7E000
stack
page read and write
17974FE5000
heap
page read and write
1C8A1B20000
direct allocation
page read and write
1C8A4101000
unkown
page read and write
F19C97E000
stack
page read and write
28CD3B00000
heap
page read and write
2AEEF9A0000
trusted library allocation
page read and write
794CFFF000
stack
page read and write
16671A20000
direct allocation
page read and write
1AD37650000
heap
page read and write
7FF7A6D4E000
unkown
page readonly
17A81950000
heap
page read and write
151A8840000
heap
page read and write
1AD37550000
heap
page read and write
7FF76C2B3000
unkown
page write copy
3045AFF000
stack
page read and write
151A8845000
heap
page read and write
7FF7A707C000
unkown
page execute and read and write
1C8A1B69000
heap
page read and write
BCDC7AE000
stack
page read and write
17974DD0000
heap
page read and write
1C8A1B6C000
heap
page read and write
2A57CD90000
heap
page read and write
1FEC7E000
stack
page read and write
F19BE7E000
unkown
page readonly
There are 280 hidden memdumps, click here to show them.