IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Windows\Temp\gtebvdararzg.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hmgre3nn.jyw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r4oek4jq.iqf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_twscbzmi.cu3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ukrdmtf5.ewz.psm1
ASCII text, with no line terminators
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Windows\Temp\__PSScriptPolicyTest_1ksoiwsx.q32.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_l35xcuuo.y1v.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_o2zndmgw.43f.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_usg3rmda.ml4.ps1
ASCII text, with no line terminators
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe delete "MXOLIHZI"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe create "MXOLIHZI" binpath= "C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exe" start= "auto"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop eventlog
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe start "MXOLIHZI"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exe
C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\conhost.exe
conhost.exe
malicious
C:\Windows\System32\notepad.exe
notepad.exe
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\notepad.exe
notepad.exe
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
There are 15 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://172.94.1q
unknown
https://xmrig.com/docs/algorithms
unknown

Domains

Name
IP
Malicious
pool.hashvault.pro
45.76.89.70
malicious
bg.microsoft.map.fastly.net
199.232.210.172

IPs

IP
Domain
Country
Malicious
45.76.89.70
pool.hashvault.pro
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
DontOfferThroughWUAU

Memdumps

Base Address
Regiontype
Protect
Malicious
140001000
unkown
page execute and read and write
malicious
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
7FF728790000
unkown
page readonly
122A4359000
unkown
page read and write
1BB80540000
direct allocation
page read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
122A4915000
heap
page read and write
10D5968F000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
164CEFB000
stack
page read and write
10D545CA000
heap
page read and write
10D54680000
trusted library allocation
page read and write
122A4BA9000
direct allocation
page execute and read and write
22270C40000
heap
page read and write
7FF728790000
unkown
page readonly
10D54190000
trusted library allocation
page read and write
122A3A80000
heap
page read and write
14000A000
unkown
page readonly
10D5828F000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
1A27F470000
heap
page read and write
22270D60000
heap
page read and write
10D54190000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
2960BEF5000
heap
page read and write
10D54190000
trusted library allocation
page read and write
140000000
unkown
page read and write
10DD6720000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
1F7CFA30000
heap
page read and write
10D53FB0000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
10D53F80000
direct allocation
page execute read
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
1C801A00000
heap
page read and write
328D2CD000
stack
page read and write
10D54011000
heap
page read and write
7EF6D7E000
stack
page read and write
10D54190000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
1A27F3F0000
heap
page read and write
35417E000
stack
page read and write
10DD6720000
trusted library allocation
page read and write
353FFE000
unkown
page readonly
290A25D0000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
14078B000
unkown
page execute and read and write
10D54190000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
290A2730000
heap
page read and write
7FF728B0C000
unkown
page readonly
10D54190000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
655B0FE000
stack
page read and write
10D5408C000
heap
page read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
122A4BB0000
unkown
page read and write
10D5648F000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
352F0B000
stack
page read and write
1C801920000
heap
page read and write
328D6FF000
stack
page read and write
22270D35000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
A27167D000
stack
page read and write
1F7CF6F0000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
3540FE000
unkown
page readonly
10D5407D000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
10D54560000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
1C801B30000
heap
page read and write
7FF728770000
unkown
page readonly
10D54190000
trusted library allocation
page read and write
1BBFE340000
heap
page read and write
140009000
unkown
page read and write
10DD6720000
trusted library allocation
page read and write
1A27F400000
heap
page read and write
10D54190000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10D53FC9000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
35387E000
stack
page read and write
10DD6720000
trusted library allocation
page read and write
2960BB40000
heap
page read and write
10D54190000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
122A48C0000
unkown
page read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
1F7CF7F0000
heap
page read and write
B6126FE000
stack
page read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
2960BEF0000
heap
page read and write
1BB80C10000
unkown
page read and write
10D54190000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
7EF6C7C000
stack
page read and write
10DD6720000
trusted library allocation
page read and write
7FF63B8DC000
unkown
page readonly
10D53E50000
heap
page read and write
7EF6E7E000
stack
page read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
1A27F6F5000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
1BB80000000
unkown
page execute read
10DD6720000
trusted library allocation
page read and write
1BB80007000
unkown
page read and write
10D54190000
trusted library allocation
page read and write
17791F55000
heap
page read and write
10D54190000
trusted library allocation
page read and write
1BB80C09000
direct allocation
page execute and read and write
290A2735000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
A0A18ED000
stack
page read and write
1BB80542000
direct allocation
page read and write
1F7CFA35000
heap
page read and write
2960BC20000
heap
page read and write
1C801A38000
heap
page read and write
10D54190000
trusted library allocation
page read and write
1404DC000
unkown
page execute and read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
14080D000
unkown
page execute and read and write
10DD66E0000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10D54180000
heap
page readonly
10DD6720000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
22270DF0000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
122A4921000
direct allocation
page execute and read and write
1BB80970000
heap
page read and write
1C801CF5000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
10D54012000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
35367D000
stack
page read and write
7FF63B8DC000
unkown
page readonly
10D54190000
trusted library allocation
page read and write
1BB802AB000
unkown
page read and write
10D54190000
trusted library allocation
page read and write
10D545BA000
heap
page read and write
10DD66E0000
trusted library allocation
page read and write
1BB80981000
direct allocation
page execute and read and write
353DFE000
unkown
page readonly
7FF63B8DB000
unkown
page read and write
10D54190000
trusted library allocation
page read and write
2960D870000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
17791F97000
heap
page read and write
10DD66E0000
trusted library allocation
page read and write
2960BC40000
heap
page read and write
10D54190000
trusted library allocation
page read and write
122A40B0000
unkown
page execute read
10DD6720000
trusted library allocation
page read and write
10D5A08F000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
122A40B8000
unkown
page read and write
10DD6720000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
122A45F2000
direct allocation
page read and write
140007000
unkown
page readonly
17791E10000
heap
page read and write
10D54190000
trusted library allocation
page read and write
1A27F478000
heap
page read and write
10D54021000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10D541C5000
heap
page read and write
17791F90000
heap
page read and write
7FF63B540000
unkown
page readonly
122A40B0000
unkown
page read and write
10D54190000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
10D5788F000
heap
page read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
122A4910000
heap
page read and write
10D5508F000
heap
page read and write
10D54190000
trusted library allocation
page read and write
1F7CF848000
heap
page read and write
A27187E000
stack
page read and write
10D54190000
trusted library allocation
page read and write
1C801CF0000
heap
page read and write
164CFFE000
stack
page read and write
10D54190000
trusted library allocation
page read and write
10D54680000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
1BBFE240000
heap
page read and write
10D54190000
trusted library allocation
page read and write
1A27F420000
heap
page read and write
10D54190000
trusted library allocation
page read and write
10D54087000
heap
page read and write
290A28B0000
unkown
page read and write
655B17F000
stack
page read and write
353EFE000
stack
page read and write
10DD6720000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
290A26B0000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
353A7E000
stack
page read and write
10DD66E0000
trusted library allocation
page read and write
10D53F30000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
1C801A30000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10DD66E0000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
7FF728B0B000
unkown
page write copy
10D54190000
trusted library allocation
page read and write
1BBFE420000
heap
page read and write
7FF63B8DB000
unkown
page write copy
10DD6720000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
90C687E000
stack
page read and write
122A45F0000
direct allocation
page read and write
1BB80975000
heap
page read and write
7FF63B540000
unkown
page readonly
2960BD08000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
22270DF9000
heap
page read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10D545D2000
heap
page read and write
1A27F6F0000
heap
page read and write
10D56E8F000
heap
page read and write
10D54190000
trusted library allocation
page read and write
328D3CE000
stack
page read and write
10D54190000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
17791F10000
heap
page read and write
10D54190000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
7FF728771000
unkown
page execute read
10DD6720000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
164D1FD000
stack
page read and write
10DD6720000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
35397E000
stack
page read and write
10DD6720000
trusted library allocation
page read and write
10D53F50000
heap
page read and write
140000000
unkown
page read and write
140500000
unkown
page execute and read and write
10D545A0000
heap
page read and write
1F7CF7D0000
heap
page read and write
A27177F000
stack
page read and write
B6128FD000
stack
page read and write
10D54190000
trusted library allocation
page read and write
10DD66E0000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
10D545C2000
heap
page read and write
7FF63B541000
unkown
page execute read
10DD6720000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
122A48C0000
unkown
page read and write
140847000
unkown
page read and write
353CFE000
stack
page read and write
10DD66E0000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
10D58C8F000
heap
page read and write
B6127FF000
stack
page read and write
3541FE000
unkown
page readonly
10DD6720000
trusted library allocation
page read and write
122A3AA1000
heap
page read and write
3537FE000
unkown
page readonly
10DD6720000
trusted library allocation
page read and write
1BBFE24C000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
7FF63B541000
unkown
page execute read
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
F532F1C000
stack
page read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
F53327E000
stack
page read and write
17791EF0000
heap
page read and write
10D54190000
trusted library allocation
page read and write
10D541C0000
heap
page read and write
1BB807F0000
unkown
page read and write
164D1EE000
stack
page read and write
10DD6720000
trusted library allocation
page read and write
10DD66E0000
trusted library allocation
page read and write
10DD66E0000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
1F7CF840000
heap
page read and write
3536FE000
unkown
page readonly
7FF728770000
unkown
page readonly
10DD66A0000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
B61233B000
stack
page read and write
164D0FE000
stack
page read and write
1BB80000000
unkown
page read and write
353B7E000
stack
page read and write
35407E000
stack
page read and write
10D53FF7000
heap
page read and write
10D545E2000
heap
page read and write
10D54190000
trusted library allocation
page read and write
7FF728B0B000
unkown
page read and write
10D54190000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
140840000
unkown
page execute and read and write
10DD6720000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
1BB807D0000
unkown
page read and write
10D54190000
trusted library allocation
page read and write
1BBFE246000
heap
page read and write
10D54190000
trusted library allocation
page read and write
10D5468F000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
122A48A0000
unkown
page read and write
290A27B0000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
140503000
unkown
page execute and read and write
122A4880000
unkown
page read and write
122A3A8C000
heap
page read and write
10D54190000
trusted library allocation
page read and write
22270D40000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
7FF728771000
unkown
page execute read
10DD6720000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
35377C000
stack
page read and write
10DD66E0000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
22270D30000
heap
page read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
10D54190000
trusted library allocation
page read and write
122A3A50000
heap
page read and write
17791F50000
heap
page read and write
10DD6720000
trusted library allocation
page read and write
140001000
unkown
page execute read
1BB80870000
heap
page read and write
10D545DA000
heap
page read and write
10DD66E0000
trusted library allocation
page read and write
F532F9E000
stack
page read and write
90C697E000
stack
page read and write
7FF728B0C000
unkown
page readonly
90C653C000
stack
page read and write
655B07C000
stack
page read and write
10D53FB9000
heap
page read and write
10D55A8F000
heap
page read and write
10D54190000
trusted library allocation
page read and write
10DD6720000
trusted library allocation
page read and write
122A4900000
heap
page read and write
7FF63B560000
unkown
page readonly
10DD6720000
trusted library allocation
page read and write
7FF63B560000
unkown
page readonly
10D54190000
trusted library allocation
page read and write
2960BD00000
heap
page read and write
122A3A40000
heap
page read and write
10D54190000
trusted library allocation
page read and write
B6128ED000
stack
page read and write
There are 392 hidden memdumps, click here to show them.