IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Domains

Name
IP
Malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
301E000
stack
page read and write
50D1000
heap
page read and write
342F000
stack
page read and write
DB1000
unkown
page execute and read and write
C10000
unkown
page read and write
50C0000
direct allocation
page read and write
66C5000
trusted library allocation
page read and write
E25000
unkown
page execute and read and write
1560000
heap
page read and write
E43000
unkown
page execute and write copy
356F000
stack
page read and write
77DE000
stack
page read and write
396E000
stack
page read and write
66A1000
trusted library allocation
page read and write
5260000
heap
page read and write
C12000
unkown
page execute and write copy
140D000
stack
page read and write
DC2000
unkown
page execute and read and write
4BF0000
heap
page read and write
54D0000
trusted library allocation
page read and write
7A5E000
stack
page read and write
151E000
stack
page read and write
5220000
direct allocation
page read and write
536E000
stack
page read and write
EB2000
unkown
page execute and write copy
35AE000
stack
page read and write
4AAF000
stack
page read and write
55EF000
stack
page read and write
1414000
heap
page read and write
1414000
heap
page read and write
4BEF000
stack
page read and write
50C0000
direct allocation
page read and write
44AE000
stack
page read and write
DAD000
unkown
page execute and write copy
DE3000
unkown
page execute and write copy
322F000
stack
page read and write
78DE000
stack
page read and write
49AE000
stack
page read and write
C12000
unkown
page execute and read and write
E1B000
unkown
page execute and write copy
1414000
heap
page read and write
159E000
heap
page read and write
50C0000
direct allocation
page read and write
E2C000
unkown
page execute and write copy
5650000
heap
page execute and read and write
3027000
heap
page read and write
C10000
unkown
page readonly
3E6E000
stack
page read and write
DAB000
unkown
page execute and read and write
C1A000
unkown
page execute and read and write
50C0000
direct allocation
page read and write
50C0000
direct allocation
page read and write
3AAE000
stack
page read and write
45EE000
stack
page read and write
DAA000
unkown
page execute and write copy
332F000
stack
page read and write
156E000
heap
page read and write
53A0000
trusted library allocation
page read and write
EA9000
unkown
page execute and write copy
DDB000
unkown
page execute and write copy
5394000
trusted library allocation
page read and write
EC0000
unkown
page execute and read and write
5384000
trusted library allocation
page read and write
3BEE000
stack
page read and write
56A1000
trusted library allocation
page read and write
7A1E000
stack
page read and write
C1A000
unkown
page execute and write copy
5630000
trusted library allocation
page read and write
40EE000
stack
page read and write
51D0000
trusted library allocation
page read and write
C16000
unkown
page write copy
E11000
unkown
page execute and write copy
1414000
heap
page read and write
15A0000
heap
page read and write
EB2000
unkown
page execute and write copy
1414000
heap
page read and write
1414000
heap
page read and write
392F000
stack
page read and write
E1A000
unkown
page execute and read and write
5383000
trusted library allocation
page execute and read and write
41EF000
stack
page read and write
1414000
heap
page read and write
54C0000
trusted library allocation
page execute and read and write
496F000
stack
page read and write
3D2E000
stack
page read and write
D80000
unkown
page execute and read and write
5690000
heap
page execute and read and write
D9D000
unkown
page execute and read and write
5220000
direct allocation
page read and write
3E2F000
stack
page read and write
1414000
heap
page read and write
FC0000
heap
page read and write
53AA000
trusted library allocation
page execute and read and write
525B000
stack
page read and write
E53000
unkown
page execute and read and write
779D000
stack
page read and write
C16000
unkown
page write copy
1410000
heap
page read and write
15E8000
heap
page read and write
2FDE000
stack
page read and write
DEF000
unkown
page execute and read and write
50C0000
direct allocation
page read and write
DBE000
unkown
page execute and write copy
346E000
stack
page read and write
50D1000
heap
page read and write
DBF000
unkown
page execute and read and write
50C0000
direct allocation
page read and write
1414000
heap
page read and write
4AEE000
stack
page read and write
15BC000
heap
page read and write
1414000
heap
page read and write
1414000
heap
page read and write
2F5E000
stack
page read and write
D82000
unkown
page execute and write copy
50C0000
direct allocation
page read and write
53B7000
trusted library allocation
page execute and read and write
5390000
trusted library allocation
page read and write
EC0000
unkown
page execute and write copy
53B0000
direct allocation
page execute and read and write
E16000
unkown
page execute and read and write
E4B000
unkown
page execute and read and write
50D1000
heap
page read and write
37EF000
stack
page read and write
156A000
heap
page read and write
1414000
heap
page read and write
3BAF000
stack
page read and write
E17000
unkown
page execute and write copy
1414000
heap
page read and write
432F000
stack
page read and write
50D1000
heap
page read and write
53BB000
trusted library allocation
page execute and read and write
DC1000
unkown
page execute and write copy
66A4000
trusted library allocation
page read and write
791E000
stack
page read and write
DE1000
unkown
page execute and read and write
E23000
unkown
page execute and write copy
2F9C000
stack
page read and write
36EE000
stack
page read and write
7B5E000
stack
page read and write
50E0000
heap
page read and write
155E000
stack
page read and write
1414000
heap
page read and write
50A0000
direct allocation
page read and write
4C3E000
stack
page read and write
446F000
stack
page read and write
40AF000
stack
page read and write
E1C000
unkown
page execute and read and write
F5C000
stack
page read and write
50C0000
direct allocation
page read and write
50C0000
direct allocation
page read and write
E4C000
unkown
page execute and write copy
50C0000
direct allocation
page read and write
53B0000
trusted library allocation
page read and write
C26000
unkown
page execute and write copy
5210000
trusted library allocation
page read and write
50C0000
direct allocation
page read and write
5380000
direct allocation
page execute and read and write
50C0000
direct allocation
page read and write
486E000
stack
page read and write
1414000
heap
page read and write
482F000
stack
page read and write
53D0000
trusted library allocation
page read and write
3CEF000
stack
page read and write
562C000
stack
page read and write
12F9000
stack
page read and write
50D1000
heap
page read and write
382E000
stack
page read and write
54E0000
heap
page read and write
E2D000
unkown
page execute and read and write
3FAE000
stack
page read and write
1414000
heap
page read and write
538D000
trusted library allocation
page execute and read and write
4D3F000
stack
page read and write
3020000
heap
page read and write
46EF000
stack
page read and write
1414000
heap
page read and write
541E000
stack
page read and write
50D0000
heap
page read and write
51D0000
heap
page read and write
45AF000
stack
page read and write
15A8000
heap
page read and write
50C0000
direct allocation
page read and write
472E000
stack
page read and write
5220000
direct allocation
page read and write
422E000
stack
page read and write
175F000
stack
page read and write
1414000
heap
page read and write
312F000
stack
page read and write
436E000
stack
page read and write
3A6F000
stack
page read and write
3F6F000
stack
page read and write
36AF000
stack
page read and write
FD0000
heap
page read and write
There are 183 hidden memdumps, click here to show them.