IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Domains

Name
IP
Malicious
18.31.95.13.in-addr.arpa
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
2ABE000
stack
page read and write
336000
unkown
page write copy
33A000
unkown
page execute and read and write
2937000
heap
page read and write
5E71000
trusted library allocation
page read and write
5E2000
unkown
page execute and read and write
49C0000
heap
page read and write
4B2A000
trusted library allocation
page execute and read and write
49B1000
heap
page read and write
337E000
stack
page read and write
45FF000
stack
page read and write
387E000
stack
page read and write
4C6F000
stack
page read and write
2920000
heap
page read and write
4AC0000
direct allocation
page read and write
3BFF000
stack
page read and write
3D7E000
stack
page read and write
D81000
heap
page read and write
36FF000
stack
page read and write
49B1000
heap
page read and write
4D20000
heap
page execute and read and write
4B03000
trusted library allocation
page execute and read and write
2F7F000
stack
page read and write
49B1000
heap
page read and write
4980000
heap
page read and write
4CDE000
stack
page read and write
49B1000
heap
page read and write
4D60000
heap
page read and write
49B1000
heap
page read and write
43BE000
stack
page read and write
D4A000
heap
page read and write
2CFF000
stack
page read and write
4B6B000
stack
page read and write
333F000
stack
page read and write
4D40000
trusted library allocation
page read and write
30FE000
stack
page read and write
383F000
stack
page read and write
49B0000
heap
page read and write
336000
unkown
page write copy
73CF000
stack
page read and write
103E000
stack
page read and write
423F000
stack
page read and write
49A0000
direct allocation
page read and write
4AC0000
direct allocation
page read and write
49B1000
heap
page read and write
291F000
stack
page read and write
3AFE000
stack
page read and write
2A7F000
stack
page read and write
3E7F000
stack
page read and write
2930000
heap
page read and write
3EBE000
stack
page read and write
49B1000
heap
page read and write
C70000
heap
page read and write
35FE000
stack
page read and write
31FF000
stack
page read and write
330000
unkown
page read and write
D7F000
heap
page read and write
4B14000
trusted library allocation
page read and write
49B1000
heap
page read and write
2FBE000
stack
page read and write
3C3D000
stack
page read and write
49A0000
direct allocation
page read and write
4B04000
trusted library allocation
page read and write
704E000
stack
page read and write
714E000
stack
page read and write
2BFE000
stack
page read and write
3FBF000
stack
page read and write
4AC0000
direct allocation
page read and write
4D30000
trusted library allocation
page execute and read and write
B80000
heap
page read and write
413E000
stack
page read and write
49A0000
direct allocation
page read and write
39BE000
stack
page read and write
4B20000
trusted library allocation
page read and write
3ABF000
stack
page read and write
5E2000
unkown
page execute and write copy
332000
unkown
page execute and write copy
C75000
heap
page read and write
5E3000
unkown
page execute and write copy
332000
unkown
page execute and read and write
397F000
stack
page read and write
49B1000
heap
page read and write
4960000
direct allocation
page read and write
4D50000
trusted library allocation
page read and write
4C77000
trusted library allocation
page execute and read and write
D9E000
heap
page read and write
3FFE000
stack
page read and write
CDE000
stack
page read and write
C60000
heap
page read and write
B39000
stack
page read and write
49B1000
heap
page read and write
2BBF000
stack
page read and write
49B1000
heap
page read and write
5E95000
trusted library allocation
page read and write
4C7B000
trusted library allocation
page execute and read and write
72CE000
stack
page read and write
49A0000
direct allocation
page read and write
49B1000
heap
page read and write
4AF0000
trusted library allocation
page read and write
78C000
unkown
page execute and write copy
373E000
stack
page read and write
49A0000
direct allocation
page read and write
323E000
stack
page read and write
49A0000
direct allocation
page read and write
728E000
stack
page read and write
4AE0000
heap
page read and write
49A0000
direct allocation
page read and write
D1D000
stack
page read and write
5E74000
trusted library allocation
page read and write
49A0000
direct allocation
page read and write
4C3000
unkown
page execute and read and write
34BE000
stack
page read and write
4D50000
heap
page execute and read and write
44BF000
stack
page read and write
4B10000
trusted library allocation
page read and write
D40000
heap
page read and write
78C000
unkown
page execute and write copy
2E7E000
stack
page read and write
D4E000
heap
page read and write
49A0000
direct allocation
page read and write
281E000
stack
page read and write
3D3E000
stack
page read and write
49B1000
heap
page read and write
D89000
heap
page read and write
49A0000
direct allocation
page read and write
4D1C000
stack
page read and write
49B1000
heap
page read and write
4C90000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
718E000
stack
page read and write
49A0000
direct allocation
page read and write
F3F000
stack
page read and write
49A0000
direct allocation
page read and write
5D3000
unkown
page execute and read and write
347F000
stack
page read and write
4B0D000
trusted library allocation
page execute and read and write
30BF000
stack
page read and write
4C90000
direct allocation
page execute and read and write
D8F000
heap
page read and write
49A0000
direct allocation
page read and write
A3C000
stack
page read and write
437F000
stack
page read and write
297B000
stack
page read and write
330000
unkown
page readonly
427E000
stack
page read and write
4E71000
trusted library allocation
page read and write
40FF000
stack
page read and write
49A0000
direct allocation
page read and write
2D3E000
stack
page read and write
2E3F000
stack
page read and write
4E6E000
stack
page read and write
78A000
unkown
page execute and read and write
4AB0000
trusted library allocation
page read and write
700D000
stack
page read and write
49B1000
heap
page read and write
35BF000
stack
page read and write
49B1000
heap
page read and write
44FE000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
There are 149 hidden memdumps, click here to show them.