IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://go.microsoft.c
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
66A000
unkown
page execute and read and write
668000
unkown
page execute and write copy
427F000
stack
page read and write
67C000
unkown
page execute and write copy
313E000
stack
page read and write
70D000
unkown
page execute and write copy
650000
unkown
page execute and write copy
E24000
heap
page read and write
4E20000
trusted library allocation
page read and write
2D7E000
stack
page read and write
323F000
stack
page read and write
377E000
stack
page read and write
4C31000
heap
page read and write
4E80000
trusted library allocation
page execute and read and write
2E7F000
stack
page read and write
403E000
stack
page read and write
E24000
heap
page read and write
F1A000
heap
page read and write
6B6000
unkown
page execute and read and write
4C20000
direct allocation
page read and write
E20000
heap
page read and write
33BE000
stack
page read and write
715000
unkown
page execute and write copy
699000
unkown
page execute and read and write
3AFF000
stack
page read and write
4D80000
direct allocation
page read and write
4D80000
direct allocation
page read and write
F51000
heap
page read and write
60E000
unkown
page execute and read and write
F9C000
heap
page read and write
34BF000
stack
page read and write
4C31000
heap
page read and write
696000
unkown
page execute and write copy
724000
unkown
page execute and write copy
42BE000
stack
page read and write
E24000
heap
page read and write
486000
unkown
page write copy
30FF000
stack
page read and write
35FF000
stack
page read and write
2C3B000
stack
page read and write
337F000
stack
page read and write
724000
unkown
page execute and read and write
E24000
heap
page read and write
4C20000
direct allocation
page read and write
6D4000
unkown
page execute and read and write
38BE000
stack
page read and write
68C000
unkown
page execute and write copy
6A5000
unkown
page execute and write copy
67A000
unkown
page execute and read and write
107D000
stack
page read and write
34FE000
stack
page read and write
4C20000
direct allocation
page read and write
4D80000
direct allocation
page read and write
4C40000
heap
page read and write
477F000
stack
page read and write
726000
unkown
page execute and write copy
4E07000
trusted library allocation
page execute and read and write
463F000
stack
page read and write
480000
unkown
page readonly
1010000
heap
page read and write
373F000
stack
page read and write
5F4000
unkown
page execute and write copy
2EBE000
stack
page read and write
482000
unkown
page execute and read and write
72CD000
stack
page read and write
2FFE000
stack
page read and write
2A80000
heap
page read and write
E24000
heap
page read and write
BB9000
stack
page read and write
70C000
unkown
page execute and read and write
E24000
heap
page read and write
6D3000
unkown
page execute and write copy
643000
unkown
page execute and write copy
F4F000
heap
page read and write
E24000
heap
page read and write
4C20000
direct allocation
page read and write
387F000
stack
page read and write
4C20000
direct allocation
page read and write
417E000
stack
page read and write
3DBE000
stack
page read and write
4C20000
direct allocation
page read and write
4F9E000
stack
page read and write
48A000
unkown
page execute and read and write
608000
unkown
page execute and read and write
43BF000
stack
page read and write
3D7F000
stack
page read and write
683000
unkown
page execute and read and write
61A000
unkown
page execute and write copy
662000
unkown
page execute and read and write
3EBF000
stack
page read and write
12BE000
stack
page read and write
4DE4000
trusted library allocation
page read and write
F5A000
heap
page read and write
39BF000
stack
page read and write
4C20000
direct allocation
page read and write
69C000
unkown
page execute and read and write
3C7E000
stack
page read and write
5131000
trusted library allocation
page read and write
3B3E000
stack
page read and write
4D30000
trusted library allocation
page read and write
3C3F000
stack
page read and write
4C20000
direct allocation
page read and write
61B000
unkown
page execute and read and write
661000
unkown
page execute and write copy
F6E000
heap
page read and write
4E30000
heap
page read and write
2AB7000
heap
page read and write
4C31000
heap
page read and write
E24000
heap
page read and write
726000
unkown
page execute and write copy
603000
unkown
page execute and read and write
E24000
heap
page read and write
E24000
heap
page read and write
68F000
unkown
page execute and read and write
4D70000
trusted library allocation
page read and write
4E0B000
trusted library allocation
page execute and read and write
4DD3000
trusted library allocation
page execute and read and write
4E00000
direct allocation
page execute and read and write
6C4000
unkown
page execute and read and write
ABC000
stack
page read and write
F10000
heap
page read and write
6AC000
unkown
page execute and read and write
4E00000
trusted library allocation
page read and write
467E000
stack
page read and write
4C31000
heap
page read and write
4C20000
direct allocation
page read and write
4C31000
heap
page read and write
4C31000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
76CE000
stack
page read and write
2AB0000
heap
page read and write
E30000
heap
page read and write
642000
unkown
page execute and read and write
64F000
unkown
page execute and read and write
E24000
heap
page read and write
4E7E000
stack
page read and write
11BE000
stack
page read and write
607000
unkown
page execute and write copy
43FE000
stack
page read and write
4DFA000
trusted library allocation
page execute and read and write
F62000
heap
page read and write
656000
unkown
page execute and read and write
4DBC000
stack
page read and write
496000
unkown
page execute and write copy
F1E000
heap
page read and write
6C3000
unkown
page execute and write copy
6155000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
5F1000
unkown
page execute and read and write
6B4000
unkown
page execute and write copy
4C30000
heap
page read and write
69A000
unkown
page execute and write copy
48BF000
stack
page read and write
4C20000
direct allocation
page read and write
4DD4000
trusted library allocation
page read and write
4C20000
direct allocation
page read and write
75CE000
stack
page read and write
730E000
stack
page read and write
E24000
heap
page read and write
740E000
stack
page read and write
E24000
heap
page read and write
39FE000
stack
page read and write
4E90000
heap
page read and write
117E000
stack
page read and write
715000
unkown
page execute and write copy
50F0000
trusted library allocation
page read and write
70B000
unkown
page execute and write copy
663000
unkown
page execute and write copy
4D30000
heap
page read and write
2D3F000
stack
page read and write
60E000
unkown
page execute and write copy
674000
unkown
page execute and write copy
44FF000
stack
page read and write
327E000
stack
page read and write
5120000
heap
page execute and read and write
47BE000
stack
page read and write
4DDD000
trusted library allocation
page execute and read and write
E24000
heap
page read and write
480000
unkown
page read and write
641000
unkown
page execute and write copy
E24000
heap
page read and write
4C20000
direct allocation
page read and write
482000
unkown
page execute and write copy
758F000
stack
page read and write
6134000
trusted library allocation
page read and write
453E000
stack
page read and write
4C20000
direct allocation
page read and write
E24000
heap
page read and write
2FBF000
stack
page read and write
E24000
heap
page read and write
748E000
stack
page read and write
3FFE000
stack
page read and write
50DC000
stack
page read and write
2AFE000
stack
page read and write
4C31000
heap
page read and write
4DE0000
trusted library allocation
page read and write
4C00000
direct allocation
page read and write
486000
unkown
page write copy
667000
unkown
page execute and read and write
363E000
stack
page read and write
7440000
heap
page execute and read and write
413F000
stack
page read and write
6131000
trusted library allocation
page read and write
3EFE000
stack
page read and write
48A000
unkown
page execute and write copy
E24000
heap
page read and write
2BFF000
stack
page read and write
509E000
stack
page read and write
4C20000
direct allocation
page read and write
There are 200 hidden memdumps, click here to show them.