IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Domains

Name
IP
Malicious
ax-0001.ax-msedge.net
150.171.27.10
fp2e7a.wpc.phicdn.net
192.229.221.95
tse1.mm.bing.net
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
306F000
stack
page read and write
CAD000
heap
page read and write
C98000
heap
page read and write
B14000
heap
page read and write
5CD4000
trusted library allocation
page read and write
B14000
heap
page read and write
2DEF000
stack
page read and write
556000
unkown
page execute and write copy
C91000
heap
page read and write
47D1000
heap
page read and write
7E3000
unkown
page execute and write copy
35AE000
stack
page read and write
2727000
heap
page read and write
741000
unkown
page execute and write copy
7A4000
unkown
page execute and read and write
768000
unkown
page execute and read and write
762000
unkown
page execute and write copy
B14000
heap
page read and write
499A000
trusted library allocation
page execute and read and write
725000
unkown
page execute and write copy
436E000
stack
page read and write
B10000
heap
page read and write
CA0000
heap
page read and write
3AAE000
stack
page read and write
7FA000
unkown
page execute and write copy
4AB0000
direct allocation
page execute and read and write
54A000
unkown
page execute and read and write
712E000
stack
page read and write
4BC0000
heap
page read and write
4CD1000
trusted library allocation
page read and write
31AF000
stack
page read and write
5CD1000
trusted library allocation
page read and write
7F8000
unkown
page execute and read and write
72A000
unkown
page execute and read and write
6F20000
heap
page execute and read and write
2CEE000
stack
page read and write
4973000
trusted library allocation
page execute and read and write
727000
unkown
page execute and write copy
B14000
heap
page read and write
346E000
stack
page read and write
6CC000
unkown
page execute and read and write
2B6F000
stack
page read and write
6EEE000
stack
page read and write
542000
unkown
page execute and write copy
7E8000
unkown
page execute and write copy
54A000
unkown
page execute and write copy
6EAE000
stack
page read and write
540000
unkown
page readonly
3E2F000
stack
page read and write
30AE000
stack
page read and write
B14000
heap
page read and write
6BB000
unkown
page execute and read and write
787000
unkown
page execute and read and write
3BEE000
stack
page read and write
4920000
direct allocation
page read and write
332E000
stack
page read and write
47C0000
direct allocation
page read and write
4B60000
trusted library allocation
page execute and read and write
266E000
stack
page read and write
497D000
trusted library allocation
page execute and read and write
48D0000
trusted library allocation
page read and write
546000
unkown
page write copy
4970000
direct allocation
page execute and read and write
4AB0000
trusted library allocation
page read and write
47C0000
direct allocation
page read and write
777000
unkown
page execute and read and write
422E000
stack
page read and write
4984000
trusted library allocation
page read and write
282F000
stack
page read and write
C40000
heap
page read and write
36AF000
stack
page read and write
3E6E000
stack
page read and write
B14000
heap
page read and write
2710000
direct allocation
page read and write
711000
unkown
page execute and write copy
26EE000
stack
page read and write
7FA000
unkown
page execute and write copy
4974000
trusted library allocation
page read and write
47C0000
direct allocation
page read and write
49A0000
heap
page read and write
542000
unkown
page execute and read and write
6F4000
unkown
page execute and read and write
B14000
heap
page read and write
540000
unkown
page read and write
47D1000
heap
page read and write
32EF000
stack
page read and write
4BA0000
heap
page execute and read and write
342F000
stack
page read and write
784000
unkown
page execute and write copy
47C0000
direct allocation
page read and write
6F0000
unkown
page execute and read and write
499000
stack
page read and write
47C0000
direct allocation
page read and write
2720000
heap
page read and write
47D0000
heap
page read and write
392F000
stack
page read and write
B14000
heap
page read and write
47C0000
direct allocation
page read and write
6E6D000
stack
page read and write
382E000
stack
page read and write
3BAF000
stack
page read and write
B14000
heap
page read and write
C5E000
heap
page read and write
6E0000
unkown
page execute and write copy
7F8000
unkown
page execute and write copy
396E000
stack
page read and write
3CEF000
stack
page read and write
446F000
stack
page read and write
C1F000
stack
page read and write
47C0000
direct allocation
page read and write
554000
unkown
page execute and write copy
6D7000
unkown
page execute and write copy
2BAE000
stack
page read and write
47C0000
direct allocation
page read and write
4920000
direct allocation
page read and write
7A2000
unkown
page execute and read and write
47C0000
direct allocation
page read and write
74C000
unkown
page execute and write copy
356F000
stack
page read and write
37EF000
stack
page read and write
40AF000
stack
page read and write
4B5C000
stack
page read and write
6BD000
unkown
page execute and write copy
47C0000
direct allocation
page read and write
4B80000
trusted library allocation
page read and write
47D1000
heap
page read and write
47C0000
direct allocation
page read and write
252E000
stack
page read and write
2CAF000
stack
page read and write
B14000
heap
page read and write
47E0000
heap
page read and write
7A3000
unkown
page execute and write copy
726E000
stack
page read and write
510000
heap
page read and write
4AD0000
trusted library allocation
page read and write
77C000
unkown
page execute and read and write
3FAE000
stack
page read and write
47C0000
direct allocation
page read and write
432F000
stack
page read and write
B14000
heap
page read and write
CDD000
heap
page read and write
770000
unkown
page execute and write copy
3A6F000
stack
page read and write
B14000
heap
page read and write
4B1E000
stack
page read and write
4AB7000
trusted library allocation
page execute and read and write
555000
unkown
page execute and read and write
758000
unkown
page execute and read and write
4920000
direct allocation
page read and write
765000
unkown
page execute and read and write
C5A000
heap
page read and write
36EE000
stack
page read and write
546000
unkown
page write copy
47C0000
direct allocation
page read and write
48D0000
heap
page read and write
3F6F000
stack
page read and write
2A2F000
stack
page read and write
6E2000
unkown
page execute and read and write
B14000
heap
page read and write
4B70000
trusted library allocation
page read and write
B14000
heap
page read and write
6EE000
unkown
page execute and write copy
262E000
stack
page read and write
C50000
heap
page read and write
2A6E000
stack
page read and write
40EE000
stack
page read and write
752000
unkown
page execute and read and write
5CF5000
trusted library allocation
page read and write
4980000
trusted library allocation
page read and write
71C000
unkown
page execute and read and write
7E8000
unkown
page execute and write copy
4ABB000
trusted library allocation
page execute and read and write
B14000
heap
page read and write
B14000
heap
page read and write
39C000
stack
page read and write
4910000
trusted library allocation
page read and write
31EE000
stack
page read and write
6D7000
unkown
page execute and read and write
47D1000
heap
page read and write
41EF000
stack
page read and write
292F000
stack
page read and write
716E000
stack
page read and write
495B000
stack
page read and write
6F3000
unkown
page execute and write copy
702E000
stack
page read and write
778000
unkown
page execute and write copy
2E2E000
stack
page read and write
47C0000
direct allocation
page read and write
500000
heap
page read and write
3D2E000
stack
page read and write
766000
unkown
page execute and write copy
47D1000
heap
page read and write
2F6E000
stack
page read and write
753000
unkown
page execute and write copy
744000
unkown
page execute and read and write
4990000
trusted library allocation
page read and write
726000
unkown
page execute and read and write
4AAF000
stack
page read and write
B0E000
stack
page read and write
B14000
heap
page read and write
7A1000
unkown
page execute and write copy
2F2F000
stack
page read and write
26AC000
stack
page read and write
4CCE000
stack
page read and write
B14000
heap
page read and write
There are 195 hidden memdumps, click here to show them.