IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Domains

Name
IP
Malicious
s-part-0035.t-0009.t-msedge.net
13.107.246.63

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
310F000
stack
page read and write
DCC000
stack
page read and write
10F8000
unkown
page execute and write copy
E30000
heap
page read and write
1654000
heap
page read and write
172B000
stack
page read and write
1654000
heap
page read and write
35CE000
stack
page read and write
5660000
heap
page execute and read and write
51F0000
direct allocation
page read and write
E6A000
unkown
page execute and write copy
1654000
heap
page read and write
17BF000
heap
page read and write
105A000
unkown
page execute and write copy
54E0000
direct allocation
page execute and read and write
1654000
heap
page read and write
10EF000
unkown
page execute and read and write
5201000
heap
page read and write
5201000
heap
page read and write
51F0000
direct allocation
page read and write
108A000
unkown
page execute and write copy
1654000
heap
page read and write
1110000
unkown
page execute and write copy
1740000
heap
page read and write
1044000
unkown
page execute and write copy
5590000
trusted library allocation
page execute and read and write
108F000
unkown
page execute and read and write
110E000
unkown
page execute and read and write
5660000
trusted library allocation
page read and write
7B2E000
stack
page read and write
3F8F000
stack
page read and write
334E000
stack
page read and write
67D5000
trusted library allocation
page read and write
398E000
stack
page read and write
5300000
trusted library allocation
page read and write
FCC000
unkown
page execute and read and write
FE9000
unkown
page execute and write copy
E40000
heap
page read and write
106B000
unkown
page execute and write copy
5310000
heap
page read and write
3D0F000
stack
page read and write
106F000
unkown
page execute and read and write
3FCE000
stack
page read and write
163F000
stack
page read and write
438E000
stack
page read and write
104F000
unkown
page execute and write copy
1070000
unkown
page execute and write copy
460E000
stack
page read and write
3E8E000
stack
page read and write
51F0000
direct allocation
page read and write
5201000
heap
page read and write
E60000
unkown
page readonly
E66000
unkown
page write copy
4E8F000
stack
page read and write
5200000
heap
page read and write
1654000
heap
page read and write
51F0000
direct allocation
page read and write
424E000
stack
page read and write
FF1000
unkown
page execute and write copy
370E000
stack
page read and write
4C4E000
stack
page read and write
153E000
stack
page read and write
54C0000
trusted library allocation
page read and write
FF3000
unkown
page execute and write copy
108C000
unkown
page execute and read and write
558C000
stack
page read and write
FFC000
unkown
page execute and read and write
3C0E000
stack
page read and write
1091000
unkown
page execute and read and write
1024000
unkown
page execute and write copy
1654000
heap
page read and write
344F000
stack
page read and write
100D000
unkown
page execute and write copy
100F000
unkown
page execute and read and write
54DA000
trusted library allocation
page execute and read and write
448F000
stack
page read and write
108D000
unkown
page execute and write copy
4D8E000
stack
page read and write
7A2E000
stack
page read and write
44CD000
stack
page read and write
51F0000
direct allocation
page read and write
3ACE000
stack
page read and write
56A0000
heap
page read and write
1082000
unkown
page execute and read and write
51F0000
direct allocation
page read and write
109D000
unkown
page execute and read and write
10FE000
unkown
page execute and write copy
5360000
direct allocation
page read and write
1051000
unkown
page execute and read and write
101E000
unkown
page execute and write copy
45CF000
stack
page read and write
5201000
heap
page read and write
420F000
stack
page read and write
1654000
heap
page read and write
16EE000
stack
page read and write
7B6E000
stack
page read and write
1654000
heap
page read and write
67B4000
trusted library allocation
page read and write
169E000
stack
page read and write
109B000
unkown
page execute and write copy
5210000
heap
page read and write
498F000
stack
page read and write
107D000
unkown
page execute and write copy
434F000
stack
page read and write
E76000
unkown
page execute and write copy
51F0000
direct allocation
page read and write
330F000
stack
page read and write
384E000
stack
page read and write
488E000
stack
page read and write
1654000
heap
page read and write
51F0000
direct allocation
page read and write
3D4E000
stack
page read and write
E66000
unkown
page write copy
17B1000
heap
page read and write
54C4000
trusted library allocation
page read and write
1110000
unkown
page execute and write copy
539C000
stack
page read and write
E62000
unkown
page execute and write copy
51F0000
direct allocation
page read and write
51F0000
direct allocation
page read and write
5360000
direct allocation
page read and write
4D4F000
stack
page read and write
55A0000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
FF7000
unkown
page execute and write copy
1025000
unkown
page execute and read and write
549F000
stack
page read and write
51F0000
direct allocation
page read and write
1093000
unkown
page execute and read and write
1654000
heap
page read and write
17CD000
heap
page read and write
484F000
stack
page read and write
54D0000
trusted library allocation
page read and write
79EE000
stack
page read and write
554E000
stack
page read and write
57B1000
trusted library allocation
page read and write
1654000
heap
page read and write
7C6E000
stack
page read and write
4B0E000
stack
page read and write
4C0F000
stack
page read and write
177E000
heap
page read and write
1092000
unkown
page execute and write copy
51F0000
direct allocation
page read and write
FFB000
unkown
page execute and write copy
1090000
unkown
page execute and write copy
1654000
heap
page read and write
14F9000
stack
page read and write
3E4F000
stack
page read and write
5500000
trusted library allocation
page read and write
FEA000
unkown
page execute and read and write
57AE000
stack
page read and write
36CF000
stack
page read and write
FE7000
unkown
page execute and read and write
1039000
unkown
page execute and read and write
49CE000
stack
page read and write
FF3000
unkown
page execute and read and write
380F000
stack
page read and write
3A8F000
stack
page read and write
10ED000
unkown
page execute and write copy
1654000
heap
page read and write
E62000
unkown
page execute and read and write
1770000
heap
page read and write
10FE000
unkown
page execute and write copy
54E7000
trusted library allocation
page execute and read and write
1654000
heap
page read and write
1654000
heap
page read and write
5360000
direct allocation
page read and write
1063000
unkown
page execute and read and write
10B9000
unkown
page execute and write copy
102E000
unkown
page execute and write copy
5201000
heap
page read and write
55B0000
heap
page execute and read and write
394F000
stack
page read and write
1730000
heap
page read and write
105E000
unkown
page execute and read and write
110E000
unkown
page execute and write copy
17B8000
heap
page read and write
1047000
unkown
page execute and read and write
1654000
heap
page read and write
54EB000
trusted library allocation
page execute and read and write
E6A000
unkown
page execute and read and write
5201000
heap
page read and write
E60000
unkown
page read and write
FCE000
unkown
page execute and write copy
1800000
heap
page read and write
67B1000
trusted library allocation
page read and write
51F0000
direct allocation
page read and write
51F0000
direct allocation
page read and write
54B0000
direct allocation
page execute and read and write
1075000
unkown
page execute and read and write
474E000
stack
page read and write
10BD000
unkown
page execute and read and write
1737000
heap
page read and write
54B4000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
54B3000
trusted library allocation
page execute and read and write
105F000
unkown
page execute and write copy
358F000
stack
page read and write
FF8000
unkown
page execute and read and write
1654000
heap
page read and write
470F000
stack
page read and write
51D0000
direct allocation
page read and write
78EE000
stack
page read and write
1650000
heap
page read and write
320F000
stack
page read and write
54BD000
trusted library allocation
page execute and read and write
4ACF000
stack
page read and write
1020000
unkown
page execute and read and write
348E000
stack
page read and write
410E000
stack
page read and write
3BCF000
stack
page read and write
5320000
heap
page read and write
40CF000
stack
page read and write
177A000
heap
page read and write
78AD000
stack
page read and write
There are 205 hidden memdumps, click here to show them.