IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
FC0000
heap
page read and write
87F000
unkown
page execute and read and write
344F000
stack
page read and write
685000
unkown
page execute and read and write
158F000
stack
page read and write
7FF000
unkown
page execute and write copy
50F1000
heap
page read and write
812000
unkown
page execute and read and write
8D9000
unkown
page execute and read and write
438E000
stack
page read and write
856000
unkown
page execute and read and write
5420000
trusted library allocation
page execute and read and write
3E8E000
stack
page read and write
5440000
heap
page execute and read and write
879000
unkown
page execute and read and write
3A8F000
stack
page read and write
8C4000
unkown
page execute and read and write
50F1000
heap
page read and write
53BE000
stack
page read and write
358F000
stack
page read and write
15EC000
heap
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
161E000
heap
page read and write
1590000
heap
page read and write
394F000
stack
page read and write
6615000
trusted library allocation
page read and write
2F6E000
stack
page read and write
159E000
heap
page read and write
8C0000
unkown
page execute and write copy
384E000
stack
page read and write
30EE000
stack
page read and write
50E0000
direct allocation
page read and write
434F000
stack
page read and write
527B000
stack
page read and write
50E0000
direct allocation
page read and write
670000
unkown
page readonly
672000
unkown
page execute and write copy
529A000
trusted library allocation
page execute and read and write
7FD000
unkown
page execute and write copy
35CE000
stack
page read and write
50E0000
direct allocation
page read and write
91C000
unkown
page execute and write copy
348E000
stack
page read and write
55F1000
trusted library allocation
page read and write
7910000
heap
page execute and read and write
50E0000
direct allocation
page read and write
67A000
unkown
page execute and read and write
424E000
stack
page read and write
8A7000
unkown
page execute and write copy
330F000
stack
page read and write
905000
unkown
page execute and write copy
541E000
stack
page read and write
398E000
stack
page read and write
50E0000
direct allocation
page read and write
4C4E000
stack
page read and write
50F0000
heap
page read and write
7F6000
unkown
page execute and write copy
50E0000
direct allocation
page read and write
137E000
stack
page read and write
7FE000
unkown
page execute and read and write
8F8000
unkown
page execute and write copy
672000
unkown
page execute and read and write
40CF000
stack
page read and write
861000
unkown
page execute and read and write
498F000
stack
page read and write
5230000
trusted library allocation
page read and write
8F9000
unkown
page execute and read and write
85E000
unkown
page execute and write copy
13B5000
heap
page read and write
778D000
stack
page read and write
827000
unkown
page execute and write copy
13A0000
heap
page read and write
88A000
unkown
page execute and read and write
895000
unkown
page execute and write copy
869000
unkown
page execute and write copy
548C000
stack
page read and write
420F000
stack
page read and write
54CE000
stack
page read and write
801000
unkown
page execute and read and write
875000
unkown
page execute and read and write
45CF000
stack
page read and write
5223000
trusted library allocation
page execute and read and write
55EE000
stack
page read and write
7DD000
unkown
page execute and write copy
5100000
heap
page read and write
84C000
unkown
page execute and write copy
873000
unkown
page execute and write copy
4B0E000
stack
page read and write
91E000
unkown
page execute and write copy
5234000
trusted library allocation
page read and write
84D000
unkown
page execute and read and write
15D1000
heap
page read and write
50F1000
heap
page read and write
5240000
direct allocation
page read and write
7A1F000
stack
page read and write
52AB000
trusted library allocation
page execute and read and write
50E0000
direct allocation
page read and write
15CF000
heap
page read and write
4C0F000
stack
page read and write
50F1000
heap
page read and write
684000
unkown
page execute and write copy
80E000
unkown
page execute and read and write
3C0E000
stack
page read and write
49CE000
stack
page read and write
13B0000
heap
page read and write
53D0000
direct allocation
page execute and read and write
7F6000
unkown
page execute and read and write
82A000
unkown
page execute and write copy
5240000
direct allocation
page read and write
67A000
unkown
page execute and write copy
90D000
unkown
page execute and write copy
3100000
heap
page read and write
90D000
unkown
page execute and write copy
65F1000
trusted library allocation
page read and write
676000
unkown
page write copy
7EB000
unkown
page execute and read and write
370E000
stack
page read and write
89A000
unkown
page execute and read and write
44CE000
stack
page read and write
3107000
heap
page read and write
54E0000
heap
page read and write
3D0F000
stack
page read and write
5240000
direct allocation
page read and write
50E0000
direct allocation
page read and write
50F1000
heap
page read and write
F5C000
stack
page read and write
50E0000
direct allocation
page read and write
8B6000
unkown
page execute and read and write
36CF000
stack
page read and write
178E000
stack
page read and write
50A0000
direct allocation
page read and write
50F1000
heap
page read and write
50E0000
direct allocation
page read and write
686000
unkown
page execute and write copy
8D8000
unkown
page execute and write copy
3E4F000
stack
page read and write
52A7000
trusted library allocation
page execute and read and write
5224000
trusted library allocation
page read and write
8DB000
unkown
page execute and read and write
460E000
stack
page read and write
8B5000
unkown
page execute and write copy
FD0000
heap
page read and write
8A9000
unkown
page execute and read and write
811000
unkown
page execute and write copy
5490000
trusted library allocation
page read and write
65F4000
trusted library allocation
page read and write
83D000
unkown
page execute and read and write
53D0000
trusted library allocation
page read and write
50F1000
heap
page read and write
133D000
stack
page read and write
3BCF000
stack
page read and write
8DA000
unkown
page execute and write copy
7B1E000
stack
page read and write
89B000
unkown
page execute and write copy
854000
unkown
page execute and write copy
50E0000
direct allocation
page read and write
50F1000
heap
page read and write
670000
unkown
page read and write
470F000
stack
page read and write
51F0000
trusted library allocation
page read and write
676000
unkown
page write copy
5290000
trusted library allocation
page read and write
4D4F000
stack
page read and write
488E000
stack
page read and write
3FCE000
stack
page read and write
474E000
stack
page read and write
30AB000
stack
page read and write
5210000
trusted library allocation
page read and write
12F9000
stack
page read and write
4ACF000
stack
page read and write
410E000
stack
page read and write
380F000
stack
page read and write
334E000
stack
page read and write
306F000
stack
page read and write
89E000
unkown
page execute and read and write
5290000
direct allocation
page execute and read and write
5430000
trusted library allocation
page read and write
50E0000
direct allocation
page read and write
50F1000
heap
page read and write
159A000
heap
page read and write
50F1000
heap
page read and write
86B000
unkown
page execute and read and write
78CE000
stack
page read and write
3D4E000
stack
page read and write
876000
unkown
page execute and write copy
887000
unkown
page execute and write copy
448F000
stack
page read and write
790E000
stack
page read and write
320F000
stack
page read and write
828000
unkown
page execute and read and write
91E000
unkown
page execute and write copy
3ACE000
stack
page read and write
87A000
unkown
page execute and write copy
50F1000
heap
page read and write
50F1000
heap
page read and write
50C0000
heap
page read and write
522D000
trusted library allocation
page execute and read and write
484F000
stack
page read and write
80B000
unkown
page execute and write copy
50E0000
direct allocation
page read and write
50F1000
heap
page read and write
7DA000
unkown
page execute and read and write
52B0000
heap
page read and write
788E000
stack
page read and write
15D8000
heap
page read and write
50F1000
heap
page read and write
50E0000
direct allocation
page read and write
3F8F000
stack
page read and write
52A0000
trusted library allocation
page read and write
91C000
unkown
page execute and read and write
There are 201 hidden memdumps, click here to show them.