IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
432F000
stack
page read and write
66F5000
trusted library allocation
page read and write
482F000
stack
page read and write
3D2E000
stack
page read and write
3BEE000
stack
page read and write
3DE000
unkown
page execute and write copy
51F0000
direct allocation
page read and write
49AE000
stack
page read and write
53AA000
trusted library allocation
page execute and read and write
47A000
unkown
page execute and read and write
471000
unkown
page execute and read and write
516000
unkown
page execute and write copy
3E6E000
stack
page read and write
35AE000
stack
page read and write
44E000
unkown
page execute and write copy
5201000
heap
page read and write
5590000
trusted library allocation
page read and write
5201000
heap
page read and write
53A0000
trusted library allocation
page read and write
36AF000
stack
page read and write
3F6F000
stack
page read and write
5201000
heap
page read and write
496F000
stack
page read and write
266000
unkown
page write copy
66D1000
trusted library allocation
page read and write
40EE000
stack
page read and write
56D1000
trusted library allocation
page read and write
4FF000
unkown
page execute and write copy
51F0000
direct allocation
page read and write
478000
unkown
page execute and write copy
3E2F000
stack
page read and write
262000
unkown
page execute and write copy
13D0000
heap
page read and write
151E000
stack
page read and write
40AF000
stack
page read and write
51F0000
direct allocation
page read and write
53D0000
trusted library allocation
page read and write
4AAF000
stack
page read and write
422E000
stack
page read and write
3CEF000
stack
page read and write
26A000
unkown
page execute and write copy
506000
unkown
page execute and write copy
51F0000
direct allocation
page read and write
3DB000
unkown
page execute and read and write
492000
unkown
page execute and read and write
47D000
unkown
page execute and read and write
4AEE000
stack
page read and write
450000
unkown
page execute and read and write
446F000
stack
page read and write
3A6F000
stack
page read and write
1630000
heap
page read and write
51F0000
direct allocation
page read and write
186E000
stack
page read and write
488000
unkown
page execute and write copy
514000
unkown
page execute and write copy
1679000
heap
page read and write
5201000
heap
page read and write
260000
unkown
page readonly
48B000
unkown
page execute and write copy
37EF000
stack
page read and write
53BB000
trusted library allocation
page execute and read and write
4BEF000
stack
page read and write
5201000
heap
page read and write
7B2E000
stack
page read and write
41D000
unkown
page execute and read and write
554E000
stack
page read and write
53B7000
trusted library allocation
page execute and read and write
30AE000
stack
page read and write
51F0000
direct allocation
page read and write
51D0000
heap
page read and write
3030000
heap
page read and write
5334000
trusted library allocation
page read and write
55A0000
heap
page execute and read and write
36EE000
stack
page read and write
41EF000
stack
page read and write
5350000
direct allocation
page read and write
49B000
unkown
page execute and write copy
400000
unkown
page execute and write copy
5333000
trusted library allocation
page execute and read and write
5201000
heap
page read and write
5201000
heap
page read and write
31AF000
stack
page read and write
5300000
trusted library allocation
page read and write
51F0000
direct allocation
page read and write
402000
unkown
page execute and write copy
276000
unkown
page execute and write copy
51F0000
direct allocation
page read and write
5440000
heap
page read and write
1670000
heap
page read and write
79AF000
stack
page read and write
4A7000
unkown
page execute and read and write
176E000
stack
page read and write
44AE000
stack
page read and write
5201000
heap
page read and write
3BAF000
stack
page read and write
5210000
heap
page read and write
1525000
heap
page read and write
51B0000
direct allocation
page read and write
5200000
heap
page read and write
3067000
heap
page read and write
468000
unkown
page execute and write copy
506000
unkown
page execute and write copy
451000
unkown
page execute and write copy
53A0000
direct allocation
page execute and read and write
402000
unkown
page execute and read and write
14B0000
heap
page read and write
4A6000
unkown
page execute and write copy
31EB000
stack
page read and write
46D000
unkown
page execute and write copy
32EF000
stack
page read and write
538B000
stack
page read and write
7AEE000
stack
page read and write
55C0000
heap
page execute and read and write
266000
unkown
page write copy
5201000
heap
page read and write
516000
unkown
page execute and write copy
5344000
trusted library allocation
page read and write
41B000
unkown
page execute and write copy
66D4000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
356F000
stack
page read and write
5201000
heap
page read and write
4E6F000
stack
page read and write
51F0000
direct allocation
page read and write
514000
unkown
page execute and read and write
26A000
unkown
page execute and read and write
45AF000
stack
page read and write
382E000
stack
page read and write
4D2F000
stack
page read and write
1520000
heap
page read and write
5350000
direct allocation
page read and write
53E0000
heap
page read and write
126C000
stack
page read and write
51F0000
direct allocation
page read and write
346E000
stack
page read and write
472E000
stack
page read and write
5201000
heap
page read and write
5430000
trusted library allocation
page execute and read and write
392F000
stack
page read and write
1369000
stack
page read and write
49E000
unkown
page execute and read and write
542E000
stack
page read and write
5320000
trusted library allocation
page read and write
56CF000
stack
page read and write
45EE000
stack
page read and write
3F4000
unkown
page execute and read and write
51F0000
direct allocation
page read and write
16BE000
heap
page read and write
48A000
unkown
page execute and read and write
46EF000
stack
page read and write
5340000
trusted library allocation
page read and write
4C2E000
stack
page read and write
453000
unkown
page execute and read and write
5201000
heap
page read and write
47B000
unkown
page execute and write copy
53D0000
direct allocation
page execute and read and write
342F000
stack
page read and write
4D6E000
stack
page read and write
163A000
heap
page read and write
436E000
stack
page read and write
786D000
stack
page read and write
444000
unkown
page execute and read and write
5350000
direct allocation
page read and write
5201000
heap
page read and write
3060000
heap
page read and write
166E000
heap
page read and write
3FAE000
stack
page read and write
26A000
unkown
page execute and write copy
3AAE000
stack
page read and write
558C000
stack
page read and write
16C0000
heap
page read and write
5201000
heap
page read and write
262000
unkown
page execute and read and write
167F000
heap
page read and write
51F0000
direct allocation
page read and write
533D000
trusted library allocation
page execute and read and write
51F0000
direct allocation
page read and write
260000
unkown
page read and write
163E000
heap
page read and write
5201000
heap
page read and write
55A0000
trusted library allocation
page read and write
51F0000
direct allocation
page read and write
79EE000
stack
page read and write
396E000
stack
page read and write
78AE000
stack
page read and write
438000
unkown
page execute and write copy
486E000
stack
page read and write
7C2E000
stack
page read and write
332E000
stack
page read and write
162F000
stack
page read and write
168D000
heap
page read and write
46C000
unkown
page execute and read and write
5201000
heap
page read and write
There are 183 hidden memdumps, click here to show them.