IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
17C0000
heap
page read and write
FA2000
unkown
page execute and read and write
559E000
stack
page read and write
17C4000
heap
page read and write
4B0E000
stack
page read and write
11DE000
unkown
page execute and write copy
5310000
heap
page read and write
17C4000
heap
page read and write
188E000
stack
page read and write
F40000
heap
page read and write
11DF000
unkown
page execute and read and write
17C4000
heap
page read and write
18A0000
direct allocation
page read and write
11D3000
unkown
page execute and read and write
40CF000
stack
page read and write
17C4000
heap
page read and write
3D0F000
stack
page read and write
11D2000
unkown
page execute and write copy
11C1000
unkown
page execute and write copy
5311000
heap
page read and write
7C5E000
stack
page read and write
410E000
stack
page read and write
5450000
trusted library allocation
page read and write
7A10000
heap
page execute and read and write
11F1000
unkown
page execute and read and write
17C4000
heap
page read and write
1196000
unkown
page execute and write copy
55F0000
trusted library allocation
page read and write
139E000
stack
page read and write
3A8F000
stack
page read and write
11F2000
unkown
page execute and write copy
55C3000
trusted library allocation
page execute and read and write
FB6000
unkown
page execute and write copy
17C4000
heap
page read and write
11EE000
unkown
page execute and write copy
3D4E000
stack
page read and write
4C0F000
stack
page read and write
18A0000
direct allocation
page read and write
17C4000
heap
page read and write
4FCF000
stack
page read and write
55CD000
trusted library allocation
page execute and read and write
5311000
heap
page read and write
420F000
stack
page read and write
18F9000
heap
page read and write
57D1000
trusted library allocation
page read and write
16F0000
heap
page read and write
44CE000
stack
page read and write
110D000
unkown
page execute and write copy
1BAE000
stack
page read and write
18A0000
direct allocation
page read and write
17C4000
heap
page read and write
193E000
heap
page read and write
3BCF000
stack
page read and write
13DE000
stack
page read and write
55F0000
direct allocation
page execute and read and write
344F000
stack
page read and write
5311000
heap
page read and write
4ECE000
stack
page read and write
1901000
heap
page read and write
55FB000
trusted library allocation
page execute and read and write
11D4000
unkown
page execute and write copy
78AC000
stack
page read and write
1250000
unkown
page execute and write copy
18A0000
direct allocation
page read and write
18BE000
heap
page read and write
11C3000
unkown
page execute and read and write
79EE000
stack
page read and write
5311000
heap
page read and write
17C4000
heap
page read and write
3ACE000
stack
page read and write
1133000
unkown
page execute and write copy
3F8F000
stack
page read and write
7C9E000
stack
page read and write
190E000
heap
page read and write
67F5000
trusted library allocation
page read and write
18EF000
heap
page read and write
1193000
unkown
page execute and write copy
18A0000
direct allocation
page read and write
55C0000
direct allocation
page execute and read and write
4D4F000
stack
page read and write
460E000
stack
page read and write
18A0000
direct allocation
page read and write
112B000
unkown
page execute and read and write
488E000
stack
page read and write
17C4000
heap
page read and write
354F000
stack
page read and write
11D5000
unkown
page execute and read and write
18A0000
direct allocation
page read and write
470F000
stack
page read and write
FAA000
unkown
page execute and read and write
3C0E000
stack
page read and write
117F000
unkown
page execute and write copy
5680000
heap
page execute and read and write
18BA000
heap
page read and write
18A0000
direct allocation
page read and write
55D4000
trusted library allocation
page read and write
17C4000
heap
page read and write
119D000
unkown
page execute and read and write
55EA000
trusted library allocation
page execute and read and write
3E8E000
stack
page read and write
49CE000
stack
page read and write
1183000
unkown
page execute and read and write
5610000
trusted library allocation
page read and write
1240000
unkown
page execute and write copy
FA0000
unkown
page readonly
5311000
heap
page read and write
18A0000
direct allocation
page read and write
11C0000
unkown
page execute and read and write
55D0000
trusted library allocation
page read and write
18A0000
direct allocation
page read and write
7D9E000
stack
page read and write
5311000
heap
page read and write
1250000
unkown
page execute and read and write
FA6000
unkown
page write copy
EDC000
stack
page read and write
115E000
unkown
page execute and write copy
11F5000
unkown
page execute and read and write
4C4E000
stack
page read and write
FA0000
unkown
page read and write
4ACF000
stack
page read and write
364F000
stack
page read and write
549B000
stack
page read and write
55E0000
trusted library allocation
page read and write
11EF000
unkown
page execute and read and write
1195000
unkown
page execute and read and write
11D1000
unkown
page execute and read and write
55F7000
trusted library allocation
page execute and read and write
45CF000
stack
page read and write
FA2000
unkown
page execute and write copy
484F000
stack
page read and write
3FCE000
stack
page read and write
394F000
stack
page read and write
177C000
stack
page read and write
67D4000
trusted library allocation
page read and write
11A3000
unkown
page execute and read and write
1359000
stack
page read and write
424E000
stack
page read and write
17C4000
heap
page read and write
173E000
stack
page read and write
5650000
trusted library allocation
page read and write
1AAF000
stack
page read and write
11F0000
unkown
page execute and write copy
474E000
stack
page read and write
18F1000
heap
page read and write
110A000
unkown
page execute and read and write
5640000
heap
page read and write
1137000
unkown
page execute and read and write
FA6000
unkown
page write copy
5410000
heap
page read and write
17C4000
heap
page read and write
1252000
unkown
page execute and write copy
18A0000
direct allocation
page read and write
17C4000
heap
page read and write
1240000
unkown
page execute and write copy
11A4000
unkown
page execute and write copy
17BE000
stack
page read and write
1170000
unkown
page execute and read and write
55A0000
heap
page read and write
F50000
heap
page read and write
5311000
heap
page read and write
3E4F000
stack
page read and write
448F000
stack
page read and write
11BD000
unkown
page execute and write copy
16E0000
direct allocation
page read and write
18B0000
heap
page read and write
374F000
stack
page read and write
7B1F000
stack
page read and write
17C4000
heap
page read and write
112B000
unkown
page execute and write copy
5320000
heap
page read and write
55C4000
trusted library allocation
page read and write
4D8E000
stack
page read and write
1252000
unkown
page execute and write copy
18A0000
direct allocation
page read and write
434F000
stack
page read and write
5460000
direct allocation
page read and write
57CE000
stack
page read and write
18A0000
direct allocation
page read and write
384F000
stack
page read and write
498F000
stack
page read and write
111E000
unkown
page execute and read and write
7B5E000
stack
page read and write
123A000
unkown
page execute and write copy
5460000
direct allocation
page read and write
16F7000
heap
page read and write
119E000
unkown
page execute and write copy
180E000
stack
page read and write
398E000
stack
page read and write
5630000
trusted library allocation
page read and write
17C4000
heap
page read and write
79AD000
stack
page read and write
FAA000
unkown
page execute and write copy
438E000
stack
page read and write
67D1000
trusted library allocation
page read and write
11CB000
unkown
page execute and write copy
13E0000
heap
page read and write
184E000
stack
page read and write
5460000
direct allocation
page read and write
17C4000
heap
page read and write
4E8F000
stack
page read and write
5410000
trusted library allocation
page read and write
17C4000
heap
page read and write
56CE000
stack
page read and write
5620000
trusted library allocation
page execute and read and write
11AA000
unkown
page execute and read and write
18A0000
direct allocation
page read and write
There are 196 hidden memdumps, click here to show them.