IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
C5A000
unkown
page execute and write copy
D59000
stack
page read and write
4B50000
direct allocation
page read and write
6085000
trusted library allocation
page read and write
4B61000
heap
page read and write
E84000
heap
page read and write
4CB0000
direct allocation
page read and write
4E30000
trusted library allocation
page read and write
E84000
heap
page read and write
ECE000
stack
page read and write
45CE000
stack
page read and write
4E40000
direct allocation
page execute and read and write
AB8000
unkown
page execute and write copy
E84000
heap
page read and write
C5C000
unkown
page execute and write copy
3F8E000
stack
page read and write
5000000
trusted library allocation
page read and write
816000
unkown
page write copy
AA9000
unkown
page execute and read and write
117F000
stack
page read and write
480F000
stack
page read and write
4E60000
trusted library allocation
page read and write
4B50000
direct allocation
page read and write
354F000
stack
page read and write
4CB0000
direct allocation
page read and write
444F000
stack
page read and write
C5C000
unkown
page execute and write copy
4B50000
direct allocation
page read and write
4C60000
heap
page read and write
4E40000
trusted library allocation
page read and write
448E000
stack
page read and write
434E000
stack
page read and write
E84000
heap
page read and write
71FD000
stack
page read and write
E84000
heap
page read and write
737E000
stack
page read and write
4B70000
heap
page read and write
2F4E000
stack
page read and write
812000
unkown
page execute and write copy
727E000
stack
page read and write
3F4F000
stack
page read and write
E30000
heap
page read and write
FC0000
heap
page read and write
810000
unkown
page readonly
4E0D000
trusted library allocation
page execute and read and write
FD2000
heap
page read and write
41CF000
stack
page read and write
5061000
trusted library allocation
page read and write
330E000
stack
page read and write
4E3A000
trusted library allocation
page execute and read and write
2C8F000
stack
page read and write
800000
heap
page read and write
127F000
stack
page read and write
4CB0000
direct allocation
page read and write
2B1F000
stack
page read and write
F50000
heap
page read and write
816000
unkown
page write copy
4E14000
trusted library allocation
page read and write
3E4D000
stack
page read and write
E84000
heap
page read and write
59C000
stack
page read and write
E84000
heap
page read and write
3A4F000
stack
page read and write
4B50000
direct allocation
page read and write
74BE000
stack
page read and write
4B50000
direct allocation
page read and write
E84000
heap
page read and write
308E000
stack
page read and write
3E0F000
stack
page read and write
5010000
trusted library allocation
page read and write
2CCE000
stack
page read and write
46CF000
stack
page read and write
37CF000
stack
page read and write
2F0F000
stack
page read and write
81A000
unkown
page execute and read and write
3BCE000
stack
page read and write
4B50000
direct allocation
page read and write
4E03000
trusted library allocation
page execute and read and write
4CA0000
trusted library allocation
page read and write
4DEE000
stack
page read and write
F0E000
stack
page read and write
4E10000
trusted library allocation
page read and write
F8A000
heap
page read and write
C5A000
unkown
page execute and read and write
4FEC000
stack
page read and write
4E20000
heap
page read and write
FC9000
heap
page read and write
4B61000
heap
page read and write
73BE000
stack
page read and write
4B50000
direct allocation
page read and write
430F000
stack
page read and write
E84000
heap
page read and write
E84000
heap
page read and write
75FE000
stack
page read and write
4E47000
trusted library allocation
page execute and read and write
4FF0000
trusted library allocation
page execute and read and write
5050000
heap
page read and write
470E000
stack
page read and write
812000
unkown
page execute and read and write
7230000
heap
page execute and read and write
E84000
heap
page read and write
4E00000
direct allocation
page execute and read and write
344E000
stack
page read and write
2B5C000
stack
page read and write
420E000
stack
page read and write
FBE000
heap
page read and write
4B50000
direct allocation
page read and write
4B50000
direct allocation
page read and write
E84000
heap
page read and write
380E000
stack
page read and write
4B61000
heap
page read and write
458F000
stack
page read and write
4CEB000
stack
page read and write
36CE000
stack
page read and write
4E04000
trusted library allocation
page read and write
340F000
stack
page read and write
AB9000
unkown
page execute and write copy
E84000
heap
page read and write
E84000
heap
page read and write
E84000
heap
page read and write
4C60000
trusted library allocation
page read and write
390F000
stack
page read and write
74FE000
stack
page read and write
FDD000
heap
page read and write
2B60000
direct allocation
page read and write
E80000
heap
page read and write
F80000
heap
page read and write
304F000
stack
page read and write
4B50000
direct allocation
page read and write
4B61000
heap
page read and write
6064000
trusted library allocation
page read and write
4B61000
heap
page read and write
3CCF000
stack
page read and write
3A8E000
stack
page read and write
E84000
heap
page read and write
2B80000
heap
page read and write
4B50000
direct allocation
page read and write
E84000
heap
page read and write
3B8F000
stack
page read and write
2E0E000
stack
page read and write
998000
unkown
page execute and read and write
3D0E000
stack
page read and write
4B50000
direct allocation
page read and write
2B87000
heap
page read and write
368F000
stack
page read and write
394E000
stack
page read and write
4B50000
direct allocation
page read and write
4EAE000
stack
page read and write
E84000
heap
page read and write
AB8000
unkown
page execute and read and write
4FAF000
stack
page read and write
408F000
stack
page read and write
4B50000
direct allocation
page read and write
5030000
heap
page execute and read and write
810000
unkown
page read and write
358E000
stack
page read and write
6061000
trusted library allocation
page read and write
2DCF000
stack
page read and write
4B60000
heap
page read and write
40CE000
stack
page read and write
31CE000
stack
page read and write
F4E000
stack
page read and write
F8E000
heap
page read and write
318F000
stack
page read and write
4E4B000
trusted library allocation
page execute and read and write
32CF000
stack
page read and write
There are 156 hidden memdumps, click here to show them.