IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
350F000
stack
page read and write
5430000
heap
page read and write
4A8E000
stack
page read and write
534E000
stack
page read and write
E62000
unkown
page execute and write copy
3DCF000
stack
page read and write
1434000
heap
page read and write
2FE0000
direct allocation
page read and write
5011000
heap
page read and write
1434000
heap
page read and write
76DE000
stack
page read and write
792E000
stack
page read and write
364F000
stack
page read and write
4B8F000
stack
page read and write
FF9000
unkown
page execute and read and write
5110000
heap
page read and write
52B3000
trusted library allocation
page execute and read and write
1434000
heap
page read and write
553E000
stack
page read and write
2FE0000
direct allocation
page read and write
111C000
unkown
page execute and write copy
133E000
stack
page read and write
542C000
stack
page read and write
4CCF000
stack
page read and write
2FE0000
direct allocation
page read and write
1434000
heap
page read and write
1434000
heap
page read and write
5550000
trusted library allocation
page read and write
3F4E000
stack
page read and write
52EB000
trusted library allocation
page execute and read and write
38CF000
stack
page read and write
5300000
trusted library allocation
page read and write
418F000
stack
page read and write
15EE000
heap
page read and write
51AB000
stack
page read and write
E60000
unkown
page readonly
2FE0000
direct allocation
page read and write
52E7000
trusted library allocation
page execute and read and write
1434000
heap
page read and write
65A4000
trusted library allocation
page read and write
404F000
stack
page read and write
157E000
stack
page read and write
2FE0000
direct allocation
page read and write
141B000
stack
page read and write
65C5000
trusted library allocation
page read and write
368E000
stack
page read and write
D39000
stack
page read and write
310F000
stack
page read and write
1434000
heap
page read and write
17AE000
stack
page read and write
12C8000
unkown
page execute and write copy
480E000
stack
page read and write
1602000
heap
page read and write
2FE0000
direct allocation
page read and write
15BA000
heap
page read and write
1434000
heap
page read and write
3A0F000
stack
page read and write
1430000
heap
page read and write
796E000
stack
page read and write
52D0000
trusted library allocation
page read and write
5011000
heap
page read and write
42CF000
stack
page read and write
4BCE000
stack
page read and write
77DF000
stack
page read and write
5590000
heap
page execute and read and write
41CE000
stack
page read and write
378F000
stack
page read and write
2FE0000
direct allocation
page read and write
37CE000
stack
page read and write
2FCE000
stack
page read and write
7820000
heap
page execute and read and write
5011000
heap
page read and write
3C8F000
stack
page read and write
D80000
heap
page read and write
2FE0000
direct allocation
page read and write
153E000
stack
page read and write
2FE0000
direct allocation
page read and write
111D000
unkown
page execute and write copy
5150000
direct allocation
page read and write
1434000
heap
page read and write
52B4000
trusted library allocation
page read and write
408E000
stack
page read and write
111C000
unkown
page execute and read and write
1434000
heap
page read and write
769D000
stack
page read and write
430E000
stack
page read and write
46CE000
stack
page read and write
1434000
heap
page read and write
12C8000
unkown
page execute and write copy
C3C000
stack
page read and write
3CCE000
stack
page read and write
15B0000
heap
page read and write
3B4F000
stack
page read and write
E6A000
unkown
page execute and read and write
5010000
heap
page read and write
65A1000
trusted library allocation
page read and write
E66000
unkown
page write copy
320F000
stack
page read and write
55A1000
trusted library allocation
page read and write
5160000
heap
page read and write
163C000
heap
page read and write
15F9000
heap
page read and write
494E000
stack
page read and write
3007000
heap
page read and write
1434000
heap
page read and write
454F000
stack
page read and write
52BD000
trusted library allocation
page execute and read and write
E66000
unkown
page write copy
52B0000
direct allocation
page execute and read and write
52C4000
trusted library allocation
page read and write
52E0000
direct allocation
page execute and read and write
390E000
stack
page read and write
110D000
unkown
page execute and read and write
440F000
stack
page read and write
5011000
heap
page read and write
7A6F000
stack
page read and write
340F000
stack
page read and write
13DE000
stack
page read and write
160D000
heap
page read and write
2F8E000
stack
page read and write
5011000
heap
page read and write
52E0000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
354E000
stack
page read and write
15A0000
direct allocation
page read and write
15FF000
heap
page read and write
E60000
unkown
page read and write
2FE0000
direct allocation
page read and write
5540000
trusted library allocation
page execute and read and write
3B8E000
stack
page read and write
15F0000
heap
page read and write
5110000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
2FE0000
direct allocation
page read and write
458E000
stack
page read and write
1434000
heap
page read and write
5020000
heap
page read and write
52C0000
trusted library allocation
page read and write
137E000
stack
page read and write
3F0F000
stack
page read and write
1434000
heap
page read and write
3000000
heap
page read and write
5150000
direct allocation
page read and write
1434000
heap
page read and write
5150000
direct allocation
page read and write
444E000
stack
page read and write
12C6000
unkown
page execute and read and write
1434000
heap
page read and write
1434000
heap
page read and write
47CF000
stack
page read and write
4A4F000
stack
page read and write
468F000
stack
page read and write
2FE0000
direct allocation
page read and write
3E0E000
stack
page read and write
12D0000
heap
page read and write
5011000
heap
page read and write
490F000
stack
page read and write
52DA000
trusted library allocation
page execute and read and write
15BE000
heap
page read and write
E62000
unkown
page execute and read and write
1434000
heap
page read and write
1420000
heap
page read and write
52AE000
stack
page read and write
781E000
stack
page read and write
2FE0000
direct allocation
page read and write
2FE0000
direct allocation
page read and write
330F000
stack
page read and write
3A4E000
stack
page read and write
There are 158 hidden memdumps, click here to show them.