IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
8DC000
stack
page read and write
4910000
direct allocation
page read and write
4921000
heap
page read and write
443F000
stack
page read and write
F5A000
heap
page read and write
303F000
stack
page read and write
4DC0000
trusted library allocation
page read and write
32BF000
stack
page read and write
4910000
direct allocation
page read and write
4A53000
trusted library allocation
page execute and read and write
447E000
stack
page read and write
4BCA000
trusted library allocation
page execute and read and write
714E000
stack
page read and write
4D60000
heap
page execute and read and write
84E000
stack
page read and write
710E000
stack
page read and write
80E000
stack
page read and write
4C4E000
stack
page read and write
4A54000
trusted library allocation
page read and write
4921000
heap
page read and write
2DFF000
stack
page read and write
2CFF000
stack
page read and write
37BF000
stack
page read and write
33FF000
stack
page read and write
5E15000
trusted library allocation
page read and write
4930000
heap
page read and write
5DF4000
trusted library allocation
page read and write
4921000
heap
page read and write
34C000
stack
page read and write
4921000
heap
page read and write
4A70000
direct allocation
page read and write
4910000
direct allocation
page read and write
4921000
heap
page read and write
70CE000
stack
page read and write
3BBE000
stack
page read and write
EBE000
stack
page read and write
5DF1000
trusted library allocation
page read and write
4920000
heap
page read and write
38FF000
stack
page read and write
4910000
direct allocation
page read and write
40BE000
stack
page read and write
FDF000
heap
page read and write
4910000
direct allocation
page read and write
4921000
heap
page read and write
317F000
stack
page read and write
367F000
stack
page read and write
7170000
heap
page execute and read and write
4DE0000
heap
page read and write
3F3F000
stack
page read and write
4DB0000
trusted library allocation
page read and write
986000
unkown
page write copy
DBC000
unkown
page execute and write copy
4BD0000
trusted library allocation
page read and write
EFE000
stack
page read and write
2AFF000
stack
page read and write
42FF000
stack
page read and write
F9A000
heap
page read and write
970000
heap
page read and write
343E000
stack
page read and write
4A20000
trusted library allocation
page read and write
986000
unkown
page write copy
3B7F000
stack
page read and write
4910000
direct allocation
page read and write
4910000
direct allocation
page read and write
980000
unkown
page read and write
89E000
stack
page read and write
307E000
stack
page read and write
98A000
unkown
page execute and read and write
31BE000
stack
page read and write
29EF000
stack
page read and write
4910000
direct allocation
page read and write
727E000
stack
page read and write
FA2000
heap
page read and write
8E5000
heap
page read and write
C11000
unkown
page execute and read and write
2F3E000
stack
page read and write
4921000
heap
page read and write
737E000
stack
page read and write
92E000
stack
page read and write
4AAB000
stack
page read and write
32FE000
stack
page read and write
4921000
heap
page read and write
4921000
heap
page read and write
41FE000
stack
page read and write
4A64000
trusted library allocation
page read and write
6F9000
stack
page read and write
4BF0000
heap
page read and write
2EFF000
stack
page read and write
8E0000
heap
page read and write
4C00000
direct allocation
page execute and read and write
3F7E000
stack
page read and write
6F8D000
stack
page read and write
4910000
direct allocation
page read and write
29F0000
heap
page read and write
C21000
unkown
page execute and write copy
3CBF000
stack
page read and write
2BFF000
stack
page read and write
29F7000
heap
page read and write
DBC000
unkown
page execute and write copy
41BF000
stack
page read and write
48F0000
heap
page read and write
4921000
heap
page read and write
4DF1000
trusted library allocation
page read and write
433E000
stack
page read and write
F90000
heap
page read and write
96E000
stack
page read and write
4921000
heap
page read and write
37FE000
stack
page read and write
F92000
heap
page read and write
982000
unkown
page execute and write copy
3E3E000
stack
page read and write
4921000
heap
page read and write
114E000
stack
page read and write
4A40000
trusted library allocation
page read and write
3A3F000
stack
page read and write
4A70000
direct allocation
page read and write
4A60000
trusted library allocation
page read and write
4921000
heap
page read and write
DBA000
unkown
page execute and read and write
4D4F000
stack
page read and write
4BDB000
trusted library allocation
page execute and read and write
FAE000
heap
page read and write
C20000
unkown
page execute and write copy
4D50000
trusted library allocation
page execute and read and write
3DFE000
stack
page read and write
4910000
direct allocation
page read and write
36BE000
stack
page read and write
4921000
heap
page read and write
353F000
stack
page read and write
4910000
direct allocation
page read and write
4910000
direct allocation
page read and write
357E000
stack
page read and write
982000
unkown
page execute and read and write
4921000
heap
page read and write
407F000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
4910000
direct allocation
page read and write
F3E000
stack
page read and write
4A70000
direct allocation
page read and write
393E000
stack
page read and write
4BAE000
stack
page read and write
4A5D000
trusted library allocation
page execute and read and write
F5E000
heap
page read and write
457F000
stack
page read and write
B01000
unkown
page execute and read and write
3CFE000
stack
page read and write
C20000
unkown
page execute and read and write
3A7E000
stack
page read and write
4DAC000
stack
page read and write
4910000
direct allocation
page read and write
F50000
heap
page read and write
48D0000
direct allocation
page read and write
4BD7000
trusted library allocation
page execute and read and write
3B0000
heap
page read and write
3C0000
heap
page read and write
6FCE000
stack
page read and write
980000
unkown
page readonly
4C00000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
There are 149 hidden memdumps, click here to show them.