IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
4D0E000
stack
page read and write
5180000
direct allocation
page read and write
5191000
heap
page read and write
5180000
direct allocation
page read and write
123C000
stack
page read and write
B90000
unkown
page read and write
378F000
stack
page read and write
56DE000
stack
page read and write
51AA000
heap
page read and write
56E1000
trusted library allocation
page read and write
5191000
heap
page read and write
468F000
stack
page read and write
B92000
unkown
page execute and write copy
42CF000
stack
page read and write
5180000
direct allocation
page read and write
41CE000
stack
page read and write
15AD000
heap
page read and write
4B8F000
stack
page read and write
480E000
stack
page read and write
404F000
stack
page read and write
5191000
heap
page read and write
5180000
direct allocation
page read and write
174F000
stack
page read and write
5191000
heap
page read and write
5191000
heap
page read and write
5180000
direct allocation
page read and write
4E0F000
stack
page read and write
3F4E000
stack
page read and write
340E000
stack
page read and write
4A8E000
stack
page read and write
15A0000
heap
page read and write
3DCF000
stack
page read and write
52F0000
direct allocation
page execute and read and write
52F0000
trusted library allocation
page read and write
13DE000
stack
page read and write
7ADE000
stack
page read and write
155A000
heap
page read and write
364F000
stack
page read and write
5160000
heap
page read and write
5470000
trusted library allocation
page read and write
77E0000
trusted library allocation
page read and write
54D0000
heap
page read and write
66E1000
trusted library allocation
page read and write
789E000
stack
page read and write
E2A000
unkown
page execute and read and write
52B0000
trusted library allocation
page read and write
5191000
heap
page read and write
5191000
heap
page read and write
46CE000
stack
page read and write
3A4E000
stack
page read and write
5191000
heap
page read and write
454F000
stack
page read and write
785E000
stack
page read and write
FDF000
unkown
page execute and write copy
FDC000
unkown
page execute and read and write
52CD000
trusted library allocation
page execute and read and write
5457000
trusted library allocation
page execute and read and write
3E0E000
stack
page read and write
6705000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
E3A000
unkown
page execute and read and write
5191000
heap
page read and write
3B4F000
stack
page read and write
1520000
heap
page read and write
3F0F000
stack
page read and write
328F000
stack
page read and write
544E000
stack
page read and write
440F000
stack
page read and write
141E000
stack
page read and write
52FA000
trusted library allocation
page execute and read and write
444E000
stack
page read and write
1430000
heap
page read and write
1550000
heap
page read and write
5180000
direct allocation
page read and write
55C0000
trusted library allocation
page read and write
4A4F000
stack
page read and write
54BE000
stack
page read and write
5180000
direct allocation
page read and write
78D0000
heap
page execute and read and write
52E0000
direct allocation
page read and write
314F000
stack
page read and write
52E0000
direct allocation
page read and write
418F000
stack
page read and write
52E0000
direct allocation
page read and write
302E000
stack
page read and write
5180000
direct allocation
page read and write
FDF000
unkown
page execute and write copy
5450000
trusted library allocation
page read and write
54C0000
trusted library allocation
page execute and read and write
494E000
stack
page read and write
D17000
unkown
page execute and read and write
158F000
heap
page read and write
B96000
unkown
page write copy
E3B000
unkown
page execute and write copy
5191000
heap
page read and write
37CE000
stack
page read and write
3C8F000
stack
page read and write
32CE000
stack
page read and write
5191000
heap
page read and write
3CCE000
stack
page read and write
52D0000
trusted library allocation
page read and write
3A0F000
stack
page read and write
490F000
stack
page read and write
318B000
stack
page read and write
5191000
heap
page read and write
3B8E000
stack
page read and write
B96000
unkown
page write copy
66E4000
trusted library allocation
page read and write
1435000
heap
page read and write
534B000
stack
page read and write
184E000
stack
page read and write
5470000
direct allocation
page execute and read and write
52C4000
trusted library allocation
page read and write
52C3000
trusted library allocation
page execute and read and write
55BC000
stack
page read and write
155E000
heap
page read and write
5191000
heap
page read and write
5180000
direct allocation
page read and write
33CF000
stack
page read and write
4BCE000
stack
page read and write
1339000
stack
page read and write
5191000
heap
page read and write
B92000
unkown
page execute and read and write
5180000
direct allocation
page read and write
5180000
direct allocation
page read and write
77DD000
stack
page read and write
B90000
unkown
page readonly
3030000
direct allocation
page read and write
368E000
stack
page read and write
5180000
direct allocation
page read and write
3040000
heap
page read and write
47CF000
stack
page read and write
55D0000
heap
page execute and read and write
5191000
heap
page read and write
B9A000
unkown
page execute and read and write
354E000
stack
page read and write
38CF000
stack
page read and write
5180000
direct allocation
page read and write
52D4000
trusted library allocation
page read and write
5180000
direct allocation
page read and write
3047000
heap
page read and write
458E000
stack
page read and write
781E000
stack
page read and write
430E000
stack
page read and write
390E000
stack
page read and write
5191000
heap
page read and write
E3A000
unkown
page execute and write copy
1360000
heap
page read and write
1370000
heap
page read and write
7BDE000
stack
page read and write
1599000
heap
page read and write
79DE000
stack
page read and write
4CCF000
stack
page read and write
5190000
heap
page read and write
1591000
heap
page read and write
545B000
trusted library allocation
page execute and read and write
350F000
stack
page read and write
408E000
stack
page read and write
5300000
heap
page read and write
There are 149 hidden memdumps, click here to show them.