IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
419E000
stack
page read and write
BC0000
heap
page read and write
4E61000
trusted library allocation
page read and write
AF9000
stack
page read and write
351E000
stack
page read and write
441E000
stack
page read and write
B7E000
stack
page read and write
28D7000
heap
page read and write
4890000
direct allocation
page read and write
34DF000
stack
page read and write
2D9E000
stack
page read and write
48A1000
heap
page read and write
48A1000
heap
page read and write
206000
unkown
page write copy
70DE000
stack
page read and write
BFD000
heap
page read and write
2B1E000
stack
page read and write
4890000
direct allocation
page read and write
2D5F000
stack
page read and write
429F000
stack
page read and write
33DE000
stack
page read and write
28AE000
stack
page read and write
4C0C000
stack
page read and write
4890000
direct allocation
page read and write
38DE000
stack
page read and write
4B60000
trusted library allocation
page read and write
70C000
stack
page read and write
BCA000
heap
page read and write
315E000
stack
page read and write
39DF000
stack
page read and write
3C9E000
stack
page read and write
4C4000
unkown
page execute and read and write
7D0000
heap
page read and write
4B80000
trusted library allocation
page read and write
676000
unkown
page execute and write copy
3B5E000
stack
page read and write
3DDE000
stack
page read and write
7120000
heap
page execute and read and write
49D4000
trusted library allocation
page read and write
B3E000
stack
page read and write
365E000
stack
page read and write
4890000
direct allocation
page read and write
311F000
stack
page read and write
4B50000
direct allocation
page execute and read and write
48A1000
heap
page read and write
202000
unkown
page execute and read and write
325F000
stack
page read and write
48A1000
heap
page read and write
2C1F000
stack
page read and write
4C50000
heap
page read and write
48B1000
heap
page read and write
3EDF000
stack
page read and write
48A1000
heap
page read and write
4D3E000
stack
page read and write
4B3E000
stack
page read and write
329E000
stack
page read and write
4890000
direct allocation
page read and write
29DF000
stack
page read and write
674000
unkown
page execute and read and write
C1F000
heap
page read and write
48A1000
heap
page read and write
780000
heap
page read and write
200000
unkown
page read and write
48A1000
heap
page read and write
7D5000
heap
page read and write
705F000
stack
page read and write
5E85000
trusted library allocation
page read and write
389F000
stack
page read and write
3A1E000
stack
page read and write
272F000
stack
page read and write
2FDF000
stack
page read and write
4890000
direct allocation
page read and write
48A1000
heap
page read and write
49DD000
trusted library allocation
page execute and read and write
4890000
direct allocation
page read and write
4B6B000
trusted library allocation
page execute and read and write
286B000
stack
page read and write
3B1F000
stack
page read and write
200000
unkown
page readonly
48A1000
heap
page read and write
4D50000
heap
page execute and read and write
48A1000
heap
page read and write
301E000
stack
page read and write
339F000
stack
page read and write
4B80000
direct allocation
page execute and read and write
39C000
unkown
page execute and read and write
4B5A000
trusted library allocation
page execute and read and write
405E000
stack
page read and write
4890000
direct allocation
page read and write
3F1E000
stack
page read and write
49F0000
trusted library allocation
page read and write
375F000
stack
page read and write
709E000
stack
page read and write
49C0000
trusted library allocation
page read and write
4E5E000
stack
page read and write
4890000
direct allocation
page read and write
C0F000
heap
page read and write
2C5E000
stack
page read and write
676000
unkown
page execute and write copy
722F000
stack
page read and write
4B50000
trusted library allocation
page read and write
4B5000
unkown
page execute and read and write
282F000
stack
page read and write
49E0000
heap
page read and write
6F5D000
stack
page read and write
48A1000
heap
page read and write
361F000
stack
page read and write
4A00000
direct allocation
page read and write
2EDE000
stack
page read and write
5E64000
trusted library allocation
page read and write
7E0000
heap
page read and write
3D9F000
stack
page read and write
BFF000
heap
page read and write
5E61000
trusted library allocation
page read and write
451F000
stack
page read and write
4C5000
unkown
page execute and write copy
415F000
stack
page read and write
4A00000
direct allocation
page read and write
202000
unkown
page execute and write copy
48A1000
heap
page read and write
48A1000
heap
page read and write
4A00000
direct allocation
page read and write
42DE000
stack
page read and write
43DF000
stack
page read and write
E8F000
stack
page read and write
48A1000
heap
page read and write
4B67000
trusted library allocation
page execute and read and write
4C10000
trusted library allocation
page execute and read and write
49A0000
trusted library allocation
page read and write
379E000
stack
page read and write
4890000
direct allocation
page read and write
4890000
direct allocation
page read and write
49F4000
trusted library allocation
page read and write
4C20000
trusted library allocation
page read and write
3C5F000
stack
page read and write
28D0000
heap
page read and write
2E9F000
stack
page read and write
2ADF000
stack
page read and write
4890000
direct allocation
page read and write
732F000
stack
page read and write
48A1000
heap
page read and write
4A3C000
stack
page read and write
770000
heap
page read and write
4BCE000
stack
page read and write
4C4000
unkown
page execute and write copy
48A0000
heap
page read and write
4C30000
trusted library allocation
page read and write
4890000
direct allocation
page read and write
BBE000
stack
page read and write
4870000
heap
page read and write
48A1000
heap
page read and write
4890000
direct allocation
page read and write
C06000
heap
page read and write
401F000
stack
page read and write
206000
unkown
page write copy
BCE000
heap
page read and write
28C0000
direct allocation
page read and write
20A000
unkown
page execute and read and write
49D3000
trusted library allocation
page execute and read and write
There are 149 hidden memdumps, click here to show them.