IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
574000
heap
page read and write
ABC000
stack
page read and write
574000
heap
page read and write
31BF000
stack
page read and write
E66000
unkown
page execute and write copy
28BF000
stack
page read and write
2DFF000
stack
page read and write
AE0000
heap
page read and write
4D9E000
stack
page read and write
3ABE000
stack
page read and write
E67000
unkown
page execute and write copy
574000
heap
page read and write
397E000
stack
page read and write
4AE7000
trusted library allocation
page execute and read and write
670000
heap
page read and write
347E000
stack
page read and write
2E3E000
stack
page read and write
590000
heap
page read and write
730000
heap
page read and write
30BE000
stack
page read and write
47F0000
direct allocation
page read and write
47F0000
direct allocation
page read and write
47F0000
direct allocation
page read and write
37FF000
stack
page read and write
4B4E000
stack
page read and write
40FE000
stack
page read and write
574000
heap
page read and write
437E000
stack
page read and write
3E3F000
stack
page read and write
49AD000
trusted library allocation
page execute and read and write
3FBE000
stack
page read and write
73E000
heap
page read and write
31FE000
stack
page read and write
92F000
stack
page read and write
47D0000
direct allocation
page read and write
36FE000
stack
page read and write
4DC1000
trusted library allocation
page read and write
1012000
unkown
page execute and write copy
49C0000
heap
page read and write
47F0000
direct allocation
page read and write
49B0000
trusted library allocation
page read and write
3CFF000
stack
page read and write
574000
heap
page read and write
2ABF000
stack
page read and write
4801000
heap
page read and write
6EBD000
stack
page read and write
3BFE000
stack
page read and write
3BBF000
stack
page read and write
433F000
stack
page read and write
A2F000
stack
page read and write
6FBE000
stack
page read and write
6DE000
stack
page read and write
1012000
unkown
page execute and write copy
47F0000
direct allocation
page read and write
4D3C000
stack
page read and write
BB6000
unkown
page write copy
574000
heap
page read and write
727E000
stack
page read and write
4801000
heap
page read and write
47F0000
direct allocation
page read and write
333E000
stack
page read and write
4DB0000
heap
page execute and read and write
574000
heap
page read and write
447F000
stack
page read and write
4B00000
trusted library allocation
page read and write
35BE000
stack
page read and write
BB0000
unkown
page readonly
574000
heap
page read and write
574000
heap
page read and write
BB2000
unkown
page execute and write copy
423E000
stack
page read and write
4D60000
trusted library allocation
page read and write
2F3F000
stack
page read and write
4AD0000
trusted library allocation
page read and write
3F7F000
stack
page read and write
5DC4000
trusted library allocation
page read and write
3D3E000
stack
page read and write
1010000
unkown
page execute and read and write
574000
heap
page read and write
703E000
stack
page read and write
49A4000
trusted library allocation
page read and write
73A000
heap
page read and write
717E000
stack
page read and write
4D50000
trusted library allocation
page read and write
3A7F000
stack
page read and write
4810000
heap
page read and write
570000
heap
page read and write
4ACE000
stack
page read and write
2F7E000
stack
page read and write
AC0000
heap
page read and write
4900000
heap
page read and write
5DC1000
trusted library allocation
page read and write
7070000
heap
page execute and read and write
B2E000
stack
page read and write
36BF000
stack
page read and write
47F0000
direct allocation
page read and write
4ADA000
trusted library allocation
page execute and read and write
BBA000
unkown
page execute and read and write
49A0000
direct allocation
page execute and read and write
47F0000
direct allocation
page read and write
BB6000
unkown
page write copy
32FF000
stack
page read and write
2BBF000
stack
page read and write
574000
heap
page read and write
E66000
unkown
page execute and read and write
574000
heap
page read and write
4950000
direct allocation
page read and write
357F000
stack
page read and write
4AEB000
trusted library allocation
page execute and read and write
774000
heap
page read and write
574000
heap
page read and write
4801000
heap
page read and write
772000
heap
page read and write
4900000
trusted library allocation
page read and write
5DE5000
trusted library allocation
page read and write
71E000
stack
page read and write
539000
stack
page read and write
4801000
heap
page read and write
6FFE000
stack
page read and write
343F000
stack
page read and write
B6E000
stack
page read and write
29BF000
stack
page read and write
E56000
unkown
page execute and read and write
D44000
unkown
page execute and read and write
77D000
heap
page read and write
47F0000
direct allocation
page read and write
47F0000
direct allocation
page read and write
4D40000
trusted library allocation
page execute and read and write
4C50000
heap
page read and write
383E000
stack
page read and write
41FF000
stack
page read and write
574000
heap
page read and write
2CFE000
stack
page read and write
4C4E000
stack
page read and write
43C000
stack
page read and write
2CBF000
stack
page read and write
4950000
direct allocation
page read and write
4AE0000
direct allocation
page execute and read and write
574000
heap
page read and write
40BF000
stack
page read and write
4800000
heap
page read and write
4950000
direct allocation
page read and write
574000
heap
page read and write
4940000
trusted library allocation
page read and write
47F0000
direct allocation
page read and write
4AE0000
trusted library allocation
page read and write
49A3000
trusted library allocation
page execute and read and write
786000
heap
page read and write
574000
heap
page read and write
47F0000
direct allocation
page read and write
47F0000
direct allocation
page read and write
498C000
stack
page read and write
574000
heap
page read and write
BB2000
unkown
page execute and read and write
47F0000
direct allocation
page read and write
4801000
heap
page read and write
791000
heap
page read and write
393F000
stack
page read and write
307F000
stack
page read and write
BAE000
stack
page read and write
1010000
unkown
page execute and write copy
49B4000
trusted library allocation
page read and write
BB0000
unkown
page read and write
A7E000
stack
page read and write
AE7000
heap
page read and write
3E7E000
stack
page read and write
There are 156 hidden memdumps, click here to show them.