IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
4A90000
direct allocation
page read and write
4AA1000
heap
page read and write
4A90000
direct allocation
page read and write
296C000
stack
page read and write
424E000
stack
page read and write
398E000
stack
page read and write
2F4F000
stack
page read and write
5FB5000
trusted library allocation
page read and write
943000
heap
page read and write
8EE000
stack
page read and write
742E000
stack
page read and write
4D7A000
trusted library allocation
page execute and read and write
CBA000
unkown
page execute and read and write
3BCF000
stack
page read and write
5B9000
stack
page read and write
962000
heap
page read and write
4BE0000
heap
page read and write
5F91000
trusted library allocation
page read and write
4F8E000
stack
page read and write
4A70000
direct allocation
page read and write
864000
heap
page read and write
CBA000
unkown
page execute and write copy
864000
heap
page read and write
292E000
stack
page read and write
448F000
stack
page read and write
3A8F000
stack
page read and write
4DD0000
trusted library allocation
page read and write
4D5E000
stack
page read and write
94D000
heap
page read and write
4F91000
trusted library allocation
page read and write
45CF000
stack
page read and write
30CE000
stack
page read and write
4DC0000
trusted library allocation
page read and write
864000
heap
page read and write
4A90000
direct allocation
page read and write
864000
heap
page read and write
3C0E000
stack
page read and write
4DE0000
heap
page read and write
4D60000
trusted library allocation
page read and write
4A90000
direct allocation
page read and write
864000
heap
page read and write
4C5C000
stack
page read and write
4AA0000
heap
page read and write
2E0F000
stack
page read and write
344F000
stack
page read and write
2E4E000
stack
page read and write
4D70000
trusted library allocation
page read and write
5F94000
trusted library allocation
page read and write
4D80000
direct allocation
page execute and read and write
72EE000
stack
page read and write
A06000
unkown
page write copy
4DA0000
trusted library allocation
page read and write
4A90000
direct allocation
page read and write
2A8F000
stack
page read and write
7160000
heap
page execute and read and write
2BCE000
stack
page read and write
4C14000
trusted library allocation
page read and write
36CF000
stack
page read and write
752E000
stack
page read and write
3D0F000
stack
page read and write
968000
heap
page read and write
4A90000
direct allocation
page read and write
E68000
unkown
page execute and write copy
4A90000
direct allocation
page read and write
2F8E000
stack
page read and write
864000
heap
page read and write
334E000
stack
page read and write
A02000
unkown
page execute and write copy
4A90000
direct allocation
page read and write
4AA1000
heap
page read and write
410E000
stack
page read and write
113F000
stack
page read and write
4AA1000
heap
page read and write
864000
heap
page read and write
4E2E000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
E66000
unkown
page execute and write copy
4BB0000
direct allocation
page read and write
330F000
stack
page read and write
358F000
stack
page read and write
864000
heap
page read and write
864000
heap
page read and write
864000
heap
page read and write
71AE000
stack
page read and write
4BC000
stack
page read and write
CAA000
unkown
page execute and read and write
4BA0000
trusted library allocation
page read and write
103F000
stack
page read and write
434F000
stack
page read and write
CBB000
unkown
page execute and write copy
A0A000
unkown
page execute and read and write
370E000
stack
page read and write
320E000
stack
page read and write
A06000
unkown
page write copy
B9B000
unkown
page execute and read and write
3E8E000
stack
page read and write
4A90000
direct allocation
page read and write
44CE000
stack
page read and write
4BB0000
direct allocation
page read and write
380F000
stack
page read and write
3F8F000
stack
page read and write
308F000
stack
page read and write
2980000
heap
page read and write
A00000
unkown
page readonly
3ACE000
stack
page read and write
945000
heap
page read and write
384E000
stack
page read and write
31CF000
stack
page read and write
2B8F000
stack
page read and write
3FCE000
stack
page read and write
40CF000
stack
page read and write
4C1D000
trusted library allocation
page execute and read and write
3E4F000
stack
page read and write
4D87000
trusted library allocation
page execute and read and write
4A90000
direct allocation
page read and write
860000
heap
page read and write
73EE000
stack
page read and write
2987000
heap
page read and write
820000
heap
page read and write
864000
heap
page read and write
470F000
stack
page read and write
864000
heap
page read and write
460E000
stack
page read and write
830000
heap
page read and write
4C13000
trusted library allocation
page execute and read and write
2CCF000
stack
page read and write
864000
heap
page read and write
3D4D000
stack
page read and write
4D80000
trusted library allocation
page read and write
90A000
heap
page read and write
4AA1000
heap
page read and write
4E6C000
stack
page read and write
90E000
heap
page read and write
4D8B000
trusted library allocation
page execute and read and write
4BD0000
heap
page read and write
864000
heap
page read and write
35CE000
stack
page read and write
864000
heap
page read and write
A02000
unkown
page execute and read and write
4A90000
direct allocation
page read and write
438E000
stack
page read and write
E66000
unkown
page execute and read and write
864000
heap
page read and write
900000
heap
page read and write
2970000
heap
page read and write
4A90000
direct allocation
page read and write
8AE000
stack
page read and write
4AB1000
heap
page read and write
72AE000
stack
page read and write
864000
heap
page read and write
712D000
stack
page read and write
4AA1000
heap
page read and write
420F000
stack
page read and write
E68000
unkown
page execute and write copy
A00000
unkown
page read and write
4A90000
direct allocation
page read and write
4D64000
trusted library allocation
page read and write
4AA1000
heap
page read and write
4DB0000
trusted library allocation
page execute and read and write
4BB0000
direct allocation
page read and write
348E000
stack
page read and write
864000
heap
page read and write
4A90000
direct allocation
page read and write
4E80000
heap
page execute and read and write
955000
heap
page read and write
2D0E000
stack
page read and write
394F000
stack
page read and write
4C00000
trusted library allocation
page read and write
There are 158 hidden memdumps, click here to show them.