IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
5400000
direct allocation
page read and write
5411000
heap
page read and write
55C0000
trusted library allocation
page read and write
5400000
direct allocation
page read and write
58D1000
trusted library allocation
page read and write
55E0000
direct allocation
page execute and read and write
5560000
direct allocation
page read and write
55E0000
trusted library allocation
page read and write
5400000
direct allocation
page read and write
5543000
trusted library allocation
page execute and read and write
5400000
direct allocation
page read and write
7D6E000
stack
page read and write
405F000
stack
page read and write
55B0000
trusted library allocation
page read and write
5420000
heap
page read and write
FD6000
unkown
page write copy
1944000
heap
page read and write
127E000
unkown
page execute and write copy
5400000
direct allocation
page read and write
18BE000
heap
page read and write
15DE000
stack
page read and write
5400000
direct allocation
page read and write
5400000
direct allocation
page read and write
1912000
heap
page read and write
7E6E000
stack
page read and write
3B5F000
stack
page read and write
14B0000
heap
page read and write
5410000
heap
page read and write
55CB000
trusted library allocation
page execute and read and write
7AAE000
stack
page read and write
7BAF000
stack
page read and write
68D1000
trusted library allocation
page read and write
5411000
heap
page read and write
5411000
heap
page read and write
187E000
stack
page read and write
F80000
heap
page read and write
5650000
heap
page read and write
46DE000
stack
page read and write
146E000
stack
page read and write
1422000
unkown
page execute and write copy
1424000
unkown
page execute and write copy
55B0000
direct allocation
page execute and read and write
F19000
stack
page read and write
18F0000
heap
page read and write
3490000
heap
page read and write
3B9E000
stack
page read and write
585E000
stack
page read and write
379F000
stack
page read and write
5411000
heap
page read and write
589C000
stack
page read and write
18F9000
heap
page read and write
5400000
direct allocation
page read and write
554D000
trusted library allocation
page execute and read and write
58A0000
trusted library allocation
page read and write
5411000
heap
page read and write
5411000
heap
page read and write
1902000
heap
page read and write
F90000
heap
page read and write
37DE000
stack
page read and write
3E1E000
stack
page read and write
127F000
unkown
page execute and write copy
5400000
direct allocation
page read and write
FD6000
unkown
page write copy
5411000
heap
page read and write
FD2000
unkown
page execute and write copy
563E000
stack
page read and write
18F2000
heap
page read and write
5530000
trusted library allocation
page read and write
441F000
stack
page read and write
5544000
trusted library allocation
page read and write
419F000
stack
page read and write
391E000
stack
page read and write
7D2E000
stack
page read and write
1AAF000
stack
page read and write
455F000
stack
page read and write
445E000
stack
page read and write
5411000
heap
page read and write
FD0000
unkown
page readonly
5400000
direct allocation
page read and write
3A1F000
stack
page read and write
5411000
heap
page read and write
5510000
trusted library allocation
page read and write
53E0000
heap
page read and write
4F9E000
stack
page read and write
4D1E000
stack
page read and write
FDA000
unkown
page execute and read and write
1BAE000
stack
page read and write
18B0000
heap
page read and write
68D4000
trusted library allocation
page read and write
3497000
heap
page read and write
348E000
stack
page read and write
3F1F000
stack
page read and write
5411000
heap
page read and write
3A5E000
stack
page read and write
7C2E000
stack
page read and write
369F000
stack
page read and write
459E000
stack
page read and write
5640000
trusted library allocation
page execute and read and write
4A9E000
stack
page read and write
5411000
heap
page read and write
5560000
direct allocation
page read and write
495E000
stack
page read and write
5400000
direct allocation
page read and write
58C0000
heap
page execute and read and write
14B5000
heap
page read and write
38DF000
stack
page read and write
431E000
stack
page read and write
3F5E000
stack
page read and write
47DF000
stack
page read and write
4B9F000
stack
page read and write
68F5000
trusted library allocation
page read and write
4E5E000
stack
page read and write
55C7000
trusted library allocation
page execute and read and write
1422000
unkown
page execute and read and write
1167000
unkown
page execute and read and write
509F000
stack
page read and write
3DDF000
stack
page read and write
18BA000
heap
page read and write
5400000
direct allocation
page read and write
FD0000
unkown
page read and write
559B000
stack
page read and write
4CDF000
stack
page read and write
5560000
direct allocation
page read and write
42DF000
stack
page read and write
1890000
direct allocation
page read and write
5411000
heap
page read and write
4F5F000
stack
page read and write
7BE0000
heap
page execute and read and write
5400000
direct allocation
page read and write
4A5F000
stack
page read and write
4BDE000
stack
page read and write
5411000
heap
page read and write
127E000
unkown
page execute and read and write
41DE000
stack
page read and write
409E000
stack
page read and write
344F000
stack
page read and write
14AD000
stack
page read and write
5554000
trusted library allocation
page read and write
359F000
stack
page read and write
575E000
stack
page read and write
7A6D000
stack
page read and write
5550000
trusted library allocation
page read and write
5411000
heap
page read and write
E1C000
stack
page read and write
FD2000
unkown
page execute and read and write
491F000
stack
page read and write
3C9F000
stack
page read and write
3CDE000
stack
page read and write
481E000
stack
page read and write
55F0000
heap
page read and write
4E1F000
stack
page read and write
469F000
stack
page read and write
15E0000
heap
page read and write
126E000
unkown
page execute and read and write
5411000
heap
page read and write
183B000
stack
page read and write
55BA000
trusted library allocation
page execute and read and write
58B0000
trusted library allocation
page read and write
5411000
heap
page read and write
1424000
unkown
page execute and write copy
5400000
direct allocation
page read and write
There are 151 hidden memdumps, click here to show them.