IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
5AF5000
trusted library allocation
page read and write
45A0000
direct allocation
page read and write
FAD000
unkown
page execute and write copy
F55000
unkown
page execute and read and write
270E000
stack
page read and write
5D4000
heap
page read and write
3FCF000
stack
page read and write
700F000
stack
page read and write
35CF000
stack
page read and write
49B0000
heap
page execute and read and write
F38000
unkown
page execute and write copy
73F000
stack
page read and write
384F000
stack
page read and write
48B0000
trusted library allocation
page read and write
EFD000
unkown
page execute and write copy
F0A000
unkown
page execute and read and write
1002000
unkown
page execute and write copy
3D4F000
stack
page read and write
F78000
unkown
page execute and write copy
45A0000
direct allocation
page read and write
EFF000
unkown
page execute and write copy
3ACF000
stack
page read and write
F8A000
unkown
page execute and write copy
46B0000
trusted library allocation
page read and write
FA5000
unkown
page execute and read and write
4ACE000
stack
page read and write
280F000
stack
page read and write
3B0E000
stack
page read and write
45A0000
direct allocation
page read and write
4864000
trusted library allocation
page read and write
4890000
direct allocation
page execute and read and write
D6A000
unkown
page execute and write copy
5D4000
heap
page read and write
D66000
unkown
page write copy
489B000
trusted library allocation
page execute and read and write
7A6000
heap
page read and write
30CF000
stack
page read and write
D60000
unkown
page read and write
2FCE000
stack
page read and write
75E000
heap
page read and write
EF3000
unkown
page execute and read and write
5D0000
heap
page read and write
3ECE000
stack
page read and write
4860000
trusted library allocation
page read and write
3C4E000
stack
page read and write
ED9000
unkown
page execute and read and write
5D4000
heap
page read and write
FBC000
unkown
page execute and write copy
246E000
stack
page read and write
6C80000
heap
page execute and read and write
6ECF000
stack
page read and write
310E000
stack
page read and write
100C000
unkown
page execute and write copy
483F000
stack
page read and write
45B1000
heap
page read and write
49A0000
trusted library allocation
page execute and read and write
48FE000
stack
page read and write
5D4000
heap
page read and write
F43000
unkown
page execute and read and write
298E000
stack
page read and write
D6A000
unkown
page execute and read and write
5D4000
heap
page read and write
45A0000
direct allocation
page read and write
4853000
trusted library allocation
page execute and read and write
2C0E000
stack
page read and write
360E000
stack
page read and write
5D4000
heap
page read and write
25B0000
direct allocation
page read and write
5D4000
heap
page read and write
4700000
direct allocation
page read and write
3E8F000
stack
page read and write
101C000
unkown
page execute and write copy
F5F000
unkown
page execute and read and write
46B0000
heap
page read and write
7E2000
heap
page read and write
D60000
unkown
page readonly
45A0000
direct allocation
page read and write
45A0000
direct allocation
page read and write
F5E000
unkown
page execute and write copy
374E000
stack
page read and write
5D4000
heap
page read and write
5D4000
heap
page read and write
794000
heap
page read and write
45B1000
heap
page read and write
4854000
trusted library allocation
page read and write
348F000
stack
page read and write
370F000
stack
page read and write
487A000
trusted library allocation
page execute and read and write
45A0000
direct allocation
page read and write
1003000
unkown
page execute and read and write
45C0000
heap
page read and write
796000
heap
page read and write
F77000
unkown
page execute and read and write
F53000
unkown
page execute and write copy
FAF000
unkown
page execute and read and write
7B3000
heap
page read and write
98F000
stack
page read and write
294F000
stack
page read and write
2E4F000
stack
page read and write
5D4000
heap
page read and write
4700000
direct allocation
page read and write
45A0000
direct allocation
page read and write
6C20000
trusted library allocation
page read and write
256F000
stack
page read and write
F69000
unkown
page execute and write copy
F9B000
unkown
page execute and write copy
473B000
stack
page read and write
1004000
unkown
page execute and write copy
4880000
heap
page read and write
334F000
stack
page read and write
101A000
unkown
page execute and write copy
6B0C000
stack
page read and write
25C0000
heap
page read and write
4AD1000
trusted library allocation
page read and write
25C7000
heap
page read and write
2D0F000
stack
page read and write
45A0000
direct allocation
page read and write
D30000
heap
page read and write
5D4000
heap
page read and write
F1B000
unkown
page execute and read and write
F1A000
unkown
page execute and write copy
4850000
direct allocation
page execute and read and write
88E000
stack
page read and write
6C10000
trusted library allocation
page read and write
D75000
unkown
page execute and read and write
D62000
unkown
page execute and write copy
5D4000
heap
page read and write
5D4000
heap
page read and write
45B1000
heap
page read and write
100C000
unkown
page execute and write copy
75A000
heap
page read and write
D74000
unkown
page execute and write copy
49C0000
heap
page read and write
6C5E000
stack
page read and write
4890000
trusted library allocation
page read and write
7A3000
heap
page read and write
17C000
stack
page read and write
5AD1000
trusted library allocation
page read and write
EFD000
unkown
page execute and read and write
46F0000
trusted library allocation
page read and write
6C0D000
stack
page read and write
3C0F000
stack
page read and write
4870000
trusted library allocation
page read and write
F51000
unkown
page execute and write copy
F90000
unkown
page execute and read and write
D62000
unkown
page execute and read and write
26CF000
stack
page read and write
1E0000
heap
page read and write
45B1000
heap
page read and write
2E8E000
stack
page read and write
FBE000
unkown
page execute and read and write
485D000
trusted library allocation
page execute and read and write
2BCF000
stack
page read and write
338E000
stack
page read and write
5D4000
heap
page read and write
6F0E000
stack
page read and write
F74000
unkown
page execute and write copy
FA0000
unkown
page execute and write copy
410F000
stack
page read and write
324E000
stack
page read and write
320F000
stack
page read and write
63E000
stack
page read and write
4F9000
stack
page read and write
5D4000
heap
page read and write
45B0000
heap
page read and write
5D4000
heap
page read and write
2A8F000
stack
page read and write
284E000
stack
page read and write
45B1000
heap
page read and write
5D4000
heap
page read and write
388D000
stack
page read and write
424F000
stack
page read and write
4700000
direct allocation
page read and write
F6C000
unkown
page execute and read and write
45A0000
direct allocation
page read and write
398F000
stack
page read and write
6D8E000
stack
page read and write
45A0000
direct allocation
page read and write
45A0000
direct allocation
page read and write
101A000
unkown
page execute and read and write
F7D000
unkown
page execute and read and write
45A0000
direct allocation
page read and write
2ACE000
stack
page read and write
1F0000
heap
page read and write
4897000
trusted library allocation
page execute and read and write
2D4E000
stack
page read and write
F09000
unkown
page execute and write copy
400E000
stack
page read and write
25AC000
stack
page read and write
F9E000
unkown
page execute and read and write
101C000
unkown
page execute and write copy
79E000
heap
page read and write
2F8F000
stack
page read and write
5AD4000
trusted library allocation
page read and write
3D8E000
stack
page read and write
F00000
unkown
page execute and read and write
D76000
unkown
page execute and write copy
39CE000
stack
page read and write
5D4000
heap
page read and write
D66000
unkown
page write copy
34CE000
stack
page read and write
F52000
unkown
page execute and read and write
EDC000
unkown
page execute and write copy
45A0000
direct allocation
page read and write
414E000
stack
page read and write
750000
heap
page read and write
6DCE000
stack
page read and write
There are 197 hidden memdumps, click here to show them.