IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
A28000
unkown
page execute and read and write
50D0000
direct allocation
page read and write
1204000
heap
page read and write
1204000
heap
page read and write
4F81000
heap
page read and write
896000
unkown
page execute and write copy
515B000
trusted library allocation
page execute and read and write
764E000
stack
page read and write
32EF000
stack
page read and write
B14000
unkown
page execute and read and write
A14000
unkown
page execute and read and write
1204000
heap
page read and write
46EF000
stack
page read and write
3E6E000
stack
page read and write
131F000
heap
page read and write
A23000
unkown
page execute and write copy
546E000
stack
page read and write
A88000
unkown
page execute and write copy
A33000
unkown
page execute and write copy
A30000
unkown
page execute and read and write
151E000
stack
page read and write
4F70000
direct allocation
page read and write
882000
unkown
page execute and write copy
AA2000
unkown
page execute and write copy
AAB000
unkown
page execute and read and write
AB6000
unkown
page execute and write copy
4F70000
direct allocation
page read and write
45EE000
stack
page read and write
A7F000
unkown
page execute and read and write
886000
unkown
page write copy
6474000
trusted library allocation
page read and write
2FA0000
heap
page read and write
789E000
stack
page read and write
A34000
unkown
page execute and read and write
5150000
trusted library allocation
page read and write
B32000
unkown
page execute and write copy
B1D000
unkown
page execute and write copy
A6B000
unkown
page execute and write copy
5123000
trusted library allocation
page execute and read and write
11EE000
stack
page read and write
5471000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
1204000
heap
page read and write
332E000
stack
page read and write
5157000
trusted library allocation
page execute and read and write
A93000
unkown
page execute and write copy
A91000
unkown
page execute and write copy
1180000
heap
page read and write
A13000
unkown
page execute and write copy
133C000
heap
page read and write
880000
unkown
page readonly
A32000
unkown
page execute and read and write
5150000
direct allocation
page execute and read and write
B32000
unkown
page execute and read and write
40EE000
stack
page read and write
5124000
trusted library allocation
page read and write
49AE000
stack
page read and write
1204000
heap
page read and write
AAA000
unkown
page execute and write copy
4F70000
direct allocation
page read and write
52FF000
stack
page read and write
1204000
heap
page read and write
342F000
stack
page read and write
9FD000
unkown
page execute and read and write
4F70000
direct allocation
page read and write
4F70000
direct allocation
page read and write
3AAE000
stack
page read and write
A97000
unkown
page execute and read and write
356F000
stack
page read and write
1204000
heap
page read and write
760D000
stack
page read and write
514A000
trusted library allocation
page execute and read and write
1204000
heap
page read and write
886000
unkown
page write copy
4F70000
direct allocation
page read and write
4F70000
direct allocation
page read and write
4F90000
heap
page read and write
12EA000
heap
page read and write
3A6F000
stack
page read and write
50D0000
direct allocation
page read and write
B24000
unkown
page execute and write copy
436E000
stack
page read and write
2E0E000
stack
page read and write
B13000
unkown
page execute and write copy
4F81000
heap
page read and write
1204000
heap
page read and write
4BEF000
stack
page read and write
B34000
unkown
page execute and write copy
30AF000
stack
page read and write
36EE000
stack
page read and write
AA1000
unkown
page execute and read and write
4F50000
direct allocation
page read and write
5130000
trusted library allocation
page read and write
422D000
stack
page read and write
446F000
stack
page read and write
3F6F000
stack
page read and write
4F70000
direct allocation
page read and write
533C000
stack
page read and write
31EE000
stack
page read and write
4F80000
heap
page read and write
4F81000
heap
page read and write
392F000
stack
page read and write
51F0000
heap
page read and write
51EE000
stack
page read and write
5120000
direct allocation
page execute and read and write
78DE000
stack
page read and write
779E000
stack
page read and write
5190000
trusted library allocation
page read and write
4AAF000
stack
page read and write
A31000
unkown
page execute and write copy
A2F000
unkown
page execute and write copy
3E2F000
stack
page read and write
50D0000
direct allocation
page read and write
5180000
trusted library allocation
page execute and read and write
12EE000
heap
page read and write
14DF000
stack
page read and write
1327000
heap
page read and write
5360000
heap
page execute and read and write
AAD000
unkown
page execute and read and write
2F90000
heap
page read and write
88A000
unkown
page execute and read and write
103C000
stack
page read and write
A1E000
unkown
page execute and read and write
51A0000
heap
page read and write
346E000
stack
page read and write
AA5000
unkown
page execute and read and write
AA0000
unkown
page execute and write copy
1204000
heap
page read and write
88A000
unkown
page execute and write copy
AAC000
unkown
page execute and write copy
A89000
unkown
page execute and read and write
31AF000
stack
page read and write
472E000
stack
page read and write
132F000
heap
page read and write
396E000
stack
page read and write
5140000
trusted library allocation
page read and write
AA9000
unkown
page execute and read and write
35AE000
stack
page read and write
131D000
heap
page read and write
50C0000
trusted library allocation
page read and write
4AEE000
stack
page read and write
496F000
stack
page read and write
A00000
unkown
page execute and write copy
5340000
trusted library allocation
page read and write
4F70000
direct allocation
page read and write
3BEE000
stack
page read and write
775F000
stack
page read and write
45AF000
stack
page read and write
1204000
heap
page read and write
432E000
stack
page read and write
4F70000
direct allocation
page read and write
1204000
heap
page read and write
A10000
unkown
page execute and read and write
382E000
stack
page read and write
161F000
stack
page read and write
1204000
heap
page read and write
A92000
unkown
page execute and read and write
A6E000
unkown
page execute and read and write
A7C000
unkown
page execute and write copy
882000
unkown
page execute and read and write
5080000
heap
page read and write
1204000
heap
page read and write
2F4C000
stack
page read and write
ABF000
unkown
page execute and read and write
AA6000
unkown
page execute and write copy
1204000
heap
page read and write
2FA7000
heap
page read and write
512D000
trusted library allocation
page execute and read and write
40AF000
stack
page read and write
4F70000
direct allocation
page read and write
486E000
stack
page read and write
1204000
heap
page read and write
1204000
heap
page read and write
36AF000
stack
page read and write
A5D000
unkown
page execute and read and write
AB4000
unkown
page execute and write copy
4F70000
direct allocation
page read and write
5170000
trusted library allocation
page read and write
3D2E000
stack
page read and write
880000
unkown
page read and write
B34000
unkown
page execute and write copy
4F70000
direct allocation
page read and write
3CEF000
stack
page read and write
6495000
trusted library allocation
page read and write
7650000
heap
page execute and read and write
A4C000
unkown
page execute and write copy
A1D000
unkown
page execute and write copy
AB5000
unkown
page execute and read and write
1170000
heap
page read and write
4F81000
heap
page read and write
1139000
stack
page read and write
3BAF000
stack
page read and write
5134000
trusted library allocation
page read and write
510C000
stack
page read and write
1200000
heap
page read and write
6471000
trusted library allocation
page read and write
12E0000
heap
page read and write
B24000
unkown
page execute and write copy
41EF000
stack
page read and write
44AE000
stack
page read and write
2F0F000
stack
page read and write
4F70000
direct allocation
page read and write
3FAE000
stack
page read and write
482F000
stack
page read and write
4F81000
heap
page read and write
2F8E000
stack
page read and write
37EF000
stack
page read and write
79DE000
stack
page read and write
1204000
heap
page read and write
There are 199 hidden memdumps, click here to show them.