IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
C4E000
heap
page read and write
103B000
unkown
page execute and write copy
B2E000
stack
page read and write
4920000
direct allocation
page read and write
FA5000
unkown
page execute and write copy
E46000
unkown
page execute and write copy
4920000
direct allocation
page read and write
4931000
heap
page read and write
FC5000
unkown
page execute and write copy
1003000
unkown
page execute and read and write
4AD0000
direct allocation
page execute and read and write
344F000
stack
page read and write
2A07000
heap
page read and write
AE4000
heap
page read and write
3F8F000
stack
page read and write
FCE000
unkown
page execute and read and write
3ACE000
stack
page read and write
E32000
unkown
page execute and write copy
4920000
direct allocation
page read and write
1050000
unkown
page execute and read and write
394F000
stack
page read and write
1011000
unkown
page execute and write copy
7160000
heap
page execute and read and write
1016000
unkown
page execute and write copy
4920000
direct allocation
page read and write
4920000
direct allocation
page read and write
4C30000
trusted library allocation
page read and write
FB5000
unkown
page execute and read and write
334E000
stack
page read and write
448F000
stack
page read and write
40CF000
stack
page read and write
2A00000
heap
page read and write
AE4000
heap
page read and write
4920000
direct allocation
page read and write
CD1000
heap
page read and write
4930000
heap
page read and write
CA1000
heap
page read and write
4920000
direct allocation
page read and write
C82000
heap
page read and write
1023000
unkown
page execute and write copy
4BEF000
stack
page read and write
10D6000
unkown
page execute and write copy
8F9000
stack
page read and write
10D8000
unkown
page execute and write copy
1033000
unkown
page execute and write copy
103E000
unkown
page execute and read and write
358F000
stack
page read and write
5E45000
trusted library allocation
page read and write
AE4000
heap
page read and write
105D000
unkown
page execute and read and write
FDA000
unkown
page execute and write copy
713E000
stack
page read and write
2D0F000
stack
page read and write
AE4000
heap
page read and write
1013000
unkown
page execute and write copy
FF2000
unkown
page execute and write copy
1066000
unkown
page execute and read and write
AE4000
heap
page read and write
2B0F000
stack
page read and write
4A30000
trusted library allocation
page read and write
C30000
heap
page read and write
420F000
stack
page read and write
C84000
heap
page read and write
73AE000
stack
page read and write
4920000
direct allocation
page read and write
E45000
unkown
page execute and read and write
44CE000
stack
page read and write
D7E000
stack
page read and write
1015000
unkown
page execute and read and write
AE4000
heap
page read and write
E30000
unkown
page readonly
AE4000
heap
page read and write
E30000
unkown
page read and write
4931000
heap
page read and write
1025000
unkown
page execute and read and write
570000
heap
page read and write
4A80000
direct allocation
page read and write
3A8F000
stack
page read and write
1051000
unkown
page execute and write copy
4931000
heap
page read and write
4C7E000
stack
page read and write
AE4000
heap
page read and write
E36000
unkown
page write copy
4C80000
trusted library allocation
page execute and read and write
ACE000
stack
page read and write
C4A000
heap
page read and write
10BF000
unkown
page execute and read and write
AE4000
heap
page read and write
4AE0000
heap
page read and write
3FCE000
stack
page read and write
AE4000
heap
page read and write
4BF0000
trusted library allocation
page read and write
4D10000
heap
page read and write
DFE000
stack
page read and write
4920000
direct allocation
page read and write
4AD3000
trusted library allocation
page execute and read and write
3E8E000
stack
page read and write
4C10000
direct allocation
page execute and read and write
AE4000
heap
page read and write
1054000
unkown
page execute and read and write
4A80000
direct allocation
page read and write
438E000
stack
page read and write
4920000
direct allocation
page read and write
70FE000
stack
page read and write
4920000
direct allocation
page read and write
10C6000
unkown
page execute and write copy
10BD000
unkown
page execute and write copy
1012000
unkown
page execute and read and write
4C1B000
trusted library allocation
page execute and read and write
10C0000
unkown
page execute and write copy
4920000
direct allocation
page read and write
AE4000
heap
page read and write
10D8000
unkown
page execute and write copy
10C6000
unkown
page execute and write copy
AE4000
heap
page read and write
384E000
stack
page read and write
434F000
stack
page read and write
2E0F000
stack
page read and write
FD7000
unkown
page execute and write copy
C2F000
stack
page read and write
4CDC000
stack
page read and write
4A70000
trusted library allocation
page read and write
424E000
stack
page read and write
36CF000
stack
page read and write
4A80000
direct allocation
page read and write
E36000
unkown
page write copy
4CF0000
trusted library allocation
page read and write
5E24000
trusted library allocation
page read and write
4C90000
heap
page execute and read and write
4920000
direct allocation
page read and write
105B000
unkown
page execute and write copy
C40000
heap
page read and write
2F4F000
stack
page read and write
2E4E000
stack
page read and write
35CE000
stack
page read and write
4931000
heap
page read and write
50C000
stack
page read and write
4931000
heap
page read and write
E44000
unkown
page execute and write copy
31CF000
stack
page read and write
4BF4000
trusted library allocation
page read and write
297F000
stack
page read and write
45CF000
stack
page read and write
6FFE000
stack
page read and write
E3A000
unkown
page execute and write copy
4C00000
trusted library allocation
page read and write
4C0A000
trusted library allocation
page execute and read and write
380F000
stack
page read and write
AE4000
heap
page read and write
5EE000
stack
page read and write
FC3000
unkown
page execute and write copy
4940000
heap
page read and write
4ADD000
trusted library allocation
page execute and read and write
320E000
stack
page read and write
AE4000
heap
page read and write
348E000
stack
page read and write
DBB000
stack
page read and write
10D6000
unkown
page execute and read and write
3D0F000
stack
page read and write
72AE000
stack
page read and write
AE0000
heap
page read and write
4C17000
trusted library allocation
page execute and read and write
4E21000
trusted library allocation
page read and write
410E000
stack
page read and write
6FBD000
stack
page read and write
308F000
stack
page read and write
330F000
stack
page read and write
FC3000
unkown
page execute and read and write
C96000
heap
page read and write
30CE000
stack
page read and write
4ABC000
stack
page read and write
E3A000
unkown
page execute and read and write
FDC000
unkown
page execute and read and write
398E000
stack
page read and write
370E000
stack
page read and write
2F8E000
stack
page read and write
726E000
stack
page read and write
1064000
unkown
page execute and write copy
29BE000
stack
page read and write
3C0E000
stack
page read and write
FA3000
unkown
page execute and read and write
FD8000
unkown
page execute and read and write
4C10000
trusted library allocation
page read and write
AE4000
heap
page read and write
5E21000
trusted library allocation
page read and write
580000
heap
page read and write
4AD4000
trusted library allocation
page read and write
4E1E000
stack
page read and write
FCB000
unkown
page execute and write copy
CD3000
heap
page read and write
1017000
unkown
page execute and read and write
4931000
heap
page read and write
3D4E000
stack
page read and write
104E000
unkown
page execute and write copy
AE4000
heap
page read and write
103A000
unkown
page execute and read and write
AE4000
heap
page read and write
C8D000
heap
page read and write
E32000
unkown
page execute and read and write
3E4F000
stack
page read and write
29FE000
stack
page read and write
4CE0000
trusted library allocation
page read and write
E20000
direct allocation
page read and write
4A30000
heap
page read and write
2C0F000
stack
page read and write
3BCF000
stack
page read and write
FCA000
unkown
page execute and read and write
4920000
direct allocation
page read and write
There are 198 hidden memdumps, click here to show them.