IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
4F60000
heap
page execute and read and write
1054000
heap
page read and write
76AE000
stack
page read and write
D15000
unkown
page execute and read and write
3D7F000
stack
page read and write
B10000
unkown
page read and write
453E000
stack
page read and write
CED000
unkown
page execute and write copy
4C30000
direct allocation
page read and write
AFE000
stack
page read and write
CB8000
unkown
page execute and read and write
72B0000
trusted library allocation
page read and write
2C77000
heap
page read and write
4DE4000
trusted library allocation
page read and write
A3C000
stack
page read and write
337F000
stack
page read and write
D9B000
unkown
page execute and read and write
4DF4000
trusted library allocation
page read and write
D5E000
unkown
page execute and write copy
1054000
heap
page read and write
CA7000
unkown
page execute and read and write
4E00000
heap
page read and write
1050000
heap
page read and write
B10000
unkown
page readonly
1054000
heap
page read and write
F10000
heap
page read and write
5111000
trusted library allocation
page read and write
75AE000
stack
page read and write
C9A000
unkown
page execute and read and write
4C40000
heap
page read and write
2D7F000
stack
page read and write
D1A000
unkown
page execute and read and write
D29000
unkown
page execute and read and write
B12000
unkown
page execute and write copy
C99000
unkown
page execute and write copy
D31000
unkown
page execute and write copy
F59000
heap
page read and write
A80000
heap
page read and write
CD4000
unkown
page execute and write copy
1054000
heap
page read and write
467E000
stack
page read and write
3EFE000
stack
page read and write
4C30000
direct allocation
page read and write
4C30000
direct allocation
page read and write
2BCF000
stack
page read and write
4F20000
trusted library allocation
page read and write
4C41000
heap
page read and write
323F000
stack
page read and write
4DCC000
stack
page read and write
4C30000
direct allocation
page read and write
D99000
unkown
page execute and write copy
4C41000
heap
page read and write
1054000
heap
page read and write
1054000
heap
page read and write
DA3000
unkown
page execute and write copy
C8F000
unkown
page execute and read and write
477F000
stack
page read and write
D27000
unkown
page execute and write copy
4D80000
trusted library allocation
page read and write
377E000
stack
page read and write
4D90000
direct allocation
page read and write
4C30000
direct allocation
page read and write
F6D000
heap
page read and write
4C41000
heap
page read and write
CA4000
unkown
page execute and write copy
3C3F000
stack
page read and write
CC8000
unkown
page execute and write copy
373F000
stack
page read and write
4C30000
direct allocation
page read and write
1054000
heap
page read and write
DB4000
unkown
page execute and write copy
4C41000
heap
page read and write
4F50000
trusted library allocation
page execute and read and write
4C30000
direct allocation
page read and write
3B3E000
stack
page read and write
CB7000
unkown
page execute and write copy
30FF000
stack
page read and write
1054000
heap
page read and write
DB2000
unkown
page execute and write copy
39FE000
stack
page read and write
3C7E000
stack
page read and write
B12000
unkown
page execute and read and write
72EE000
stack
page read and write
CA6000
unkown
page execute and write copy
35FF000
stack
page read and write
3FFF000
stack
page read and write
4FAE000
stack
page read and write
1054000
heap
page read and write
F1E000
heap
page read and write
CFF000
unkown
page execute and write copy
2C4E000
stack
page read and write
CCB000
unkown
page execute and write copy
4D90000
direct allocation
page read and write
D5F000
unkown
page execute and read and write
C80000
unkown
page execute and write copy
413F000
stack
page read and write
313E000
stack
page read and write
3AFF000
stack
page read and write
33BE000
stack
page read and write
3DBE000
stack
page read and write
B16000
unkown
page write copy
4F10000
trusted library allocation
page read and write
FA2000
heap
page read and write
D09000
unkown
page execute and read and write
42BE000
stack
page read and write
4FEC000
stack
page read and write
4F20000
direct allocation
page execute and read and write
D9C000
unkown
page execute and write copy
DB2000
unkown
page execute and read and write
6135000
trusted library allocation
page read and write
F1A000
heap
page read and write
2C0C000
stack
page read and write
4C30000
direct allocation
page read and write
3EBF000
stack
page read and write
732E000
stack
page read and write
510E000
stack
page read and write
A90000
heap
page read and write
1054000
heap
page read and write
4FF0000
trusted library allocation
page read and write
387F000
stack
page read and write
7360000
heap
page execute and read and write
34BF000
stack
page read and write
1054000
heap
page read and write
CCC000
unkown
page execute and read and write
4F1A000
trusted library allocation
page execute and read and write
CA5000
unkown
page execute and read and write
4C30000
direct allocation
page read and write
746E000
stack
page read and write
132F000
stack
page read and write
43FE000
stack
page read and write
2C50000
heap
page read and write
CDE000
unkown
page execute and read and write
4D40000
trusted library allocation
page read and write
48BF000
stack
page read and write
D11000
unkown
page execute and write copy
2FBF000
stack
page read and write
1054000
heap
page read and write
38BE000
stack
page read and write
B16000
unkown
page write copy
72AD000
stack
page read and write
2E7F000
stack
page read and write
C7E000
unkown
page execute and read and write
122F000
stack
page read and write
D42000
unkown
page execute and read and write
4F27000
trusted library allocation
page execute and read and write
5000000
heap
page read and write
B1A000
unkown
page execute and write copy
D16000
unkown
page execute and write copy
4DED000
trusted library allocation
page execute and read and write
4C30000
direct allocation
page read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
B1A000
unkown
page execute and read and write
F51000
heap
page read and write
1054000
heap
page read and write
6111000
trusted library allocation
page read and write
4DE0000
direct allocation
page execute and read and write
4C10000
direct allocation
page read and write
1054000
heap
page read and write
4C30000
direct allocation
page read and write
44FF000
stack
page read and write
D35000
unkown
page execute and read and write
363E000
stack
page read and write
4C30000
direct allocation
page read and write
2FFE000
stack
page read and write
1054000
heap
page read and write
CC9000
unkown
page execute and read and write
39BF000
stack
page read and write
1054000
heap
page read and write
1054000
heap
page read and write
4C50000
heap
page read and write
EFE000
stack
page read and write
4D90000
direct allocation
page read and write
2EBE000
stack
page read and write
417E000
stack
page read and write
463F000
stack
page read and write
D26000
unkown
page execute and read and write
4F0E000
stack
page read and write
6114000
trusted library allocation
page read and write
D3A000
unkown
page execute and write copy
4DE3000
trusted library allocation
page execute and read and write
756E000
stack
page read and write
CEF000
unkown
page execute and read and write
427F000
stack
page read and write
43BF000
stack
page read and write
34FE000
stack
page read and write
B26000
unkown
page execute and write copy
4C30000
direct allocation
page read and write
EB9000
stack
page read and write
4F2B000
trusted library allocation
page execute and read and write
403E000
stack
page read and write
1054000
heap
page read and write
47BE000
stack
page read and write
DB4000
unkown
page execute and write copy
D36000
unkown
page execute and write copy
4DF0000
trusted library allocation
page read and write
327E000
stack
page read and write
4F40000
trusted library allocation
page read and write
4C30000
direct allocation
page read and write
4D40000
heap
page read and write
2C70000
heap
page read and write
D23000
unkown
page execute and write copy
DA3000
unkown
page execute and write copy
104E000
stack
page read and write
D39000
unkown
page execute and read and write
There are 195 hidden memdumps, click here to show them.