IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
3B3E000
stack
page read and write
156E000
stack
page read and write
105B000
unkown
page execute and read and write
FCE000
unkown
page execute and read and write
5151000
heap
page read and write
5160000
heap
page read and write
5140000
direct allocation
page read and write
115C000
heap
page read and write
3EFE000
stack
page read and write
4A3E000
stack
page read and write
5140000
direct allocation
page read and write
66A1000
trusted library allocation
page read and write
10DE000
unkown
page execute and write copy
5140000
direct allocation
page read and write
413F000
stack
page read and write
5490000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
5151000
heap
page read and write
3EBF000
stack
page read and write
77DD000
stack
page read and write
FDF000
unkown
page execute and read and write
3DBE000
stack
page read and write
53DE000
stack
page read and write
FC1000
unkown
page execute and read and write
5590000
heap
page execute and read and write
4B7E000
stack
page read and write
5151000
heap
page read and write
3AFF000
stack
page read and write
10C5000
unkown
page execute and write copy
FB7000
unkown
page execute and read and write
CFC000
stack
page read and write
7BDE000
stack
page read and write
DF9000
stack
page read and write
377E000
stack
page read and write
5400000
trusted library allocation
page read and write
5100000
direct allocation
page read and write
5140000
direct allocation
page read and write
5430000
trusted library allocation
page read and write
5151000
heap
page read and write
781E000
stack
page read and write
5294000
trusted library allocation
page read and write
E32000
unkown
page execute and read and write
5151000
heap
page read and write
403E000
stack
page read and write
791E000
stack
page read and write
34BF000
stack
page read and write
5140000
direct allocation
page read and write
5140000
direct allocation
page read and write
43FE000
stack
page read and write
3080000
heap
page read and write
1050000
unkown
page execute and write copy
4B3F000
stack
page read and write
1051000
unkown
page execute and read and write
5270000
trusted library allocation
page read and write
547E000
stack
page read and write
2FBE000
stack
page read and write
F9E000
unkown
page execute and write copy
110A000
heap
page read and write
363E000
stack
page read and write
1064000
unkown
page execute and read and write
417E000
stack
page read and write
E30000
unkown
page readonly
307E000
stack
page read and write
103F000
unkown
page execute and write copy
39FE000
stack
page read and write
E36000
unkown
page write copy
5120000
heap
page read and write
33BF000
stack
page read and write
303E000
stack
page read and write
5140000
direct allocation
page read and write
453E000
stack
page read and write
1041000
unkown
page execute and read and write
FCB000
unkown
page execute and write copy
102A000
unkown
page execute and write copy
E3A000
unkown
page execute and read and write
48FE000
stack
page read and write
427F000
stack
page read and write
1420000
heap
page read and write
2FFB000
stack
page read and write
5151000
heap
page read and write
E3A000
unkown
page execute and write copy
38BE000
stack
page read and write
3D7F000
stack
page read and write
31BF000
stack
page read and write
5151000
heap
page read and write
17CF000
stack
page read and write
1052000
unkown
page execute and write copy
528D000
trusted library allocation
page execute and read and write
5140000
direct allocation
page read and write
30B7000
heap
page read and write
10C7000
unkown
page execute and read and write
48BF000
stack
page read and write
799E000
stack
page read and write
5151000
heap
page read and write
53FA000
trusted library allocation
page execute and read and write
540B000
trusted library allocation
page execute and read and write
1065000
unkown
page execute and write copy
1036000
unkown
page execute and write copy
10DE000
unkown
page execute and read and write
5140000
direct allocation
page read and write
3C3F000
stack
page read and write
1057000
unkown
page execute and write copy
10C8000
unkown
page execute and write copy
463E000
stack
page read and write
5151000
heap
page read and write
10E0000
unkown
page execute and write copy
1016000
unkown
page execute and read and write
4DBF000
stack
page read and write
113F000
heap
page read and write
53F0000
trusted library allocation
page read and write
52A0000
direct allocation
page read and write
387F000
stack
page read and write
E36000
unkown
page write copy
5140000
direct allocation
page read and write
1500000
heap
page read and write
16CE000
stack
page read and write
1027000
unkown
page execute and write copy
5407000
trusted library allocation
page execute and read and write
569E000
stack
page read and write
5480000
trusted library allocation
page execute and read and write
10E0000
unkown
page execute and write copy
E46000
unkown
page execute and write copy
32BF000
stack
page read and write
1191000
heap
page read and write
5283000
trusted library allocation
page execute and read and write
E30000
unkown
page read and write
1038000
unkown
page execute and read and write
7ADE000
stack
page read and write
5151000
heap
page read and write
113D000
heap
page read and write
5140000
direct allocation
page read and write
54A0000
trusted library allocation
page read and write
47BE000
stack
page read and write
FF3000
unkown
page execute and write copy
10D0000
unkown
page execute and write copy
1100000
heap
page read and write
1148000
heap
page read and write
477F000
stack
page read and write
1029000
unkown
page execute and read and write
53F0000
direct allocation
page execute and read and write
5140000
direct allocation
page read and write
43BF000
stack
page read and write
35FF000
stack
page read and write
5151000
heap
page read and write
5284000
trusted library allocation
page read and write
5151000
heap
page read and write
3FFF000
stack
page read and write
42BE000
stack
page read and write
66C5000
trusted library allocation
page read and write
5430000
direct allocation
page execute and read and write
5420000
heap
page read and write
5151000
heap
page read and write
52A0000
direct allocation
page read and write
3C7E000
stack
page read and write
1150000
heap
page read and write
795E000
stack
page read and write
106F000
unkown
page execute and read and write
34FE000
stack
page read and write
F9C000
unkown
page execute and read and write
1005000
unkown
page execute and read and write
1580000
heap
page read and write
5151000
heap
page read and write
1056000
unkown
page execute and read and write
4C7F000
stack
page read and write
373F000
stack
page read and write
76DC000
stack
page read and write
1585000
heap
page read and write
5151000
heap
page read and write
44FF000
stack
page read and write
10D0000
unkown
page execute and write copy
79D0000
heap
page execute and read and write
4CBE000
stack
page read and write
5250000
trusted library allocation
page read and write
39BF000
stack
page read and write
54B0000
heap
page read and write
E32000
unkown
page execute and write copy
30B0000
heap
page read and write
52A0000
direct allocation
page read and write
102E000
unkown
page execute and read and write
5150000
heap
page read and write
467E000
stack
page read and write
1013000
unkown
page execute and write copy
FDE000
unkown
page execute and write copy
5140000
direct allocation
page read and write
56A1000
trusted library allocation
page read and write
52DC000
stack
page read and write
5151000
heap
page read and write
5140000
direct allocation
page read and write
168E000
stack
page read and write
1063000
unkown
page execute and write copy
49FF000
stack
page read and write
110E000
heap
page read and write
FC1000
unkown
page execute and write copy
66A4000
trusted library allocation
page read and write
There are 184 hidden memdumps, click here to show them.