IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
F3F000
heap
page read and write
D6F000
unkown
page execute and read and write
751E000
stack
page read and write
4AEF000
stack
page read and write
34AE000
stack
page read and write
EF0000
direct allocation
page read and write
3FEE000
stack
page read and write
30EF000
stack
page read and write
2D6E000
stack
page read and write
150F000
stack
page read and write
3FAF000
stack
page read and write
E6E000
unkown
page execute and write copy
336E000
stack
page read and write
35AF000
stack
page read and write
36EF000
stack
page read and write
3D6E000
stack
page read and write
2DC0000
direct allocation
page read and write
4FF0000
direct allocation
page execute and read and write
E1D000
unkown
page execute and write copy
53A1000
trusted library allocation
page read and write
E42000
unkown
page execute and read and write
DEE000
unkown
page execute and read and write
DDA000
unkown
page execute and write copy
BC2000
unkown
page execute and write copy
DB4000
unkown
page execute and read and write
D92000
unkown
page execute and read and write
2DC0000
direct allocation
page read and write
B74000
heap
page read and write
E1C000
unkown
page execute and read and write
2DC0000
direct allocation
page read and write
755E000
stack
page read and write
2EEF000
stack
page read and write
4E31000
heap
page read and write
4FC4000
trusted library allocation
page read and write
D74000
unkown
page execute and read and write
E1A000
unkown
page execute and write copy
412E000
stack
page read and write
DA1000
unkown
page execute and read and write
ECE000
stack
page read and write
D75000
unkown
page execute and write copy
DF3000
unkown
page execute and read and write
DB7000
unkown
page execute and read and write
78DE000
stack
page read and write
F00000
heap
page read and write
4FEA000
trusted library allocation
page execute and read and write
B74000
heap
page read and write
39AE000
stack
page read and write
426E000
stack
page read and write
436F000
stack
page read and write
DE3000
unkown
page execute and write copy
F49000
heap
page read and write
472F000
stack
page read and write
B74000
heap
page read and write
2DC0000
direct allocation
page read and write
B74000
heap
page read and write
4FE0000
trusted library allocation
page read and write
DFD000
unkown
page execute and write copy
5020000
trusted library allocation
page execute and read and write
2DC0000
direct allocation
page read and write
D4F000
unkown
page execute and read and write
140E000
stack
page read and write
2DC0000
direct allocation
page read and write
B74000
heap
page read and write
4E30000
heap
page read and write
4F70000
direct allocation
page read and write
D63000
unkown
page execute and write copy
BD6000
unkown
page execute and write copy
3E6F000
stack
page read and write
E29000
unkown
page execute and write copy
4FAC000
stack
page read and write
45EF000
stack
page read and write
2DC0000
direct allocation
page read and write
D50000
unkown
page execute and write copy
372E000
stack
page read and write
4FCD000
trusted library allocation
page execute and read and write
BC0000
unkown
page read and write
D62000
unkown
page execute and read and write
4FD0000
trusted library allocation
page read and write
F5E000
heap
page read and write
513E000
stack
page read and write
B50000
heap
page read and write
F0E000
heap
page read and write
2DE7000
heap
page read and write
F88000
heap
page read and write
B40000
heap
page read and write
3AEE000
stack
page read and write
322E000
stack
page read and write
5140000
trusted library allocation
page read and write
F0A000
heap
page read and write
528C000
stack
page read and write
3AAF000
stack
page read and write
B74000
heap
page read and write
2DC0000
direct allocation
page read and write
4F30000
trusted library allocation
page read and write
B74000
heap
page read and write
DEC000
unkown
page execute and write copy
4E31000
heap
page read and write
BC0000
unkown
page readonly
DB2000
unkown
page execute and write copy
E80000
unkown
page execute and write copy
4FFB000
trusted library allocation
page execute and read and write
B74000
heap
page read and write
40EF000
stack
page read and write
F8C000
heap
page read and write
74DE000
stack
page read and write
476E000
stack
page read and write
4FC3000
trusted library allocation
page execute and read and write
77DE000
stack
page read and write
462E000
stack
page read and write
DE5000
unkown
page execute and read and write
B74000
heap
page read and write
DB5000
unkown
page execute and write copy
E04000
unkown
page execute and read and write
D9A000
unkown
page execute and write copy
D39000
unkown
page execute and read and write
382F000
stack
page read and write
13CE000
stack
page read and write
DCA000
unkown
page execute and write copy
4E31000
heap
page read and write
2DC0000
direct allocation
page read and write
DA2000
unkown
page execute and write copy
E80000
unkown
page execute and write copy
51AE000
stack
page read and write
B74000
heap
page read and write
3D2F000
stack
page read and write
3EAE000
stack
page read and write
4FF0000
trusted library allocation
page read and write
B74000
heap
page read and write
E7E000
unkown
page execute and write copy
E68000
unkown
page execute and write copy
2DC0000
direct allocation
page read and write
63A4000
trusted library allocation
page read and write
4E41000
heap
page read and write
35EE000
stack
page read and write
BCA000
unkown
page execute and write copy
B74000
heap
page read and write
D5B000
unkown
page execute and write copy
5290000
heap
page execute and read and write
AD9000
stack
page read and write
D5B000
unkown
page execute and read and write
E41000
unkown
page execute and write copy
749D000
stack
page read and write
4F70000
direct allocation
page read and write
BC2000
unkown
page execute and read and write
DCF000
unkown
page execute and read and write
49EE000
stack
page read and write
48AE000
stack
page read and write
9DC000
stack
page read and write
BD4000
unkown
page execute and write copy
4F60000
trusted library allocation
page read and write
396F000
stack
page read and write
4FF7000
trusted library allocation
page execute and read and write
4E31000
heap
page read and write
44AF000
stack
page read and write
BC6000
unkown
page write copy
E0B000
unkown
page execute and write copy
2D2B000
stack
page read and write
5030000
heap
page read and write
2DAE000
stack
page read and write
49AF000
stack
page read and write
31EF000
stack
page read and write
D6E000
unkown
page execute and write copy
DE2000
unkown
page execute and read and write
D65000
unkown
page execute and read and write
BB0000
heap
page read and write
E67000
unkown
page execute and read and write
DEF000
unkown
page execute and write copy
5160000
heap
page read and write
332F000
stack
page read and write
B74000
heap
page read and write
B70000
heap
page read and write
B74000
heap
page read and write
4E31000
heap
page read and write
486F000
stack
page read and write
63A1000
trusted library allocation
page read and write
D8D000
unkown
page execute and write copy
4F30000
heap
page read and write
4FD4000
trusted library allocation
page read and write
F51000
heap
page read and write
E64000
unkown
page execute and write copy
E7E000
unkown
page execute and read and write
D53000
unkown
page execute and read and write
539E000
stack
page read and write
DA7000
unkown
page execute and read and write
2DC0000
direct allocation
page read and write
4F70000
direct allocation
page read and write
2DE0000
heap
page read and write
E0D000
unkown
page execute and read and write
B74000
heap
page read and write
2DC0000
direct allocation
page read and write
346F000
stack
page read and write
75D0000
heap
page execute and read and write
F41000
heap
page read and write
5150000
trusted library allocation
page read and write
76DE000
stack
page read and write
3C2E000
stack
page read and write
BC6000
unkown
page write copy
E2A000
unkown
page execute and read and write
D91000
unkown
page execute and write copy
4FC0000
direct allocation
page execute and read and write
B74000
heap
page read and write
386E000
stack
page read and write
2DC0000
direct allocation
page read and write
2CEE000
stack
page read and write
D5F000
unkown
page execute and write copy
D90000
unkown
page execute and read and write
D3C000
unkown
page execute and write copy
E1E000
unkown
page execute and read and write
44EE000
stack
page read and write
E6E000
unkown
page execute and write copy
D70000
unkown
page execute and write copy
2DC0000
direct allocation
page read and write
5010000
trusted library allocation
page read and write
43AE000
stack
page read and write
3BEF000
stack
page read and write
BCA000
unkown
page execute and read and write
4E31000
heap
page read and write
B74000
heap
page read and write
63C5000
trusted library allocation
page read and write
D76000
unkown
page execute and read and write
B74000
heap
page read and write
BD5000
unkown
page execute and read and write
422E000
stack
page read and write
2FEF000
stack
page read and write
There are 214 hidden memdumps, click here to show them.