IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
4C41000
heap
page read and write
F0000
unkown
page read and write
2CFF000
stack
page read and write
318000
unkown
page execute and write copy
2AF7000
heap
page read and write
323E000
stack
page read and write
43CE000
stack
page read and write
748E000
stack
page read and write
4C30000
direct allocation
page read and write
4C41000
heap
page read and write
EC3000
heap
page read and write
E10000
heap
page read and write
2BFF000
stack
page read and write
4F4F000
stack
page read and write
2FBE000
stack
page read and write
4DCB000
stack
page read and write
2E3F000
stack
page read and write
4C41000
heap
page read and write
30BF000
stack
page read and write
4C41000
heap
page read and write
4C30000
direct allocation
page read and write
4C41000
heap
page read and write
4DF0000
trusted library allocation
page read and write
4D73000
trusted library allocation
page execute and read and write
75CE000
stack
page read and write
279000
unkown
page execute and write copy
321000
unkown
page execute and read and write
381000
unkown
page execute and write copy
2D9000
unkown
page execute and write copy
4C40000
heap
page read and write
2CA000
unkown
page execute and read and write
AAC000
stack
page read and write
474F000
stack
page read and write
36FF000
stack
page read and write
E3A000
heap
page read and write
E3E000
heap
page read and write
E8E000
heap
page read and write
3FFE000
stack
page read and write
E79000
heap
page read and write
E30000
heap
page read and write
4C41000
heap
page read and write
2F5000
unkown
page execute and write copy
4380000
heap
page read and write
E20000
heap
page read and write
4D84000
trusted library allocation
page read and write
4C30000
direct allocation
page read and write
2E7E000
stack
page read and write
4C41000
heap
page read and write
44CF000
stack
page read and write
118F000
stack
page read and write
3D7E000
stack
page read and write
F6000
unkown
page write copy
259000
unkown
page execute and read and write
3EBD000
stack
page read and write
F2000
unkown
page execute and read and write
61F5000
trusted library allocation
page read and write
4BF0000
direct allocation
page read and write
4C41000
heap
page read and write
4D7D000
trusted library allocation
page execute and read and write
2A9000
unkown
page execute and write copy
4DE0000
trusted library allocation
page read and write
3FBF000
stack
page read and write
26C000
unkown
page execute and read and write
4C41000
heap
page read and write
4D80000
trusted library allocation
page read and write
282000
unkown
page execute and write copy
3AFE000
stack
page read and write
387E000
stack
page read and write
50C0000
heap
page execute and read and write
347F000
stack
page read and write
35FE000
stack
page read and write
4D60000
trusted library allocation
page read and write
31FF000
stack
page read and write
E71000
heap
page read and write
11CE000
stack
page read and write
4E10000
direct allocation
page execute and read and write
39A000
unkown
page execute and write copy
4C41000
heap
page read and write
4E30000
trusted library allocation
page read and write
4E20000
trusted library allocation
page execute and read and write
4FD0000
trusted library allocation
page read and write
478E000
stack
page read and write
28D000
unkown
page execute and write copy
30FE000
stack
page read and write
2EE000
unkown
page execute and read and write
39A000
unkown
page execute and read and write
2FF000
unkown
page execute and write copy
4C50000
heap
page read and write
104000
unkown
page execute and write copy
3C3E000
stack
page read and write
4C30000
direct allocation
page read and write
38A000
unkown
page execute and write copy
BA9000
stack
page read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
333F000
stack
page read and write
4FE0000
heap
page read and write
4C30000
direct allocation
page read and write
4C30000
direct allocation
page read and write
4C41000
heap
page read and write
4E10000
trusted library allocation
page read and write
373E000
stack
page read and write
FB0000
heap
page read and write
4C30000
direct allocation
page read and write
740F000
stack
page read and write
383F000
stack
page read and write
35BF000
stack
page read and write
61D4000
trusted library allocation
page read and write
F2000
unkown
page execute and write copy
413E000
stack
page read and write
51CE000
stack
page read and write
4FCC000
stack
page read and write
302000
unkown
page execute and read and write
4D90000
direct allocation
page read and write
40FF000
stack
page read and write
4D90000
direct allocation
page read and write
4C30000
direct allocation
page read and write
E81000
heap
page read and write
423F000
stack
page read and write
437F000
stack
page read and write
2AAE000
stack
page read and write
E6F000
heap
page read and write
294000
unkown
page execute and read and write
F6000
unkown
page write copy
4E40000
heap
page read and write
12CF000
stack
page read and write
3ABF000
stack
page read and write
4C30000
direct allocation
page read and write
4C41000
heap
page read and write
34BE000
stack
page read and write
F0000
unkown
page readonly
38A000
unkown
page execute and write copy
337E000
stack
page read and write
314000
unkown
page execute and write copy
2E2000
unkown
page execute and read and write
279000
unkown
page execute and read and write
25C000
unkown
page execute and write copy
488F000
stack
page read and write
4DE0000
direct allocation
page execute and read and write
2AF0000
heap
page read and write
383000
unkown
page execute and write copy
F8E000
stack
page read and write
450E000
stack
page read and write
744E000
stack
page read and write
730E000
stack
page read and write
FA000
unkown
page execute and read and write
3D3F000
stack
page read and write
FA000
unkown
page execute and write copy
317000
unkown
page execute and read and write
397F000
stack
page read and write
2E9000
unkown
page execute and write copy
4D74000
trusted library allocation
page read and write
30E000
unkown
page execute and read and write
4C30000
direct allocation
page read and write
2BB000
unkown
page execute and read and write
2AEC000
stack
page read and write
4C10000
heap
page read and write
4D90000
direct allocation
page read and write
4C30000
direct allocation
page read and write
4C30000
direct allocation
page read and write
3BFF000
stack
page read and write
4C41000
heap
page read and write
4D40000
trusted library allocation
page read and write
4F8E000
stack
page read and write
4C30000
direct allocation
page read and write
284000
unkown
page execute and read and write
2F7F000
stack
page read and write
74C0000
heap
page execute and read and write
2C6000
unkown
page execute and write copy
382000
unkown
page execute and read and write
279000
unkown
page execute and write copy
76CE000
stack
page read and write
427E000
stack
page read and write
105000
unkown
page execute and read and write
309000
unkown
page execute and write copy
4DFB000
trusted library allocation
page execute and read and write
FB5000
heap
page read and write
4C30000
direct allocation
page read and write
2F7000
unkown
page execute and read and write
2D3E000
stack
page read and write
72CD000
stack
page read and write
4C41000
heap
page read and write
3E7F000
stack
page read and write
51D1000
trusted library allocation
page read and write
4DEA000
trusted library allocation
page execute and read and write
FA000
unkown
page execute and write copy
4DF7000
trusted library allocation
page execute and read and write
464E000
stack
page read and write
106000
unkown
page execute and write copy
39BE000
stack
page read and write
61D1000
trusted library allocation
page read and write
460F000
stack
page read and write
There are 182 hidden memdumps, click here to show them.