IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
DC1000
unkown
page execute and write copy
4DD0000
trusted library allocation
page read and write
B86000
unkown
page write copy
313E000
stack
page read and write
4B11000
heap
page read and write
323F000
stack
page read and write
E4C000
unkown
page execute and write copy
71DE000
stack
page read and write
4B11000
heap
page read and write
4B00000
direct allocation
page read and write
4B11000
heap
page read and write
740E000
stack
page read and write
E8A000
heap
page read and write
3B3E000
stack
page read and write
4C50000
trusted library allocation
page read and write
4B23000
heap
page read and write
EC0000
heap
page read and write
AF0000
heap
page read and write
4B11000
heap
page read and write
467E000
stack
page read and write
453E000
stack
page read and write
E4A000
unkown
page execute and write copy
2A9F000
stack
page read and write
D28000
unkown
page execute and write copy
427F000
stack
page read and write
7200000
heap
page execute and read and write
337F000
stack
page read and write
B82000
unkown
page execute and write copy
4DCA000
trusted library allocation
page execute and read and write
4B00000
direct allocation
page read and write
B00000
heap
page read and write
E80000
heap
page read and write
4C60000
direct allocation
page read and write
DE7000
unkown
page execute and write copy
4B11000
heap
page read and write
EDD000
heap
page read and write
6AC000
stack
page read and write
4C10000
trusted library allocation
page read and write
3EFE000
stack
page read and write
4D9E000
stack
page read and write
2D7E000
stack
page read and write
463F000
stack
page read and write
DD3000
unkown
page execute and write copy
417E000
stack
page read and write
4C4D000
trusted library allocation
page execute and read and write
E32000
unkown
page execute and write copy
34BF000
stack
page read and write
4FB0000
trusted library allocation
page read and write
4E10000
heap
page read and write
4B00000
direct allocation
page read and write
363E000
stack
page read and write
DB6000
unkown
page execute and read and write
D9C000
unkown
page execute and write copy
B86000
unkown
page write copy
4E00000
trusted library allocation
page execute and read and write
299E000
stack
page read and write
DD2000
unkown
page execute and read and write
4B11000
heap
page read and write
B6E000
stack
page read and write
4B11000
heap
page read and write
35FF000
stack
page read and write
D2A000
unkown
page execute and write copy
B80000
unkown
page readonly
43BF000
stack
page read and write
7A9000
stack
page read and write
4B00000
direct allocation
page read and write
4B11000
heap
page read and write
4B00000
direct allocation
page read and write
DF8000
unkown
page execute and read and write
B8A000
unkown
page execute and read and write
39FE000
stack
page read and write
DB2000
unkown
page execute and write copy
E27000
unkown
page execute and write copy
38BE000
stack
page read and write
D3B000
unkown
page execute and write copy
D7C000
unkown
page execute and write copy
4FA0000
trusted library allocation
page read and write
D5B000
unkown
page execute and read and write
2FBF000
stack
page read and write
AF5000
heap
page read and write
CFF000
unkown
page execute and read and write
E34000
unkown
page execute and write copy
730E000
stack
page read and write
4B11000
heap
page read and write
11BF000
stack
page read and write
B80000
unkown
page read and write
43FE000
stack
page read and write
D3C000
unkown
page execute and read and write
4C30000
trusted library allocation
page read and write
D95000
unkown
page execute and read and write
4DDB000
trusted library allocation
page execute and read and write
4B11000
heap
page read and write
2E7F000
stack
page read and write
DC5000
unkown
page execute and write copy
D01000
unkown
page execute and write copy
2FFE000
stack
page read and write
4DC0000
direct allocation
page execute and read and write
D5A000
unkown
page execute and write copy
E4C000
unkown
page execute and write copy
D1D000
unkown
page execute and write copy
4DB0000
heap
page read and write
4B00000
direct allocation
page read and write
E8E000
heap
page read and write
4DC0000
trusted library allocation
page read and write
4F9C000
stack
page read and write
4B00000
direct allocation
page read and write
107F000
stack
page read and write
39BF000
stack
page read and write
744E000
stack
page read and write
5001000
trusted library allocation
page read and write
6004000
trusted library allocation
page read and write
D6B000
unkown
page execute and read and write
B96000
unkown
page execute and write copy
ED1000
heap
page read and write
DC2000
unkown
page execute and read and write
D44000
unkown
page execute and read and write
4FEE000
stack
page read and write
DC3000
unkown
page execute and write copy
377E000
stack
page read and write
4AE0000
heap
page read and write
E3B000
unkown
page execute and write copy
DC4000
unkown
page execute and read and write
4B11000
heap
page read and write
D3E000
unkown
page execute and write copy
E3B000
unkown
page execute and write copy
DE9000
unkown
page execute and read and write
44FF000
stack
page read and write
4B30000
heap
page read and write
4B11000
heap
page read and write
D62000
unkown
page execute and write copy
4C60000
direct allocation
page read and write
33BE000
stack
page read and write
30FF000
stack
page read and write
387F000
stack
page read and write
4E5E000
stack
page read and write
4DF0000
direct allocation
page execute and read and write
DCF000
unkown
page execute and write copy
4C54000
trusted library allocation
page read and write
6025000
trusted library allocation
page read and write
373F000
stack
page read and write
B8A000
unkown
page execute and write copy
4DD7000
trusted library allocation
page execute and read and write
4AC0000
direct allocation
page read and write
403E000
stack
page read and write
2B30000
heap
page read and write
2C3F000
stack
page read and write
4B11000
heap
page read and write
4B00000
direct allocation
page read and write
EC9000
heap
page read and write
D7F000
unkown
page execute and read and write
3C7E000
stack
page read and write
B82000
unkown
page execute and read and write
4C44000
trusted library allocation
page read and write
D31000
unkown
page execute and read and write
4B11000
heap
page read and write
4B00000
direct allocation
page read and write
3EBF000
stack
page read and write
DA3000
unkown
page execute and read and write
4B00000
direct allocation
page read and write
4B10000
heap
page read and write
4C43000
trusted library allocation
page execute and read and write
F0E000
heap
page read and write
3FFF000
stack
page read and write
D8C000
unkown
page execute and write copy
4DF0000
trusted library allocation
page read and write
6001000
trusted library allocation
page read and write
2B37000
heap
page read and write
3D7F000
stack
page read and write
4B00000
direct allocation
page read and write
E29000
unkown
page execute and read and write
4FF0000
heap
page execute and read and write
327E000
stack
page read and write
719D000
stack
page read and write
DD6000
unkown
page execute and read and write
2EBE000
stack
page read and write
DCE000
unkown
page execute and read and write
4F5E000
stack
page read and write
4C60000
direct allocation
page read and write
4B00000
direct allocation
page read and write
DC9000
unkown
page execute and read and write
4B11000
heap
page read and write
D20000
unkown
page execute and read and write
754F000
stack
page read and write
2B1E000
stack
page read and write
3AFF000
stack
page read and write
A10000
heap
page read and write
D2E000
unkown
page execute and write copy
42BE000
stack
page read and write
413F000
stack
page read and write
3DBE000
stack
page read and write
2ADC000
stack
page read and write
4C9C000
stack
page read and write
4B00000
direct allocation
page read and write
DF7000
unkown
page execute and write copy
4B11000
heap
page read and write
E60000
heap
page read and write
34FE000
stack
page read and write
E4A000
unkown
page execute and read and write
DCA000
unkown
page execute and write copy
3C3F000
stack
page read and write
D1C000
unkown
page execute and read and write
2D3F000
stack
page read and write
D2A000
unkown
page execute and read and write
477F000
stack
page read and write
E33000
unkown
page execute and read and write
4B00000
direct allocation
page read and write
10BE000
stack
page read and write
EBE000
heap
page read and write
There are 198 hidden memdumps, click here to show them.