IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
415F000
stack
page read and write
233000
unkown
page execute and write copy
4651000
heap
page read and write
340000
unkown
page execute and read and write
26F000
unkown
page execute and read and write
32B000
unkown
page execute and write copy
1F3000
unkown
page execute and read and write
3B10000
heap
page read and write
4620000
heap
page read and write
340000
unkown
page execute and write copy
6DFE000
stack
page read and write
34CF000
stack
page read and write
3A0E000
stack
page read and write
429F000
stack
page read and write
29CE000
stack
page read and write
300E000
stack
page read and write
2A1000
unkown
page execute and read and write
6CBD000
stack
page read and write
4640000
direct allocation
page read and write
6F4E000
stack
page read and write
24BE000
stack
page read and write
4640000
direct allocation
page read and write
1F5000
unkown
page execute and write copy
4640000
direct allocation
page read and write
270000
unkown
page execute and write copy
4640000
direct allocation
page read and write
865000
heap
page read and write
419E000
stack
page read and write
49F0000
trusted library allocation
page read and write
4640000
direct allocation
page read and write
8A000
unkown
page execute and write copy
20F000
unkown
page execute and read and write
98D000
heap
page read and write
B8F000
stack
page read and write
4640000
direct allocation
page read and write
342000
unkown
page execute and write copy
4651000
heap
page read and write
4640000
direct allocation
page read and write
47F0000
direct allocation
page execute and read and write
274000
unkown
page execute and read and write
6E4E000
stack
page read and write
2D4F000
stack
page read and write
950000
heap
page read and write
270F000
stack
page read and write
4651000
heap
page read and write
320000
unkown
page execute and read and write
288E000
stack
page read and write
4640000
direct allocation
page read and write
6CFE000
stack
page read and write
38CE000
stack
page read and write
374F000
stack
page read and write
338F000
stack
page read and write
86000
unkown
page write copy
31E000
unkown
page execute and write copy
491B000
trusted library allocation
page execute and read and write
CCE000
stack
page read and write
26E000
unkown
page execute and write copy
47FA000
trusted library allocation
page execute and read and write
3C5F000
stack
page read and write
405E000
stack
page read and write
A8E000
stack
page read and write
830000
heap
page read and write
6F8E000
stack
page read and write
2D8E000
stack
page read and write
2C1000
unkown
page execute and write copy
47A0000
direct allocation
page read and write
4A10000
heap
page read and write
2ECE000
stack
page read and write
2DA000
unkown
page execute and write copy
95E000
heap
page read and write
BCE000
stack
page read and write
4651000
heap
page read and write
3F1E000
stack
page read and write
328E000
stack
page read and write
260B000
stack
page read and write
4640000
direct allocation
page read and write
39CF000
stack
page read and write
4640000
direct allocation
page read and write
708E000
stack
page read and write
213000
unkown
page execute and read and write
310F000
stack
page read and write
4651000
heap
page read and write
33CE000
stack
page read and write
96000
unkown
page execute and write copy
226000
unkown
page execute and write copy
4651000
heap
page read and write
4640000
direct allocation
page read and write
3B5E000
stack
page read and write
4651000
heap
page read and write
4990000
trusted library allocation
page read and write
4800000
heap
page read and write
5B45000
trusted library allocation
page read and write
285000
unkown
page execute and write copy
2C0000
unkown
page execute and read and write
28D000
unkown
page execute and read and write
4930000
direct allocation
page execute and read and write
4600000
direct allocation
page read and write
3B0F000
stack
page read and write
332000
unkown
page execute and write copy
378E000
stack
page read and write
24C7000
heap
page read and write
2B7000
unkown
page execute and write copy
251000
unkown
page execute and write copy
4640000
direct allocation
page read and write
4BC000
stack
page read and write
4651000
heap
page read and write
3D9F000
stack
page read and write
47A0000
direct allocation
page read and write
259000
unkown
page execute and write copy
2B0E000
stack
page read and write
25CF000
stack
page read and write
82000
unkown
page execute and read and write
4651000
heap
page read and write
5B9000
stack
page read and write
29F000
unkown
page execute and write copy
5B21000
trusted library allocation
page read and write
2B0000
unkown
page execute and read and write
4651000
heap
page read and write
2ACF000
stack
page read and write
274E000
stack
page read and write
263000
unkown
page execute and read and write
3DDE000
stack
page read and write
3EDF000
stack
page read and write
21C000
unkown
page execute and write copy
8A000
unkown
page execute and read and write
4B21000
trusted library allocation
page read and write
297000
unkown
page execute and read and write
5B24000
trusted library allocation
page read and write
82000
unkown
page execute and write copy
490E000
stack
page read and write
2C4E000
stack
page read and write
2BC000
unkown
page execute and read and write
21D000
unkown
page execute and read and write
224000
unkown
page execute and read and write
4917000
trusted library allocation
page execute and read and write
324F000
stack
page read and write
8A000
unkown
page execute and write copy
21F000
unkown
page execute and write copy
2AB000
unkown
page execute and write copy
820000
heap
page read and write
27B000
unkown
page execute and read and write
4750000
trusted library allocation
page read and write
288000
unkown
page execute and write copy
388F000
stack
page read and write
4794000
trusted library allocation
page read and write
4770000
trusted library allocation
page read and write
98F000
heap
page read and write
4651000
heap
page read and write
80000
unkown
page read and write
236000
unkown
page execute and read and write
4640000
direct allocation
page read and write
47F0000
trusted library allocation
page read and write
342000
unkown
page execute and write copy
284F000
stack
page read and write
6E00000
heap
page execute and read and write
2C9000
unkown
page execute and read and write
997000
heap
page read and write
860000
heap
page read and write
86000
unkown
page write copy
4651000
heap
page read and write
49A0000
heap
page execute and read and write
9AC000
heap
page read and write
350E000
stack
page read and write
4651000
heap
page read and write
4B1F000
stack
page read and write
360F000
stack
page read and write
2BD000
unkown
page execute and write copy
4651000
heap
page read and write
210000
unkown
page execute and write copy
4980000
trusted library allocation
page execute and read and write
4651000
heap
page read and write
231000
unkown
page execute and read and write
227000
unkown
page execute and read and write
364E000
stack
page read and write
4640000
direct allocation
page read and write
3C9E000
stack
page read and write
4651000
heap
page read and write
47DB000
stack
page read and write
497E000
stack
page read and write
298F000
stack
page read and write
4651000
heap
page read and write
230000
unkown
page execute and write copy
4790000
trusted library allocation
page read and write
2E8F000
stack
page read and write
95A000
heap
page read and write
4784000
trusted library allocation
page read and write
294000
unkown
page execute and write copy
401F000
stack
page read and write
2C0F000
stack
page read and write
252000
unkown
page execute and read and write
332000
unkown
page execute and write copy
4783000
trusted library allocation
page execute and read and write
276000
unkown
page execute and write copy
4650000
heap
page read and write
4660000
heap
page read and write
21C000
unkown
page execute and write copy
277000
unkown
page execute and read and write
80000
unkown
page readonly
278000
unkown
page execute and write copy
24C0000
heap
page read and write
47A0000
direct allocation
page read and write
314E000
stack
page read and write
2FCF000
stack
page read and write
49EC000
stack
page read and write
2DB000
unkown
page execute and read and write
4930000
trusted library allocation
page read and write
287000
unkown
page execute and read and write
478D000
trusted library allocation
page execute and read and write
4910000
trusted library allocation
page read and write
There are 199 hidden memdumps, click here to show them.