IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
CD0000
heap
page read and write
A96000
unkown
page execute and write copy
42DE000
stack
page read and write
301E000
stack
page read and write
5EE5000
trusted library allocation
page read and write
2FDF000
stack
page read and write
311F000
stack
page read and write
AAE000
unkown
page execute and read and write
329E000
stack
page read and write
A86000
unkown
page execute and read and write
29DC000
stack
page read and write
AC3000
unkown
page execute and write copy
3DDE000
stack
page read and write
4CD0000
trusted library allocation
page read and write
4A10000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
49E0000
direct allocation
page read and write
4E60000
trusted library allocation
page read and write
43DF000
stack
page read and write
B32000
unkown
page execute and read and write
441E000
stack
page read and write
5BC000
stack
page read and write
49E0000
direct allocation
page read and write
465F000
stack
page read and write
49F1000
heap
page read and write
CD4000
heap
page read and write
49E0000
direct allocation
page read and write
389F000
stack
page read and write
B19000
unkown
page execute and write copy
34DF000
stack
page read and write
5EC1000
trusted library allocation
page read and write
90A000
unkown
page execute and read and write
4B90000
direct allocation
page execute and read and write
900000
unkown
page readonly
B1B000
unkown
page execute and write copy
49E0000
direct allocation
page read and write
70F0000
heap
page execute and read and write
4E70000
heap
page execute and read and write
3EDF000
stack
page read and write
4B30000
trusted library allocation
page read and write
DA1000
heap
page read and write
D51000
heap
page read and write
D10000
heap
page read and write
2897000
heap
page read and write
451F000
stack
page read and write
CD4000
heap
page read and write
4EC1000
trusted library allocation
page read and write
AE3000
unkown
page execute and write copy
916000
unkown
page execute and write copy
315E000
stack
page read and write
B49000
unkown
page execute and write copy
325F000
stack
page read and write
299F000
stack
page read and write
AE5000
unkown
page execute and write copy
CD4000
heap
page read and write
AD9000
unkown
page execute and read and write
CD4000
heap
page read and write
3D9F000
stack
page read and write
CD4000
heap
page read and write
A99000
unkown
page execute and write copy
365E000
stack
page read and write
CD4000
heap
page read and write
375F000
stack
page read and write
747E000
stack
page read and write
272E000
stack
page read and write
D1A000
heap
page read and write
4CD7000
trusted library allocation
page execute and read and write
CD4000
heap
page read and write
49F1000
heap
page read and write
4BC0000
heap
page read and write
A97000
unkown
page execute and read and write
4CDB000
trusted library allocation
page execute and read and write
CD4000
heap
page read and write
401F000
stack
page read and write
CD4000
heap
page read and write
CD4000
heap
page read and write
33DE000
stack
page read and write
90A000
unkown
page execute and write copy
4E50000
trusted library allocation
page read and write
CD4000
heap
page read and write
2880000
heap
page read and write
B30000
unkown
page execute and write copy
BAC000
unkown
page execute and read and write
3B1F000
stack
page read and write
D1E000
heap
page read and write
AC0000
unkown
page execute and write copy
CD4000
heap
page read and write
419E000
stack
page read and write
709D000
stack
page read and write
B3C000
unkown
page execute and read and write
CD4000
heap
page read and write
4AF0000
heap
page read and write
ACC000
unkown
page execute and write copy
49E0000
direct allocation
page read and write
49E0000
direct allocation
page read and write
D6D000
heap
page read and write
CD4000
heap
page read and write
3C9E000
stack
page read and write
906000
unkown
page write copy
4CCE000
stack
page read and write
8F9000
stack
page read and write
4CF0000
trusted library allocation
page read and write
A76000
unkown
page execute and write copy
CD4000
heap
page read and write
900000
unkown
page read and write
49F0000
heap
page read and write
4BA4000
trusted library allocation
page read and write
A92000
unkown
page execute and write copy
455E000
stack
page read and write
4B40000
direct allocation
page read and write
AF6000
unkown
page execute and write copy
4A00000
heap
page read and write
70DE000
stack
page read and write
4B40000
direct allocation
page read and write
B21000
unkown
page execute and read and write
49E0000
direct allocation
page read and write
3B5E000
stack
page read and write
2C5E000
stack
page read and write
AD7000
unkown
page execute and read and write
5EC4000
trusted library allocation
page read and write
D58000
heap
page read and write
49E0000
direct allocation
page read and write
B1A000
unkown
page execute and read and write
39DF000
stack
page read and write
49E0000
direct allocation
page read and write
F4E000
stack
page read and write
AE8000
unkown
page execute and read and write
4B93000
trusted library allocation
page execute and read and write
2E9F000
stack
page read and write
2ADF000
stack
page read and write
AC1000
unkown
page execute and read and write
429F000
stack
page read and write
4BBA000
trusted library allocation
page execute and read and write
CC0000
heap
page read and write
737E000
stack
page read and write
2EDE000
stack
page read and write
BAE000
unkown
page execute and write copy
A9B000
unkown
page execute and read and write
B13000
unkown
page execute and read and write
4BB0000
trusted library allocation
page read and write
361F000
stack
page read and write
49E0000
direct allocation
page read and write
2D5F000
stack
page read and write
A92000
unkown
page execute and read and write
2C1F000
stack
page read and write
BAE000
unkown
page execute and write copy
B02000
unkown
page execute and read and write
2890000
heap
page read and write
49C0000
direct allocation
page read and write
902000
unkown
page execute and read and write
AC4000
unkown
page execute and read and write
B4A000
unkown
page execute and read and write
351E000
stack
page read and write
282F000
stack
page read and write
AD8000
unkown
page execute and write copy
379E000
stack
page read and write
4BA0000
trusted library allocation
page read and write
A74000
unkown
page execute and read and write
B10000
unkown
page execute and write copy
3C5F000
stack
page read and write
BAC000
unkown
page execute and write copy
3A1E000
stack
page read and write
B9D000
unkown
page execute and write copy
CD4000
heap
page read and write
405E000
stack
page read and write
415F000
stack
page read and write
49F1000
heap
page read and write
4AF0000
trusted library allocation
page read and write
2B1E000
stack
page read and write
AF9000
unkown
page execute and read and write
B9D000
unkown
page execute and write copy
4B7C000
stack
page read and write
2D9E000
stack
page read and write
49E0000
direct allocation
page read and write
4B9D000
trusted library allocation
page execute and read and write
4B94000
trusted library allocation
page read and write
6F9C000
stack
page read and write
4A04000
heap
page read and write
38DE000
stack
page read and write
CD4000
heap
page read and write
906000
unkown
page write copy
71FE000
stack
page read and write
AA7000
unkown
page execute and write copy
723E000
stack
page read and write
AFA000
unkown
page execute and write copy
4E3F000
stack
page read and write
BE0000
heap
page read and write
B94000
unkown
page execute and write copy
CD4000
heap
page read and write
339F000
stack
page read and write
3F1E000
stack
page read and write
733E000
stack
page read and write
AE4000
unkown
page execute and read and write
B3A000
unkown
page execute and write copy
49F1000
heap
page read and write
E4E000
stack
page read and write
4EB0000
heap
page read and write
902000
unkown
page execute and write copy
4E40000
trusted library allocation
page execute and read and write
49E0000
direct allocation
page read and write
287E000
stack
page read and write
4D3E000
stack
page read and write
49F1000
heap
page read and write
49E0000
direct allocation
page read and write
4B40000
direct allocation
page read and write
49E0000
direct allocation
page read and write
There are 196 hidden memdumps, click here to show them.