IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
206000
unkown
page write copy
6F00000
heap
page execute and read and write
46B0000
direct allocation
page read and write
4990000
trusted library allocation
page read and write
2ACF000
stack
page read and write
273E000
stack
page read and write
420F000
stack
page read and write
2CCF000
stack
page read and write
5BB5000
trusted library allocation
page read and write
46C1000
heap
page read and write
330F000
stack
page read and write
46B0000
direct allocation
page read and write
402000
unkown
page execute and read and write
410E000
stack
page read and write
5C0000
heap
page read and write
47D0000
direct allocation
page read and write
4B2000
unkown
page execute and read and write
A4E000
stack
page read and write
A70000
heap
page read and write
431000
unkown
page execute and read and write
A74000
heap
page read and write
2BCF000
stack
page read and write
320E000
stack
page read and write
4B91000
trusted library allocation
page read and write
27C0000
heap
page read and write
A74000
heap
page read and write
47D0000
direct allocation
page read and write
4A50000
heap
page execute and read and write
3BCF000
stack
page read and write
6EEE000
stack
page read and write
5B94000
trusted library allocation
page read and write
6D2D000
stack
page read and write
4B8E000
stack
page read and write
3E9000
unkown
page execute and write copy
334E000
stack
page read and write
46D0000
heap
page read and write
36E000
unkown
page execute and write copy
4980000
trusted library allocation
page read and write
A74000
heap
page read and write
31CF000
stack
page read and write
200000
unkown
page readonly
2F4F000
stack
page read and write
47D0000
direct allocation
page read and write
3CF000
unkown
page execute and write copy
49C000
unkown
page execute and write copy
277E000
stack
page read and write
29CF000
stack
page read and write
46C1000
heap
page read and write
35CE000
stack
page read and write
3A8F000
stack
page read and write
4973000
trusted library allocation
page execute and read and write
3FA000
unkown
page execute and write copy
2F8E000
stack
page read and write
36CF000
stack
page read and write
3D7000
unkown
page execute and read and write
2D0E000
stack
page read and write
46B0000
direct allocation
page read and write
424E000
stack
page read and write
200000
unkown
page read and write
A74000
heap
page read and write
443000
unkown
page execute and read and write
216000
unkown
page execute and write copy
A74000
heap
page read and write
47C0000
trusted library allocation
page read and write
4A70000
trusted library allocation
page read and write
46B0000
direct allocation
page read and write
496E000
stack
page read and write
4690000
direct allocation
page read and write
8F9000
stack
page read and write
4984000
trusted library allocation
page read and write
46B0000
direct allocation
page read and write
4820000
trusted library allocation
page read and write
3D4E000
stack
page read and write
30CE000
stack
page read and write
38F000
unkown
page execute and read and write
4A3000
unkown
page execute and write copy
3CA000
unkown
page execute and write copy
3EC000
unkown
page execute and read and write
3E8E000
stack
page read and write
3F8F000
stack
page read and write
3F9000
unkown
page execute and read and write
A74000
heap
page read and write
410000
unkown
page execute and write copy
3F6000
unkown
page execute and write copy
26FF000
stack
page read and write
5B91000
trusted library allocation
page read and write
54C000
stack
page read and write
46B0000
direct allocation
page read and write
A74000
heap
page read and write
36C000
unkown
page execute and read and write
49A7000
trusted library allocation
page execute and read and write
A74000
heap
page read and write
49A0000
trusted library allocation
page read and write
40CF000
stack
page read and write
344F000
stack
page read and write
C60000
heap
page read and write
C6A000
heap
page read and write
202000
unkown
page execute and read and write
416000
unkown
page execute and read and write
4A4C000
stack
page read and write
CA1000
heap
page read and write
202000
unkown
page execute and write copy
417000
unkown
page execute and write copy
A74000
heap
page read and write
20A000
unkown
page execute and read and write
46C0000
heap
page read and write
A74000
heap
page read and write
49C0000
trusted library allocation
page read and write
A74000
heap
page read and write
46B0000
direct allocation
page read and write
4974000
trusted library allocation
page read and write
46B0000
direct allocation
page read and write
A0E000
stack
page read and write
B7F000
stack
page read and write
46B0000
direct allocation
page read and write
4B4000
unkown
page execute and write copy
4A60000
trusted library allocation
page execute and read and write
C9F000
heap
page read and write
3E4F000
stack
page read and write
27C7000
heap
page read and write
E5E000
stack
page read and write
397000
unkown
page execute and write copy
6D6E000
stack
page read and write
46C1000
heap
page read and write
710F000
stack
page read and write
399000
unkown
page execute and read and write
CA9000
heap
page read and write
46B0000
direct allocation
page read and write
407000
unkown
page execute and read and write
4970000
direct allocation
page execute and read and write
42A000
unkown
page execute and write copy
46C1000
heap
page read and write
700E000
stack
page read and write
4A0E000
stack
page read and write
3FCE000
stack
page read and write
3D0F000
stack
page read and write
A74000
heap
page read and write
6D30000
trusted library allocation
page read and write
C6E000
heap
page read and write
46B0000
direct allocation
page read and write
46B0000
direct allocation
page read and write
CBE000
heap
page read and write
394F000
stack
page read and write
46B0000
direct allocation
page read and write
434F000
stack
page read and write
BBE000
stack
page read and write
A74000
heap
page read and write
28CF000
stack
page read and write
6E6F000
stack
page read and write
49AB000
trusted library allocation
page execute and read and write
3C0E000
stack
page read and write
358F000
stack
page read and write
38E000
unkown
page execute and write copy
43A000
unkown
page execute and read and write
3CE000
unkown
page execute and read and write
C3E000
stack
page read and write
3AC000
unkown
page execute and write copy
4B2000
unkown
page execute and write copy
3ACE000
stack
page read and write
380F000
stack
page read and write
2E0F000
stack
page read and write
4B4000
unkown
page execute and write copy
4A3000
unkown
page execute and write copy
403000
unkown
page execute and write copy
49A0000
direct allocation
page execute and read and write
308F000
stack
page read and write
27BE000
stack
page read and write
46B0000
direct allocation
page read and write
486C000
stack
page read and write
BFC000
stack
page read and write
2E4E000
stack
page read and write
384E000
stack
page read and write
3AD000
unkown
page execute and read and write
46C1000
heap
page read and write
4A80000
heap
page read and write
A74000
heap
page read and write
6EAE000
stack
page read and write
497D000
trusted library allocation
page execute and read and write
206000
unkown
page write copy
A60000
heap
page read and write
A74000
heap
page read and write
47F0000
heap
page read and write
419000
unkown
page execute and read and write
383000
unkown
page execute and read and write
20A000
unkown
page execute and write copy
5B0000
heap
page read and write
499A000
trusted library allocation
page execute and read and write
A74000
heap
page read and write
20A000
unkown
page execute and write copy
46C1000
heap
page read and write
398E000
stack
page read and write
43B000
unkown
page execute and write copy
370E000
stack
page read and write
A74000
heap
page read and write
A74000
heap
page read and write
439000
unkown
page execute and write copy
348E000
stack
page read and write
47E0000
heap
page read and write
There are 188 hidden memdumps, click here to show them.