IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
4A2B000
trusted library allocation
page execute and read and write
ABE000
stack
page read and write
A50000
heap
page read and write
5CF5000
trusted library allocation
page read and write
4840000
direct allocation
page read and write
6DAC000
stack
page read and write
5C8000
unkown
page execute and write copy
AF4000
heap
page read and write
542000
unkown
page execute and read and write
4A1A000
trusted library allocation
page execute and read and write
2810000
heap
page read and write
401E000
stack
page read and write
49F4000
trusted library allocation
page read and write
4B6E000
stack
page read and write
6EC0000
trusted library allocation
page read and write
646000
unkown
page execute and write copy
4A50000
trusted library allocation
page execute and read and write
4BAE000
stack
page read and write
578000
unkown
page execute and write copy
AF4000
heap
page read and write
57E000
unkown
page execute and read and write
5D9000
unkown
page execute and write copy
635000
unkown
page execute and write copy
4851000
heap
page read and write
72BE000
stack
page read and write
311E000
stack
page read and write
5C5000
unkown
page execute and write copy
390000
unkown
page read and write
582000
unkown
page execute and read and write
644000
unkown
page execute and write copy
5B2000
unkown
page execute and read and write
AF4000
heap
page read and write
4990000
trusted library allocation
page read and write
5B6000
unkown
page execute and write copy
429E000
stack
page read and write
2E5F000
stack
page read and write
51A000
unkown
page execute and read and write
AF4000
heap
page read and write
F0E000
stack
page read and write
2FDE000
stack
page read and write
4860000
heap
page read and write
4840000
direct allocation
page read and write
AE0000
heap
page read and write
5CD1000
trusted library allocation
page read and write
392000
unkown
page execute and write copy
4A40000
trusted library allocation
page read and write
2A9F000
stack
page read and write
4870000
heap
page read and write
27EF000
stack
page read and write
AF0000
heap
page read and write
AF4000
heap
page read and write
3EDE000
stack
page read and write
2ADE000
stack
page read and write
6DC000
stack
page read and write
3E9F000
stack
page read and write
4840000
direct allocation
page read and write
530000
unkown
page execute and read and write
30DF000
stack
page read and write
5DA000
unkown
page execute and read and write
4950000
trusted library allocation
page read and write
57B000
unkown
page execute and write copy
4A20000
trusted library allocation
page read and write
506000
unkown
page execute and read and write
AF4000
heap
page read and write
4A10000
trusted library allocation
page read and write
B7D000
heap
page read and write
4840000
direct allocation
page read and write
4851000
heap
page read and write
2D1F000
stack
page read and write
3ADF000
stack
page read and write
4851000
heap
page read and write
56C000
unkown
page execute and read and write
425F000
stack
page read and write
49A0000
direct allocation
page read and write
AF4000
heap
page read and write
4840000
direct allocation
page read and write
2D5E000
stack
page read and write
325E000
stack
page read and write
644000
unkown
page execute and read and write
5AF000
unkown
page execute and write copy
390000
unkown
page readonly
543000
unkown
page execute and write copy
4840000
direct allocation
page read and write
339E000
stack
page read and write
2F9F000
stack
page read and write
321F000
stack
page read and write
3D5E000
stack
page read and write
AF4000
heap
page read and write
5BD000
unkown
page execute and read and write
625000
unkown
page execute and write copy
AF4000
heap
page read and write
524000
unkown
page execute and write copy
5C7000
unkown
page execute and read and write
703E000
stack
page read and write
34DE000
stack
page read and write
AF4000
heap
page read and write
389E000
stack
page read and write
AF4000
heap
page read and write
49F0000
direct allocation
page execute and read and write
5CD4000
trusted library allocation
page read and write
4851000
heap
page read and write
62F000
unkown
page execute and write copy
3C1E000
stack
page read and write
4A04000
trusted library allocation
page read and write
39A000
unkown
page execute and read and write
4840000
direct allocation
page read and write
646000
unkown
page execute and write copy
49A0000
direct allocation
page read and write
B40000
heap
page read and write
411F000
stack
page read and write
299E000
stack
page read and write
4A27000
trusted library allocation
page execute and read and write
4851000
heap
page read and write
AF4000
heap
page read and write
396000
unkown
page write copy
707E000
stack
page read and write
2BDF000
stack
page read and write
635000
unkown
page execute and write copy
295F000
stack
page read and write
56B000
unkown
page execute and write copy
361E000
stack
page read and write
4840000
direct allocation
page read and write
593000
unkown
page execute and write copy
49A0000
direct allocation
page read and write
3A6000
unkown
page execute and write copy
4A20000
direct allocation
page execute and read and write
AF4000
heap
page read and write
4840000
direct allocation
page read and write
5A8000
unkown
page execute and read and write
3FDF000
stack
page read and write
AF4000
heap
page read and write
524000
unkown
page execute and read and write
2817000
heap
page read and write
4CD1000
trusted library allocation
page read and write
39DE000
stack
page read and write
58C000
unkown
page execute and write copy
717E000
stack
page read and write
371F000
stack
page read and write
5A5000
unkown
page execute and write copy
4865000
heap
page read and write
4840000
direct allocation
page read and write
439F000
stack
page read and write
4A60000
heap
page read and write
335F000
stack
page read and write
43DE000
stack
page read and write
2E9E000
stack
page read and write
B9C000
heap
page read and write
AF4000
heap
page read and write
26EE000
stack
page read and write
385F000
stack
page read and write
597000
unkown
page execute and read and write
4820000
direct allocation
page read and write
6F30000
heap
page execute and read and write
44DF000
stack
page read and write
399F000
stack
page read and write
4840000
direct allocation
page read and write
56A000
unkown
page execute and read and write
626000
unkown
page execute and read and write
5CF000
unkown
page execute and read and write
3C5E000
stack
page read and write
392000
unkown
page execute and read and write
396000
unkown
page write copy
B4E000
heap
page read and write
AF4000
heap
page read and write
592000
unkown
page execute and read and write
49F3000
trusted library allocation
page execute and read and write
B4A000
heap
page read and write
7D9000
stack
page read and write
6EAD000
stack
page read and write
3D9E000
stack
page read and write
415E000
stack
page read and write
4840000
direct allocation
page read and write
544000
unkown
page execute and read and write
4A00000
trusted library allocation
page read and write
508000
unkown
page execute and write copy
AF4000
heap
page read and write
49FD000
trusted library allocation
page execute and read and write
285B000
stack
page read and write
6EFE000
stack
page read and write
54F000
unkown
page execute and write copy
52F000
unkown
page execute and write copy
2C1E000
stack
page read and write
4851000
heap
page read and write
39A000
unkown
page execute and write copy
375E000
stack
page read and write
5B5000
unkown
page execute and read and write
4CBE000
stack
page read and write
550000
unkown
page execute and read and write
B87000
heap
page read and write
556000
unkown
page execute and write copy
E0E000
stack
page read and write
6EB0000
trusted library allocation
page read and write
541000
unkown
page execute and write copy
AF4000
heap
page read and write
4851000
heap
page read and write
A40000
heap
page read and write
4BB0000
heap
page execute and read and write
3B1E000
stack
page read and write
4840000
direct allocation
page read and write
B7F000
heap
page read and write
B3E000
stack
page read and write
4950000
heap
page read and write
35DF000
stack
page read and write
5B3000
unkown
page execute and write copy
349F000
stack
page read and write
580000
unkown
page execute and write copy
71BE000
stack
page read and write
4850000
heap
page read and write
4840000
direct allocation
page read and write
57A000
unkown
page execute and read and write
49DC000
stack
page read and write
4CC0000
heap
page read and write
There are 202 hidden memdumps, click here to show them.