IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
6F6000
unkown
page execute and write copy
4C8E000
stack
page read and write
49C0000
heap
page read and write
49F1000
heap
page read and write
D0A000
heap
page read and write
39DF000
stack
page read and write
D5C000
heap
page read and write
325F000
stack
page read and write
4CBB000
trusted library allocation
page execute and read and write
49E0000
direct allocation
page read and write
D47000
heap
page read and write
49E0000
direct allocation
page read and write
4B34000
trusted library allocation
page read and write
3EDF000
stack
page read and write
4F81000
trusted library allocation
page read and write
389F000
stack
page read and write
49F1000
heap
page read and write
465F000
stack
page read and write
2D5F000
stack
page read and write
7B4000
unkown
page execute and write copy
510000
unkown
page read and write
2C1F000
stack
page read and write
6DA000
unkown
page execute and write copy
745E000
stack
page read and write
2B1E000
stack
page read and write
49E0000
direct allocation
page read and write
3B1F000
stack
page read and write
5F84000
trusted library allocation
page read and write
49A0000
direct allocation
page read and write
38DE000
stack
page read and write
4E70000
heap
page read and write
361F000
stack
page read and write
379E000
stack
page read and write
351E000
stack
page read and write
731E000
stack
page read and write
3B5E000
stack
page read and write
721F000
stack
page read and write
289C000
stack
page read and write
375F000
stack
page read and write
4F7E000
stack
page read and write
49F1000
heap
page read and write
4CA0000
trusted library allocation
page read and write
6C5000
unkown
page execute and read and write
70BE000
stack
page read and write
707D000
stack
page read and write
750000
unkown
page execute and write copy
2C5E000
stack
page read and write
339F000
stack
page read and write
4B40000
direct allocation
page read and write
49E0000
direct allocation
page read and write
42DE000
stack
page read and write
735000
unkown
page execute and write copy
719000
unkown
page execute and write copy
510000
unkown
page readonly
49E0000
direct allocation
page read and write
4B40000
direct allocation
page read and write
69B000
unkown
page execute and read and write
33DE000
stack
page read and write
4B80000
heap
page read and write
49F1000
heap
page read and write
A5C000
stack
page read and write
7C6000
unkown
page execute and write copy
715000
unkown
page execute and write copy
4B40000
direct allocation
page read and write
28D7000
heap
page read and write
2FDF000
stack
page read and write
34DF000
stack
page read and write
419E000
stack
page read and write
739000
unkown
page execute and read and write
6C8000
unkown
page execute and read and write
3A1E000
stack
page read and write
49E0000
direct allocation
page read and write
4D80000
trusted library allocation
page read and write
4D1E000
stack
page read and write
6B1000
unkown
page execute and read and write
6A9000
unkown
page execute and read and write
4D5C000
stack
page read and write
7A2000
unkown
page execute and read and write
714000
unkown
page execute and read and write
2D9E000
stack
page read and write
49F1000
heap
page read and write
315E000
stack
page read and write
4DB0000
heap
page execute and read and write
E3E000
stack
page read and write
F3F000
stack
page read and write
285E000
stack
page read and write
4D60000
trusted library allocation
page execute and read and write
752000
unkown
page execute and read and write
6A9000
unkown
page execute and write copy
4B23000
trusted library allocation
page execute and read and write
71E000
unkown
page execute and write copy
301E000
stack
page read and write
329E000
stack
page read and write
51A000
unkown
page execute and write copy
49E0000
direct allocation
page read and write
4CD0000
direct allocation
page execute and read and write
7AE000
unkown
page execute and write copy
718000
unkown
page execute and read and write
49F1000
heap
page read and write
723000
unkown
page execute and read and write
526000
unkown
page execute and write copy
4CD0000
trusted library allocation
page read and write
5FA5000
trusted library allocation
page read and write
512000
unkown
page execute and read and write
BC0000
heap
page read and write
49F1000
heap
page read and write
405E000
stack
page read and write
516000
unkown
page write copy
3F1E000
stack
page read and write
49F0000
heap
page read and write
516000
unkown
page write copy
6C3000
unkown
page execute and write copy
451F000
stack
page read and write
49F1000
heap
page read and write
455E000
stack
page read and write
49F1000
heap
page read and write
3C9E000
stack
page read and write
49F1000
heap
page read and write
4B7C000
stack
page read and write
365E000
stack
page read and write
49F1000
heap
page read and write
49E0000
direct allocation
page read and write
49E0000
direct allocation
page read and write
748000
unkown
page execute and read and write
4CB7000
trusted library allocation
page execute and read and write
4CA0000
direct allocation
page execute and read and write
B59000
stack
page read and write
CB5000
heap
page read and write
107E000
stack
page read and write
4A00000
heap
page read and write
311F000
stack
page read and write
415F000
stack
page read and write
3C5F000
stack
page read and write
4B2D000
trusted library allocation
page execute and read and write
7C6000
unkown
page execute and write copy
6F8000
unkown
page execute and read and write
4CB0000
trusted library allocation
page read and write
49F1000
heap
page read and write
3DDE000
stack
page read and write
43DF000
stack
page read and write
49F1000
heap
page read and write
683000
unkown
page execute and read and write
4B30000
trusted library allocation
page read and write
4D70000
trusted library allocation
page read and write
6EC000
unkown
page execute and read and write
49E0000
direct allocation
page read and write
71D000
unkown
page execute and read and write
4B24000
trusted library allocation
page read and write
2ADF000
stack
page read and write
7C4000
unkown
page execute and read and write
D00000
heap
page read and write
4AF0000
trusted library allocation
page read and write
29DF000
stack
page read and write
7C4000
unkown
page execute and write copy
49E0000
direct allocation
page read and write
429F000
stack
page read and write
7A0000
unkown
page execute and write copy
D8B000
heap
page read and write
49F1000
heap
page read and write
2EDE000
stack
page read and write
D0E000
heap
page read and write
741000
unkown
page execute and write copy
28D0000
heap
page read and write
F7E000
stack
page read and write
49E0000
direct allocation
page read and write
28A0000
heap
page read and write
401F000
stack
page read and write
713000
unkown
page execute and write copy
6AE000
unkown
page execute and write copy
D40000
heap
page read and write
441E000
stack
page read and write
5F81000
trusted library allocation
page read and write
49E0000
direct allocation
page read and write
51A000
unkown
page execute and read and write
735E000
stack
page read and write
4B10000
trusted library allocation
page read and write
7110000
heap
page execute and read and write
2E9F000
stack
page read and write
CA0000
heap
page read and write
512000
unkown
page execute and write copy
6C7000
unkown
page execute and write copy
49E0000
direct allocation
page read and write
6FB000
unkown
page execute and read and write
4CAA000
trusted library allocation
page execute and read and write
7B4000
unkown
page execute and write copy
3D9F000
stack
page read and write
70FE000
stack
page read and write
686000
unkown
page execute and write copy
CB0000
heap
page read and write
6F9000
unkown
page execute and write copy
49F1000
heap
page read and write
There are 181 hidden memdumps, click here to show them.