IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
594000
unkown
page execute and read and write
618000
unkown
page execute and write copy
5CD000
unkown
page execute and read and write
6F1E000
stack
page read and write
686000
unkown
page execute and read and write
277F000
stack
page read and write
593000
unkown
page execute and write copy
473C000
stack
page read and write
45A0000
direct allocation
page read and write
637000
unkown
page execute and read and write
4B41000
trusted library allocation
page read and write
6A4000
unkown
page execute and read and write
AFE000
stack
page read and write
3D7E000
stack
page read and write
4700000
direct allocation
page read and write
5B44000
trusted library allocation
page read and write
683000
unkown
page execute and write copy
397F000
stack
page read and write
5DE000
unkown
page execute and read and write
2BBF000
stack
page read and write
597000
unkown
page execute and read and write
57E000
unkown
page execute and read and write
4700000
direct allocation
page read and write
3E7F000
stack
page read and write
45A0000
direct allocation
page read and write
48FF000
stack
page read and write
40FF000
stack
page read and write
384000
heap
page read and write
384000
heap
page read and write
3FFE000
stack
page read and write
3F6000
unkown
page write copy
D0F000
stack
page read and write
47EE000
stack
page read and write
47A0000
trusted library allocation
page read and write
49DE000
stack
page read and write
384000
heap
page read and write
45A0000
direct allocation
page read and write
45A0000
direct allocation
page read and write
4940000
trusted library allocation
page execute and read and write
624000
unkown
page execute and read and write
45A0000
direct allocation
page read and write
58A000
unkown
page execute and write copy
6A6000
unkown
page execute and write copy
608000
unkown
page execute and read and write
B4F000
heap
page read and write
35BF000
stack
page read and write
602000
unkown
page execute and read and write
636000
unkown
page execute and write copy
35FE000
stack
page read and write
3EBE000
stack
page read and write
423F000
stack
page read and write
384000
heap
page read and write
3AFE000
stack
page read and write
406000
unkown
page execute and write copy
4764000
trusted library allocation
page read and write
384000
heap
page read and write
4A2E000
stack
page read and write
31FF000
stack
page read and write
580000
unkown
page execute and write copy
B6C000
heap
page read and write
596000
unkown
page execute and write copy
3FA000
unkown
page execute and write copy
68F000
unkown
page execute and write copy
45B1000
heap
page read and write
25EE000
stack
page read and write
45A0000
direct allocation
page read and write
2FBE000
stack
page read and write
5B65000
trusted library allocation
page read and write
45B1000
heap
page read and write
2F7F000
stack
page read and write
45B1000
heap
page read and write
695000
unkown
page execute and write copy
4950000
trusted library allocation
page read and write
347F000
stack
page read and write
34BE000
stack
page read and write
45B1000
heap
page read and write
46B0000
heap
page read and write
384000
heap
page read and write
384000
heap
page read and write
45B1000
heap
page read and write
2CFF000
stack
page read and write
2ABE000
stack
page read and write
4700000
direct allocation
page read and write
45A0000
direct allocation
page read and write
3BFF000
stack
page read and write
61D000
unkown
page execute and write copy
B1A000
heap
page read and write
61C000
unkown
page execute and read and write
45A0000
direct allocation
page read and write
262E000
stack
page read and write
3C3E000
stack
page read and write
384000
heap
page read and write
45B1000
heap
page read and write
47F0000
heap
page read and write
45A0000
direct allocation
page read and write
3F0000
unkown
page read and write
35E000
stack
page read and write
39BE000
stack
page read and write
323E000
stack
page read and write
36FF000
stack
page read and write
383F000
stack
page read and write
6A6000
unkown
page execute and write copy
2A7F000
stack
page read and write
4770000
trusted library allocation
page read and write
384000
heap
page read and write
384000
heap
page read and write
279000
stack
page read and write
475D000
trusted library allocation
page execute and read and write
7BE000
stack
page read and write
384000
heap
page read and write
2E7E000
stack
page read and write
45A0000
direct allocation
page read and write
60C000
unkown
page execute and read and write
5B41000
trusted library allocation
page read and write
30FE000
stack
page read and write
384000
heap
page read and write
2F0000
heap
page read and write
25AF000
stack
page read and write
62D000
unkown
page execute and read and write
3CE000
stack
page read and write
373E000
stack
page read and write
387E000
stack
page read and write
45A0000
direct allocation
page read and write
3F2000
unkown
page execute and read and write
3ABF000
stack
page read and write
7FC000
stack
page read and write
701E000
stack
page read and write
B60000
heap
page read and write
B10000
heap
page read and write
3D3F000
stack
page read and write
493C000
stack
page read and write
609000
unkown
page execute and write copy
5FB000
unkown
page execute and write copy
3F6000
unkown
page write copy
4787000
trusted library allocation
page execute and read and write
45B0000
heap
page read and write
384000
heap
page read and write
6CDD000
stack
page read and write
5DD000
unkown
page execute and write copy
4B3E000
stack
page read and write
56B000
unkown
page execute and write copy
45A0000
direct allocation
page read and write
2677000
heap
page read and write
4754000
trusted library allocation
page read and write
6DDE000
stack
page read and write
2670000
heap
page read and write
45A0000
direct allocation
page read and write
4580000
direct allocation
page read and write
B58000
heap
page read and write
45A0000
direct allocation
page read and write
287F000
stack
page read and write
4760000
trusted library allocation
page read and write
3F2000
unkown
page execute and write copy
4750000
direct allocation
page execute and read and write
413E000
stack
page read and write
4A30000
heap
page read and write
384000
heap
page read and write
384000
heap
page read and write
B51000
heap
page read and write
6A4000
unkown
page execute and write copy
603000
unkown
page execute and write copy
2E3F000
stack
page read and write
384000
heap
page read and write
297F000
stack
page read and write
6EDF000
stack
page read and write
3FA000
unkown
page execute and read and write
380000
heap
page read and write
582000
unkown
page execute and read and write
4780000
trusted library allocation
page read and write
62C000
unkown
page execute and write copy
2BFE000
stack
page read and write
B1E000
heap
page read and write
45B1000
heap
page read and write
695000
unkown
page execute and write copy
384000
heap
page read and write
2E0000
heap
page read and write
3F0000
unkown
page readonly
477A000
trusted library allocation
page execute and read and write
337E000
stack
page read and write
17C000
stack
page read and write
478B000
trusted library allocation
page execute and read and write
333F000
stack
page read and write
5BA000
unkown
page execute and write copy
3D0000
heap
page read and write
49E0000
heap
page execute and read and write
568000
unkown
page execute and read and write
3FBF000
stack
page read and write
58B000
unkown
page execute and read and write
45C1000
heap
page read and write
46F0000
trusted library allocation
page read and write
2D3E000
stack
page read and write
46B0000
trusted library allocation
page read and write
4990000
heap
page execute and read and write
4780000
direct allocation
page execute and read and write
30BF000
stack
page read and write
4753000
trusted library allocation
page execute and read and write
266E000
stack
page read and write
384000
heap
page read and write
4960000
trusted library allocation
page read and write
There are 189 hidden memdumps, click here to show them.