IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
48F1000
heap
page read and write
4BAA000
trusted library allocation
page execute and read and write
3F6000
unkown
page execute and write copy
4A50000
direct allocation
page read and write
364F000
stack
page read and write
E57000
heap
page read and write
40A000
unkown
page execute and read and write
4BD0000
direct allocation
page execute and read and write
5D61000
trusted library allocation
page read and write
3CE000
unkown
page execute and write copy
1D0000
unkown
page readonly
48F1000
heap
page read and write
10AF000
stack
page read and write
49F0000
trusted library allocation
page read and write
4D3E000
stack
page read and write
3DB000
unkown
page execute and write copy
3EA000
unkown
page execute and read and write
6F3D000
stack
page read and write
378F000
stack
page read and write
378000
unkown
page execute and write copy
1D6000
unkown
page write copy
48F1000
heap
page read and write
3E0E000
stack
page read and write
49F0000
heap
page read and write
4BBB000
trusted library allocation
page execute and read and write
1E5000
unkown
page execute and read and write
48E0000
direct allocation
page read and write
368000
unkown
page execute and write copy
3EB000
unkown
page execute and write copy
3E0000
unkown
page execute and read and write
48E0000
direct allocation
page read and write
723E000
stack
page read and write
340E000
stack
page read and write
48A0000
direct allocation
page read and write
4BF0000
heap
page execute and read and write
4A50000
direct allocation
page read and write
3EE000
unkown
page execute and read and write
2ECF000
stack
page read and write
4BB0000
trusted library allocation
page read and write
47A000
unkown
page execute and write copy
2C4F000
stack
page read and write
48F1000
heap
page read and write
70FE000
stack
page read and write
3E8000
unkown
page execute and write copy
38CF000
stack
page read and write
48E0000
direct allocation
page read and write
48E0000
direct allocation
page read and write
6FBE000
stack
page read and write
3F0000
unkown
page execute and read and write
4900000
heap
page read and write
5D85000
trusted library allocation
page read and write
2A4F000
stack
page read and write
350F000
stack
page read and write
3B4F000
stack
page read and write
48E0000
direct allocation
page read and write
4D61000
trusted library allocation
page read and write
1DA000
unkown
page execute and read and write
48F0000
heap
page read and write
41B000
unkown
page execute and read and write
CB5000
heap
page read and write
430E000
stack
page read and write
340000
unkown
page execute and write copy
75C000
stack
page read and write
48E0000
direct allocation
page read and write
48F1000
heap
page read and write
4A33000
trusted library allocation
page execute and read and write
2B4F000
stack
page read and write
48E0000
direct allocation
page read and write
48F1000
heap
page read and write
1D2000
unkown
page execute and write copy
7C0000
heap
page read and write
48E0000
direct allocation
page read and write
294F000
stack
page read and write
4D50000
heap
page read and write
3A4000
unkown
page execute and read and write
3F4E000
stack
page read and write
3F7000
unkown
page execute and read and write
3C6000
unkown
page execute and read and write
6FF0000
heap
page execute and read and write
48F1000
heap
page read and write
32CE000
stack
page read and write
468000
unkown
page execute and write copy
3C4000
unkown
page execute and write copy
4A40000
trusted library allocation
page read and write
3D3000
unkown
page execute and read and write
71FF000
stack
page read and write
1D6000
unkown
page write copy
EBE000
heap
page read and write
5D64000
trusted library allocation
page read and write
1D0000
unkown
page read and write
E9E000
stack
page read and write
3FE000
unkown
page execute and read and write
41A000
unkown
page execute and write copy
375000
unkown
page execute and read and write
1DA000
unkown
page execute and write copy
440F000
stack
page read and write
3B7000
unkown
page execute and read and write
48F1000
heap
page read and write
48E0000
direct allocation
page read and write
2C8E000
stack
page read and write
48F1000
heap
page read and write
3DCF000
stack
page read and write
402000
unkown
page execute and write copy
35E000
unkown
page execute and read and write
461000
unkown
page execute and write copy
6F40000
trusted library allocation
page read and write
EF0000
heap
page read and write
4BB7000
trusted library allocation
page execute and read and write
4B8F000
stack
page read and write
3FF000
unkown
page execute and write copy
328F000
stack
page read and write
33CF000
stack
page read and write
3F8000
unkown
page execute and write copy
EEE000
heap
page read and write
2F0E000
stack
page read and write
CB0000
heap
page read and write
C0E000
stack
page read and write
478000
unkown
page execute and read and write
304E000
stack
page read and write
3A0F000
stack
page read and write
4A20000
trusted library allocation
page read and write
48F1000
heap
page read and write
3CCE000
stack
page read and write
4A44000
trusted library allocation
page read and write
47A000
unkown
page execute and write copy
351000
unkown
page execute and read and write
E3E000
stack
page read and write
33D000
unkown
page execute and read and write
3F0F000
stack
page read and write
390E000
stack
page read and write
48C0000
heap
page read and write
4A8C000
stack
page read and write
3EF000
unkown
page execute and write copy
35E000
unkown
page execute and write copy
408E000
stack
page read and write
48E0000
direct allocation
page read and write
733E000
stack
page read and write
48E0000
direct allocation
page read and write
7D0000
heap
page read and write
42CF000
stack
page read and write
454F000
stack
page read and write
379000
unkown
page execute and read and write
368E000
stack
page read and write
48F1000
heap
page read and write
48F1000
heap
page read and write
2DCE000
stack
page read and write
3C8F000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
41CE000
stack
page read and write
6F7E000
stack
page read and write
48E0000
direct allocation
page read and write
1DA000
unkown
page execute and write copy
45A000
unkown
page execute and read and write
390000
unkown
page execute and write copy
418F000
stack
page read and write
354E000
stack
page read and write
E50000
heap
page read and write
2D8F000
stack
page read and write
4BA0000
trusted library allocation
page read and write
6E3C000
stack
page read and write
E40000
heap
page read and write
DFB000
stack
page read and write
372000
unkown
page execute and write copy
300F000
stack
page read and write
48E0000
direct allocation
page read and write
4A50000
direct allocation
page read and write
3A4E000
stack
page read and write
478000
unkown
page execute and write copy
48F1000
heap
page read and write
444E000
stack
page read and write
404F000
stack
page read and write
1E6000
unkown
page execute and write copy
AF9000
stack
page read and write
37CE000
stack
page read and write
EB0000
heap
page read and write
EF7000
heap
page read and write
1E4000
unkown
page execute and write copy
DBE000
stack
page read and write
F0C000
heap
page read and write
369000
unkown
page execute and read and write
CAE000
stack
page read and write
4A3D000
trusted library allocation
page execute and read and write
4C3E000
stack
page read and write
468000
unkown
page execute and write copy
4D40000
trusted library allocation
page read and write
401000
unkown
page execute and read and write
C4E000
stack
page read and write
314F000
stack
page read and write
318E000
stack
page read and write
4BD0000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page execute and read and write
EBA000
heap
page read and write
3B4000
unkown
page execute and write copy
1D2000
unkown
page execute and read and write
48F1000
heap
page read and write
48F1000
heap
page read and write
4A34000
trusted library allocation
page read and write
3B8E000
stack
page read and write
48E0000
direct allocation
page read and write
There are 189 hidden memdumps, click here to show them.