IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
106F000
heap
page read and write
70DC000
stack
page read and write
8EC000
unkown
page execute and write copy
4B80000
heap
page read and write
307F000
stack
page read and write
4E6A000
trusted library allocation
page execute and read and write
4D00000
direct allocation
page read and write
6004000
trusted library allocation
page read and write
473E000
stack
page read and write
D39000
stack
page read and write
74BE000
stack
page read and write
2F3F000
stack
page read and write
37FF000
stack
page read and write
8FC000
unkown
page execute and read and write
343F000
stack
page read and write
6E5000
unkown
page execute and read and write
918000
unkown
page execute and read and write
86A000
unkown
page execute and read and write
8C1000
unkown
page execute and write copy
4BB1000
heap
page read and write
D80000
heap
page read and write
FBE000
stack
page read and write
2B7F000
stack
page read and write
44BE000
stack
page read and write
101F000
heap
page read and write
36BF000
stack
page read and write
4BA0000
direct allocation
page read and write
8F9000
unkown
page execute and write copy
3BBF000
stack
page read and write
437E000
stack
page read and write
6E4000
unkown
page execute and write copy
3E7E000
stack
page read and write
4EDE000
stack
page read and write
2E3E000
stack
page read and write
4CE4000
trusted library allocation
page read and write
F40000
heap
page read and write
844000
unkown
page execute and read and write
4BB1000
heap
page read and write
4BA0000
direct allocation
page read and write
6DA000
unkown
page execute and write copy
6DA000
unkown
page execute and read and write
8BB000
unkown
page execute and write copy
8D9000
unkown
page execute and read and write
89A000
unkown
page execute and write copy
98A000
unkown
page execute and read and write
6D6000
unkown
page write copy
FC0000
direct allocation
page read and write
90B000
unkown
page execute and write copy
974000
unkown
page execute and write copy
98A000
unkown
page execute and write copy
4BA0000
direct allocation
page read and write
4BB1000
heap
page read and write
4CB0000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
4BB1000
heap
page read and write
E55000
heap
page read and write
3BFE000
stack
page read and write
4E90000
direct allocation
page execute and read and write
393F000
stack
page read and write
357F000
stack
page read and write
733F000
stack
page read and write
30BE000
stack
page read and write
4BA0000
direct allocation
page read and write
447F000
stack
page read and write
4BA0000
direct allocation
page read and write
8DA000
unkown
page execute and write copy
45FE000
stack
page read and write
4CED000
trusted library allocation
page execute and read and write
2DFF000
stack
page read and write
8DE000
unkown
page execute and read and write
71DD000
stack
page read and write
4D00000
direct allocation
page read and write
919000
unkown
page execute and write copy
4BCA000
heap
page read and write
97B000
unkown
page execute and write copy
4BA0000
direct allocation
page read and write
6001000
trusted library allocation
page read and write
41FF000
stack
page read and write
383E000
stack
page read and write
6D0000
unkown
page readonly
6D2000
unkown
page execute and write copy
904000
unkown
page execute and read and write
3F7F000
stack
page read and write
423E000
stack
page read and write
6E6000
unkown
page execute and write copy
4BB1000
heap
page read and write
4BB1000
heap
page read and write
98C000
unkown
page execute and write copy
2CFE000
stack
page read and write
4BB1000
heap
page read and write
4E77000
trusted library allocation
page execute and read and write
4D00000
direct allocation
page read and write
873000
unkown
page execute and write copy
31FE000
stack
page read and write
8ED000
unkown
page execute and read and write
1021000
heap
page read and write
4BA0000
direct allocation
page read and write
4E70000
trusted library allocation
page read and write
5001000
trusted library allocation
page read and write
4BA0000
direct allocation
page read and write
4BB1000
heap
page read and write
4CF4000
trusted library allocation
page read and write
D90000
heap
page read and write
4BB1000
heap
page read and write
75FE000
stack
page read and write
36FE000
stack
page read and write
102B000
heap
page read and write
E3E000
stack
page read and write
3ABE000
stack
page read and write
C3C000
stack
page read and write
4E40000
heap
page read and write
3FBE000
stack
page read and write
875000
unkown
page execute and read and write
347E000
stack
page read and write
4FF0000
heap
page read and write
4CF0000
trusted library allocation
page read and write
71E0000
trusted library allocation
page execute and read and write
4BB1000
heap
page read and write
8E4000
unkown
page execute and read and write
6D6000
unkown
page write copy
4E90000
trusted library allocation
page read and write
40FE000
stack
page read and write
4E60000
direct allocation
page execute and read and write
4D3C000
stack
page read and write
4BA0000
direct allocation
page read and write
8D7000
unkown
page execute and write copy
7370000
heap
page execute and read and write
1029000
heap
page read and write
4E7B000
trusted library allocation
page execute and read and write
73BE000
stack
page read and write
FEE000
heap
page read and write
4BB1000
heap
page read and write
333E000
stack
page read and write
6D0000
unkown
page read and write
8AB000
unkown
page execute and read and write
91C000
unkown
page execute and read and write
8FD000
unkown
page execute and write copy
4E3E000
stack
page read and write
1046000
heap
page read and write
97B000
unkown
page execute and write copy
3A7F000
stack
page read and write
40BF000
stack
page read and write
DFE000
stack
page read and write
4CE3000
trusted library allocation
page execute and read and write
4BB1000
heap
page read and write
3CFF000
stack
page read and write
FE0000
heap
page read and write
3D3E000
stack
page read and write
2CBF000
stack
page read and write
4BB1000
heap
page read and write
4BA0000
direct allocation
page read and write
4EE0000
heap
page execute and read and write
85D000
unkown
page execute and read and write
8DF000
unkown
page execute and write copy
6D2000
unkown
page execute and read and write
4BB0000
heap
page read and write
103E000
heap
page read and write
8BF000
unkown
page execute and read and write
11DF000
stack
page read and write
846000
unkown
page execute and write copy
98C000
unkown
page execute and write copy
723E000
stack
page read and write
4CD0000
trusted library allocation
page read and write
32FF000
stack
page read and write
885000
unkown
page execute and read and write
4BA0000
direct allocation
page read and write
433F000
stack
page read and write
4BA0000
direct allocation
page read and write
6025000
trusted library allocation
page read and write
397E000
stack
page read and write
4FEF000
stack
page read and write
74FE000
stack
page read and write
71F0000
trusted library allocation
page read and write
8C5000
unkown
page execute and read and write
F70000
heap
page read and write
E50000
heap
page read and write
4BB1000
heap
page read and write
2F7E000
stack
page read and write
4BB1000
heap
page read and write
46FF000
stack
page read and write
31BF000
stack
page read and write
1031000
heap
page read and write
90F000
unkown
page execute and read and write
86A000
unkown
page execute and write copy
12DF000
stack
page read and write
884000
unkown
page execute and write copy
4BA0000
direct allocation
page read and write
45BF000
stack
page read and write
4BB1000
heap
page read and write
F77000
heap
page read and write
483F000
stack
page read and write
2BBC000
stack
page read and write
4BA0000
direct allocation
page read and write
3E3F000
stack
page read and write
35BE000
stack
page read and write
7200000
trusted library allocation
page read and write
FEA000
heap
page read and write
916000
unkown
page execute and write copy
There are 188 hidden memdumps, click here to show them.