IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
D7D000
heap
page read and write
4C51000
heap
page read and write
47AF000
stack
page read and write
4F1B000
trusted library allocation
page execute and read and write
5141000
trusted library allocation
page read and write
2C70000
direct allocation
page read and write
2C90000
direct allocation
page read and write
4F90000
trusted library allocation
page read and write
11BE000
unkown
page execute and write copy
3EEF000
stack
page read and write
4F00000
trusted library allocation
page read and write
48EF000
stack
page read and write
3A2E000
stack
page read and write
731E000
stack
page read and write
73F0000
heap
page execute and read and write
735E000
stack
page read and write
1150000
unkown
page execute and read and write
113D000
unkown
page execute and read and write
42EE000
stack
page read and write
452F000
stack
page read and write
4C51000
heap
page read and write
41AE000
stack
page read and write
109A000
unkown
page execute and read and write
1169000
unkown
page execute and write copy
4DA0000
direct allocation
page read and write
DC1000
heap
page read and write
4C51000
heap
page read and write
12CE000
stack
page read and write
C10000
heap
page read and write
4DA0000
direct allocation
page read and write
4C51000
heap
page read and write
11AE000
unkown
page execute and write copy
10CC000
unkown
page execute and write copy
33AF000
stack
page read and write
312F000
stack
page read and write
10F8000
unkown
page execute and read and write
4EFE000
stack
page read and write
113C000
unkown
page execute and write copy
2EAF000
stack
page read and write
A3C000
stack
page read and write
2C90000
direct allocation
page read and write
E6E000
stack
page read and write
352E000
stack
page read and write
BEE000
stack
page read and write
115E000
unkown
page execute and write copy
43EF000
stack
page read and write
4D84000
trusted library allocation
page read and write
2C90000
direct allocation
page read and write
366E000
stack
page read and write
3CAE000
stack
page read and write
F22000
unkown
page execute and write copy
116A000
unkown
page execute and read and write
2C90000
direct allocation
page read and write
4C51000
heap
page read and write
2EEE000
stack
page read and write
1134000
unkown
page execute and read and write
2FEF000
stack
page read and write
2C90000
direct allocation
page read and write
4C51000
heap
page read and write
B70000
heap
page read and write
10F7000
unkown
page execute and write copy
D2E000
stack
page read and write
D84000
heap
page read and write
466F000
stack
page read and write
76FF000
stack
page read and write
4F7E000
stack
page read and write
2C90000
direct allocation
page read and write
4D83000
trusted library allocation
page execute and read and write
39EF000
stack
page read and write
D30000
heap
page read and write
4D90000
trusted library allocation
page read and write
D3A000
heap
page read and write
13CE000
stack
page read and write
10AE000
unkown
page execute and write copy
3C6F000
stack
page read and write
4DA0000
direct allocation
page read and write
F26000
unkown
page write copy
4F0A000
trusted library allocation
page execute and read and write
D75000
heap
page read and write
4C51000
heap
page read and write
2C90000
direct allocation
page read and write
376F000
stack
page read and write
F2A000
unkown
page execute and write copy
4C30000
heap
page read and write
6141000
trusted library allocation
page read and write
302E000
stack
page read and write
10E0000
unkown
page execute and write copy
456E000
stack
page read and write
33EE000
stack
page read and write
D73000
heap
page read and write
3DAF000
stack
page read and write
B39000
stack
page read and write
4C51000
heap
page read and write
4C51000
heap
page read and write
10EC000
unkown
page execute and read and write
4FA0000
trusted library allocation
page read and write
4C51000
heap
page read and write
4DFB000
stack
page read and write
2C90000
direct allocation
page read and write
4F30000
trusted library allocation
page read and write
2CA7000
heap
page read and write
42AF000
stack
page read and write
4C50000
heap
page read and write
739E000
stack
page read and write
1161000
unkown
page execute and read and write
4C51000
heap
page read and write
4FFC000
stack
page read and write
416F000
stack
page read and write
B80000
heap
page read and write
6144000
trusted library allocation
page read and write
32AE000
stack
page read and write
1113000
unkown
page execute and write copy
D3E000
heap
page read and write
10CD000
unkown
page execute and read and write
11BE000
unkown
page execute and read and write
109D000
unkown
page execute and read and write
EF0000
heap
page read and write
2DAF000
stack
page read and write
2C90000
direct allocation
page read and write
513E000
stack
page read and write
112F000
unkown
page execute and write copy
2C90000
direct allocation
page read and write
DA9000
heap
page read and write
6165000
trusted library allocation
page read and write
10B1000
unkown
page execute and read and write
4C51000
heap
page read and write
3B2F000
stack
page read and write
37AE000
stack
page read and write
C15000
heap
page read and write
11A8000
unkown
page execute and write copy
4D50000
trusted library allocation
page read and write
1132000
unkown
page execute and write copy
442E000
stack
page read and write
10A5000
unkown
page execute and write copy
2C6F000
stack
page read and write
4F80000
trusted library allocation
page execute and read and write
F36000
unkown
page execute and write copy
2CA0000
heap
page read and write
1125000
unkown
page execute and write copy
10DA000
unkown
page execute and read and write
4DB0000
heap
page read and write
1115000
unkown
page execute and read and write
4D70000
trusted library allocation
page read and write
1145000
unkown
page execute and write copy
4D94000
trusted library allocation
page read and write
38AF000
stack
page read and write
4C51000
heap
page read and write
4C51000
heap
page read and write
46AE000
stack
page read and write
1127000
unkown
page execute and read and write
72DD000
stack
page read and write
1083000
unkown
page execute and read and write
5030000
heap
page read and write
1116000
unkown
page execute and write copy
1131000
unkown
page execute and read and write
4C51000
heap
page read and write
114E000
unkown
page execute and write copy
75FE000
stack
page read and write
F2A000
unkown
page execute and read and write
3B6E000
stack
page read and write
402F000
stack
page read and write
2C90000
direct allocation
page read and write
34EF000
stack
page read and write
F20000
unkown
page readonly
EAB000
stack
page read and write
2C90000
direct allocation
page read and write
10C2000
unkown
page execute and write copy
326F000
stack
page read and write
4F30000
direct allocation
page execute and read and write
4F00000
direct allocation
page execute and read and write
362F000
stack
page read and write
EEE000
stack
page read and write
1085000
unkown
page execute and write copy
10D8000
unkown
page execute and write copy
D92000
heap
page read and write
47EE000
stack
page read and write
F20000
unkown
page read and write
111D000
unkown
page execute and read and write
109B000
unkown
page execute and write copy
3DEE000
stack
page read and write
4F10000
trusted library allocation
page read and write
4C60000
heap
page read and write
2C90000
direct allocation
page read and write
11AE000
unkown
page execute and write copy
10C3000
unkown
page execute and read and write
3F2E000
stack
page read and write
4D8D000
trusted library allocation
page execute and read and write
4F17000
trusted library allocation
page execute and read and write
F26000
unkown
page write copy
10A5000
unkown
page execute and read and write
1146000
unkown
page execute and read and write
4C51000
heap
page read and write
316E000
stack
page read and write
406E000
stack
page read and write
2C90000
direct allocation
page read and write
38EE000
stack
page read and write
F22000
unkown
page execute and read and write
4FB0000
heap
page execute and read and write
74FE000
stack
page read and write
There are 189 hidden memdumps, click here to show them.