IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
4C11000
heap
page read and write
7280000
trusted library allocation
page read and write
1041000
heap
page read and write
1023000
heap
page read and write
605000
unkown
page execute and read and write
4C20000
heap
page read and write
633000
unkown
page execute and write copy
5F3000
unkown
page execute and write copy
596000
unkown
page execute and write copy
3DA000
unkown
page execute and read and write
581000
unkown
page execute and write copy
4ED0000
trusted library allocation
page read and write
4F60000
heap
page read and write
4C11000
heap
page read and write
4D7D000
trusted library allocation
page execute and read and write
4FB0000
heap
page execute and read and write
5D7000
unkown
page execute and write copy
FFE000
stack
page read and write
675000
unkown
page execute and write copy
4C00000
direct allocation
page read and write
4C00000
direct allocation
page read and write
A9C000
stack
page read and write
43BE000
stack
page read and write
4D50000
trusted library allocation
page read and write
563000
unkown
page execute and read and write
E44000
heap
page read and write
60C1000
trusted library allocation
page read and write
4C00000
direct allocation
page read and write
4BE0000
direct allocation
page read and write
36FF000
stack
page read and write
4D70000
direct allocation
page execute and read and write
387E000
stack
page read and write
4C10000
heap
page read and write
34BE000
stack
page read and write
3ABF000
stack
page read and write
45FF000
stack
page read and write
56C000
unkown
page execute and write copy
7410000
heap
page execute and read and write
3D0000
unkown
page read and write
3AFE000
stack
page read and write
4EF0000
trusted library allocation
page read and write
67D000
unkown
page execute and write copy
60C4000
trusted library allocation
page read and write
E00000
heap
page read and write
626000
unkown
page execute and write copy
11FF000
stack
page read and write
68C000
unkown
page execute and write copy
2F7F000
stack
page read and write
4D10000
trusted library allocation
page read and write
E44000
heap
page read and write
105D000
heap
page read and write
582000
unkown
page execute and read and write
5E3000
unkown
page execute and write copy
3E6000
unkown
page execute and write copy
72BE000
stack
page read and write
4F5E000
stack
page read and write
4D60000
direct allocation
page read and write
E44000
heap
page read and write
383F000
stack
page read and write
4DCB000
stack
page read and write
4C00000
direct allocation
page read and write
4C00000
direct allocation
page read and write
30BF000
stack
page read and write
600000
unkown
page execute and write copy
B99000
stack
page read and write
635000
unkown
page execute and read and write
4C00000
direct allocation
page read and write
4C00000
direct allocation
page read and write
477E000
stack
page read and write
E10000
heap
page read and write
3C3E000
stack
page read and write
2C20000
heap
page read and write
541000
unkown
page execute and write copy
62A000
unkown
page execute and read and write
67D000
unkown
page execute and write copy
12FF000
stack
page read and write
5BB000
unkown
page execute and read and write
4FAC000
stack
page read and write
4EFB000
trusted library allocation
page execute and read and write
4D73000
trusted library allocation
page execute and read and write
3FBE000
stack
page read and write
413E000
stack
page read and write
2E7E000
stack
page read and write
615000
unkown
page execute and read and write
4D80000
heap
page read and write
3E7F000
stack
page read and write
3D6000
unkown
page write copy
3BFF000
stack
page read and write
E44000
heap
page read and write
4C11000
heap
page read and write
100E000
heap
page read and write
725D000
stack
page read and write
E44000
heap
page read and write
4C00000
direct allocation
page read and write
60A000
unkown
page execute and read and write
487F000
stack
page read and write
4EE0000
trusted library allocation
page read and write
594000
unkown
page execute and read and write
31FF000
stack
page read and write
103F000
heap
page read and write
4D60000
direct allocation
page read and write
73FE000
stack
page read and write
673000
unkown
page execute and write copy
F9E000
stack
page read and write
333F000
stack
page read and write
3DA000
unkown
page execute and write copy
751E000
stack
page read and write
2BDB000
stack
page read and write
592000
unkown
page execute and write copy
100A000
heap
page read and write
60E5000
trusted library allocation
page read and write
68A000
unkown
page execute and write copy
44BF000
stack
page read and write
50BE000
stack
page read and write
56D000
unkown
page execute and read and write
E44000
heap
page read and write
3D0000
unkown
page readonly
4EF7000
trusted library allocation
page execute and read and write
4C00000
direct allocation
page read and write
3FFE000
stack
page read and write
E44000
heap
page read and write
7270000
trusted library allocation
page read and write
E44000
heap
page read and write
E40000
heap
page read and write
73BF000
stack
page read and write
5E9000
unkown
page execute and read and write
7260000
trusted library allocation
page execute and read and write
3D2000
unkown
page execute and read and write
4C00000
direct allocation
page read and write
40FF000
stack
page read and write
4C00000
direct allocation
page read and write
755E000
stack
page read and write
2FBE000
stack
page read and write
397F000
stack
page read and write
E44000
heap
page read and write
E44000
heap
page read and write
35BF000
stack
page read and write
563000
unkown
page execute and write copy
2B9F000
stack
page read and write
347F000
stack
page read and write
323E000
stack
page read and write
674000
unkown
page execute and read and write
4D74000
trusted library allocation
page read and write
337E000
stack
page read and write
5B8000
unkown
page execute and write copy
4C00000
direct allocation
page read and write
4C11000
heap
page read and write
E44000
heap
page read and write
68C000
unkown
page execute and write copy
5E2000
unkown
page execute and read and write
E44000
heap
page read and write
3D6000
unkown
page write copy
3D3F000
stack
page read and write
4EF0000
direct allocation
page execute and read and write
4C00000
direct allocation
page read and write
1000000
heap
page read and write
F5E000
stack
page read and write
68A000
unkown
page execute and read and write
4D60000
direct allocation
page read and write
558000
unkown
page execute and read and write
2E3F000
stack
page read and write
437F000
stack
page read and write
E44000
heap
page read and write
2C1E000
stack
page read and write
E44000
heap
page read and write
423F000
stack
page read and write
2D3F000
stack
page read and write
473F000
stack
page read and write
39BE000
stack
page read and write
4F10000
trusted library allocation
page read and write
53F000
unkown
page execute and read and write
3D7E000
stack
page read and write
1048000
heap
page read and write
4C00000
direct allocation
page read and write
35FE000
stack
page read and write
50C1000
trusted library allocation
page read and write
2C30000
heap
page read and write
2C37000
heap
page read and write
606000
unkown
page execute and write copy
4C11000
heap
page read and write
610000
unkown
page execute and write copy
4ED4000
trusted library allocation
page read and write
765E000
stack
page read and write
E44000
heap
page read and write
1090000
heap
page read and write
E44000
heap
page read and write
30FE000
stack
page read and write
427E000
stack
page read and write
5F8000
unkown
page execute and read and write
44FE000
stack
page read and write
E44000
heap
page read and write
4EEA000
trusted library allocation
page execute and read and write
3EBD000
stack
page read and write
3D2000
unkown
page execute and write copy
373E000
stack
page read and write
5A9000
unkown
page execute and read and write
4D10000
heap
page read and write
463E000
stack
page read and write
4ECF000
stack
page read and write
E44000
heap
page read and write
There are 190 hidden memdumps, click here to show them.