IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
4D21000
heap
page read and write
4E54000
trusted library allocation
page read and write
A83000
unkown
page execute and write copy
36BF000
stack
page read and write
3A7F000
stack
page read and write
4D21000
heap
page read and write
BF0000
heap
page read and write
4D21000
heap
page read and write
A49000
unkown
page execute and read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
B32000
unkown
page execute and read and write
B9C000
stack
page read and write
A9B000
unkown
page execute and write copy
10B0000
heap
page read and write
A14000
unkown
page execute and read and write
46FF000
stack
page read and write
4D21000
heap
page read and write
487E000
stack
page read and write
4D21000
heap
page read and write
4CF0000
heap
page read and write
497F000
stack
page read and write
A90000
unkown
page execute and write copy
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
A9D000
unkown
page execute and read and write
4D21000
heap
page read and write
AAB000
unkown
page execute and read and write
A30000
unkown
page execute and write copy
6325000
trusted library allocation
page read and write
4ECA000
trusted library allocation
page execute and read and write
88A000
unkown
page execute and write copy
B32000
unkown
page execute and write copy
AA6000
unkown
page execute and read and write
77FE000
stack
page read and write
B23000
unkown
page execute and write copy
4D10000
direct allocation
page read and write
4D21000
heap
page read and write
4D20000
heap
page read and write
114F000
heap
page read and write
A54000
unkown
page execute and write copy
4D21000
heap
page read and write
4D10000
direct allocation
page read and write
4EF0000
trusted library allocation
page read and write
4D10000
direct allocation
page read and write
4D21000
heap
page read and write
1107000
heap
page read and write
4D21000
heap
page read and write
4E70000
direct allocation
page read and write
37FF000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
423E000
stack
page read and write
4D21000
heap
page read and write
4D10000
direct allocation
page read and write
4D21000
heap
page read and write
5160000
heap
page read and write
4D10000
direct allocation
page read and write
307F000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
383E000
stack
page read and write
10CA000
heap
page read and write
4D10000
direct allocation
page read and write
4E60000
trusted library allocation
page read and write
886000
unkown
page write copy
45BF000
stack
page read and write
AC5000
unkown
page execute and read and write
EF9000
stack
page read and write
ABB000
unkown
page execute and write copy
B1D000
unkown
page execute and write copy
44BE000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
501F000
stack
page read and write
52DE000
stack
page read and write
5301000
trusted library allocation
page read and write
4D21000
heap
page read and write
2BDB000
stack
page read and write
A82000
unkown
page execute and read and write
4D21000
heap
page read and write
31BF000
stack
page read and write
2E7F000
stack
page read and write
A71000
unkown
page execute and read and write
4EC0000
direct allocation
page execute and read and write
753E000
stack
page read and write
AB3000
unkown
page execute and read and write
6304000
trusted library allocation
page read and write
36FE000
stack
page read and write
4D21000
heap
page read and write
AA7000
unkown
page execute and write copy
4D21000
heap
page read and write
40BE000
stack
page read and write
4D21000
heap
page read and write
FD0000
heap
page read and write
4D21000
heap
page read and write
A6C000
unkown
page execute and write copy
4D21000
heap
page read and write
4D21000
heap
page read and write
73FD000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
1025000
heap
page read and write
4D10000
direct allocation
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
9F2000
unkown
page execute and read and write
4ED0000
trusted library allocation
page read and write
524C000
stack
page read and write
A7F000
unkown
page execute and write copy
3BFE000
stack
page read and write
4D21000
heap
page read and write
10C0000
heap
page read and write
447F000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
2C77000
heap
page read and write
3E7E000
stack
page read and write
896000
unkown
page execute and write copy
4D21000
heap
page read and write
473E000
stack
page read and write
13BF000
stack
page read and write
3F7F000
stack
page read and write
397E000
stack
page read and write
529E000
stack
page read and write
3ABE000
stack
page read and write
AA4000
unkown
page execute and write copy
2C5E000
stack
page read and write
4ED7000
trusted library allocation
page execute and read and write
4D21000
heap
page read and write
A6D000
unkown
page execute and read and write
4D21000
heap
page read and write
483F000
stack
page read and write
437E000
stack
page read and write
882000
unkown
page execute and write copy
40FE000
stack
page read and write
4E53000
trusted library allocation
page execute and read and write
52F0000
heap
page execute and read and write
2D7F000
stack
page read and write
A09000
unkown
page execute and read and write
A31000
unkown
page execute and read and write
3D3E000
stack
page read and write
2F7F000
stack
page read and write
A6E000
unkown
page execute and write copy
4D10000
direct allocation
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
2C70000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
3BBF000
stack
page read and write
4D21000
heap
page read and write
4D10000
direct allocation
page read and write
45FE000
stack
page read and write
A14000
unkown
page execute and write copy
4D21000
heap
page read and write
1110000
heap
page read and write
882000
unkown
page execute and read and write
10CE000
heap
page read and write
4D10000
direct allocation
page read and write
4D21000
heap
page read and write
30BE000
stack
page read and write
111B000
heap
page read and write
347E000
stack
page read and write
9F4000
unkown
page execute and write copy
4EAB000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
A2C000
unkown
page execute and write copy
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
357F000
stack
page read and write
4D21000
heap
page read and write
B23000
unkown
page execute and write copy
4D21000
heap
page read and write
5250000
trusted library allocation
page read and write
2C1E000
stack
page read and write
515E000
stack
page read and write
4D10000
direct allocation
page read and write
31FE000
stack
page read and write
505E000
stack
page read and write
6301000
trusted library allocation
page read and write
4E64000
trusted library allocation
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4E5D000
trusted library allocation
page execute and read and write
A50000
unkown
page execute and write copy
75F0000
heap
page execute and read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
A5C000
unkown
page execute and read and write
4E70000
direct allocation
page read and write
A48000
unkown
page execute and write copy
4E40000
trusted library allocation
page read and write
4EDB000
trusted library allocation
page execute and read and write
4CD0000
direct allocation
page read and write
1020000
heap
page read and write
4D21000
heap
page read and write
A53000
unkown
page execute and read and write
A9A000
unkown
page execute and read and write
4D21000
heap
page read and write
880000
unkown
page read and write
4EF0000
direct allocation
page execute and read and write
76FE000
stack
page read and write
5260000
trusted library allocation
page read and write
4F10000
heap
page read and write
88A000
unkown
page execute and read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
880000
unkown
page readonly
41FF000
stack
page read and write
4D21000
heap
page read and write
886000
unkown
page write copy
35BE000
stack
page read and write
32FF000
stack
page read and write
433F000
stack
page read and write
4EC0000
trusted library allocation
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
333E000
stack
page read and write
4D10000
direct allocation
page read and write
4D21000
heap
page read and write
10FC000
heap
page read and write
AB2000
unkown
page execute and write copy
4D21000
heap
page read and write
343F000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
10AE000
stack
page read and write
10FE000
heap
page read and write
4D21000
heap
page read and write
3FBE000
stack
page read and write
ABC000
unkown
page execute and read and write
4D10000
direct allocation
page read and write
A88000
unkown
page execute and read and write
3E3F000
stack
page read and write
393F000
stack
page read and write
AC3000
unkown
page execute and write copy
A2E000
unkown
page execute and read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4E70000
direct allocation
page read and write
4D21000
heap
page read and write
12BE000
stack
page read and write
4D21000
heap
page read and write
106E000
stack
page read and write
4D21000
heap
page read and write
4D10000
direct allocation
page read and write
3CFF000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4F00000
trusted library allocation
page execute and read and write
74FE000
stack
page read and write
2B9E000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4E20000
trusted library allocation
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
There are 261 hidden memdumps, click here to show them.