IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
1171000
unkown
page execute and write copy
11BF000
unkown
page execute and write copy
11FD000
unkown
page execute and read and write
117C000
unkown
page execute and read and write
11FC000
unkown
page execute and write copy
4FB7000
trusted library allocation
page execute and read and write
3F2F000
stack
page read and write
11A1000
unkown
page execute and read and write
786F000
stack
page read and write
CF9000
stack
page read and write
342E000
stack
page read and write
3CEE000
stack
page read and write
136D000
heap
page read and write
F60000
unkown
page readonly
116A000
unkown
page execute and read and write
1175000
unkown
page execute and write copy
4E01000
heap
page read and write
4F50000
direct allocation
page read and write
432E000
stack
page read and write
133A000
heap
page read and write
4DF0000
direct allocation
page read and write
4E01000
heap
page read and write
1154000
unkown
page execute and read and write
F5E000
stack
page read and write
10F9000
unkown
page execute and read and write
4DF0000
direct allocation
page read and write
4E01000
heap
page read and write
1116000
unkown
page execute and write copy
4FD0000
direct allocation
page execute and read and write
10F9000
unkown
page execute and write copy
1310000
heap
page read and write
1189000
unkown
page execute and write copy
DF0000
heap
page read and write
99C000
stack
page read and write
4E00000
heap
page read and write
4DF0000
direct allocation
page read and write
42EF000
stack
page read and write
1211000
unkown
page execute and write copy
306E000
stack
page read and write
4F33000
trusted library allocation
page execute and read and write
4DB0000
direct allocation
page read and write
4E01000
heap
page read and write
137F000
heap
page read and write
4E01000
heap
page read and write
4DF0000
direct allocation
page read and write
4FA0000
trusted library allocation
page read and write
4DF0000
direct allocation
page read and write
4DF0000
direct allocation
page read and write
4DF0000
direct allocation
page read and write
4DF0000
direct allocation
page read and write
4F00000
trusted library allocation
page read and write
32AF000
stack
page read and write
2DCF000
stack
page read and write
4E01000
heap
page read and write
406F000
stack
page read and write
1196000
unkown
page execute and write copy
4E01000
heap
page read and write
3DEF000
stack
page read and write
112A000
unkown
page execute and write copy
366F000
stack
page read and write
5260000
heap
page execute and read and write
11C2000
unkown
page execute and read and write
4E10000
heap
page read and write
36AE000
stack
page read and write
1126000
unkown
page execute and write copy
3F6E000
stack
page read and write
4E01000
heap
page read and write
DE5000
heap
page read and write
4F3D000
trusted library allocation
page execute and read and write
511F000
stack
page read and write
1117000
unkown
page execute and read and write
4DD0000
heap
page read and write
40AE000
stack
page read and write
4E01000
heap
page read and write
515E000
stack
page read and write
536E000
stack
page read and write
2F2E000
stack
page read and write
5371000
trusted library allocation
page read and write
F66000
unkown
page write copy
356E000
stack
page read and write
519C000
stack
page read and write
32EE000
stack
page read and write
47EF000
stack
page read and write
4E01000
heap
page read and write
37EE000
stack
page read and write
10EE000
unkown
page execute and read and write
2EEF000
stack
page read and write
6395000
trusted library allocation
page read and write
11BE000
unkown
page execute and read and write
4F44000
trusted library allocation
page read and write
45AE000
stack
page read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
316F000
stack
page read and write
4F8C000
stack
page read and write
46EE000
stack
page read and write
136F000
heap
page read and write
74AE000
stack
page read and write
11AC000
unkown
page execute and read and write
1377000
heap
page read and write
F76000
unkown
page execute and write copy
31AE000
stack
page read and write
13C1000
heap
page read and write
5010000
heap
page read and write
112D000
unkown
page execute and write copy
1169000
unkown
page execute and write copy
4FF0000
trusted library allocation
page read and write
456F000
stack
page read and write
746D000
stack
page read and write
4FBB000
trusted library allocation
page execute and read and write
DE0000
heap
page read and write
130C000
stack
page read and write
10D9000
unkown
page execute and write copy
41EE000
stack
page read and write
2DE0000
heap
page read and write
33EF000
stack
page read and write
F6A000
unkown
page execute and read and write
1103000
unkown
page execute and write copy
11A7000
unkown
page execute and write copy
6374000
trusted library allocation
page read and write
138C000
heap
page read and write
302F000
stack
page read and write
117F000
unkown
page execute and read and write
74EE000
stack
page read and write
3B6F000
stack
page read and write
12CE000
stack
page read and write
1151000
unkown
page execute and write copy
112B000
unkown
page execute and read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
119B000
unkown
page execute and read and write
133E000
heap
page read and write
772F000
stack
page read and write
1127000
unkown
page execute and read and write
3CAF000
stack
page read and write
E5E000
stack
page read and write
4F34000
trusted library allocation
page read and write
117D000
unkown
page execute and write copy
37AF000
stack
page read and write
4F40000
trusted library allocation
page read and write
762E000
stack
page read and write
4FAA000
trusted library allocation
page execute and read and write
38EF000
stack
page read and write
7520000
heap
page execute and read and write
152E000
stack
page read and write
352F000
stack
page read and write
114D000
unkown
page execute and write copy
4DF0000
direct allocation
page read and write
4FE0000
trusted library allocation
page execute and read and write
482E000
stack
page read and write
41AE000
stack
page read and write
114F000
unkown
page execute and read and write
5000000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page read and write
F62000
unkown
page execute and write copy
11BB000
unkown
page execute and write copy
F6A000
unkown
page execute and write copy
442F000
stack
page read and write
4FB0000
trusted library allocation
page read and write
D00000
heap
page read and write
496E000
stack
page read and write
446E000
stack
page read and write
4DF0000
direct allocation
page read and write
392E000
stack
page read and write
F60000
unkown
page read and write
1105000
unkown
page execute and read and write
2DE7000
heap
page read and write
4F50000
direct allocation
page read and write
1211000
unkown
page execute and write copy
4E01000
heap
page read and write
4E01000
heap
page read and write
1220000
unkown
page execute and write copy
126E000
stack
page read and write
46AF000
stack
page read and write
F66000
unkown
page write copy
1330000
heap
page read and write
4DF0000
direct allocation
page read and write
10D7000
unkown
page execute and read and write
4F20000
trusted library allocation
page read and write
1141000
unkown
page execute and read and write
3E2E000
stack
page read and write
492F000
stack
page read and write
4DF0000
direct allocation
page read and write
1174000
unkown
page execute and read and write
51B0000
heap
page read and write
118E000
unkown
page execute and read and write
F62000
unkown
page execute and read and write
6371000
trusted library allocation
page read and write
4A6F000
stack
page read and write
119C000
unkown
page execute and write copy
4FA0000
direct allocation
page execute and read and write
3A2F000
stack
page read and write
1208000
unkown
page execute and write copy
1220000
unkown
page execute and read and write
4F50000
direct allocation
page read and write
4DF0000
direct allocation
page read and write
4DF0000
direct allocation
page read and write
3A6E000
stack
page read and write
3BAE000
stack
page read and write
776E000
stack
page read and write
There are 190 hidden memdumps, click here to show them.