IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
1011000
unkown
page execute and read and write
4D90000
direct allocation
page read and write
1300000
heap
page read and write
523F000
stack
page read and write
5097000
trusted library allocation
page execute and read and write
4DD0000
direct allocation
page read and write
367E000
stack
page read and write
99C000
stack
page read and write
32BE000
stack
page read and write
137C000
heap
page read and write
4EE0000
trusted library allocation
page read and write
4F1D000
trusted library allocation
page execute and read and write
151E000
stack
page read and write
4DD0000
direct allocation
page read and write
4DE1000
heap
page read and write
42BF000
stack
page read and write
3DBF000
stack
page read and write
EEA000
unkown
page execute and write copy
1320000
heap
page read and write
4F30000
direct allocation
page read and write
D80000
unkown
page read and write
F9D000
unkown
page execute and write copy
4DE1000
heap
page read and write
5090000
trusted library allocation
page read and write
493E000
stack
page read and write
467F000
stack
page read and write
F65000
unkown
page execute and read and write
4DD0000
direct allocation
page read and write
34FF000
stack
page read and write
4DB0000
heap
page read and write
F80000
unkown
page execute and write copy
F02000
unkown
page execute and write copy
50C0000
direct allocation
page execute and read and write
443E000
stack
page read and write
4F30000
direct allocation
page read and write
353E000
stack
page read and write
F3D000
unkown
page execute and read and write
4F20000
trusted library allocation
page read and write
780E000
stack
page read and write
FA1000
unkown
page execute and write copy
4F6B000
stack
page read and write
4DD0000
direct allocation
page read and write
F05000
unkown
page execute and read and write
48FF000
stack
page read and write
1028000
unkown
page execute and read and write
4DE1000
heap
page read and write
F3E000
unkown
page execute and write copy
746E000
stack
page read and write
CF9000
stack
page read and write
F9C000
unkown
page execute and read and write
4DE1000
heap
page read and write
2DBF000
stack
page read and write
313F000
stack
page read and write
D8A000
unkown
page execute and read and write
4DE0000
heap
page read and write
4DE1000
heap
page read and write
4A3F000
stack
page read and write
F7C000
unkown
page execute and write copy
D86000
unkown
page write copy
135D000
heap
page read and write
3A3E000
stack
page read and write
1019000
unkown
page execute and write copy
F60000
unkown
page execute and write copy
4DD0000
direct allocation
page read and write
756E000
stack
page read and write
F3F000
unkown
page execute and read and write
F7A000
unkown
page execute and write copy
4DE1000
heap
page read and write
327F000
stack
page read and write
F01000
unkown
page execute and read and write
3F3E000
stack
page read and write
1145000
heap
page read and write
F62000
unkown
page execute and read and write
38BF000
stack
page read and write
3EFF000
stack
page read and write
4DD0000
direct allocation
page read and write
4DE1000
heap
page read and write
102A000
unkown
page execute and write copy
F51000
unkown
page execute and read and write
508A000
trusted library allocation
page execute and read and write
50E0000
trusted library allocation
page read and write
4DE1000
heap
page read and write
F48000
unkown
page execute and write copy
4DE1000
heap
page read and write
47FE000
stack
page read and write
D00000
heap
page read and write
732C000
stack
page read and write
2EBF000
stack
page read and write
FD5000
unkown
page execute and write copy
5080000
direct allocation
page execute and read and write
12FB000
stack
page read and write
2EFE000
stack
page read and write
3DFE000
stack
page read and write
4F13000
trusted library allocation
page execute and read and write
F0E000
unkown
page execute and read and write
3B3F000
stack
page read and write
1370000
heap
page read and write
D10000
heap
page read and write
6254000
trusted library allocation
page read and write
F9A000
unkown
page execute and write copy
38FE000
stack
page read and write
FBA000
unkown
page execute and read and write
39FF000
stack
page read and write
4F30000
direct allocation
page read and write
FA7000
unkown
page execute and read and write
513E000
stack
page read and write
50F0000
heap
page read and write
75AE000
stack
page read and write
303E000
stack
page read and write
F7B000
unkown
page execute and read and write
363F000
stack
page read and write
D82000
unkown
page execute and write copy
4DD0000
direct allocation
page read and write
D80000
unkown
page readonly
1019000
unkown
page execute and write copy
3C7F000
stack
page read and write
4F00000
trusted library allocation
page read and write
4DF0000
heap
page read and write
4DD0000
direct allocation
page read and write
4DD0000
direct allocation
page read and write
5080000
trusted library allocation
page read and write
4DE1000
heap
page read and write
FA0000
unkown
page execute and read and write
742D000
stack
page read and write
132A000
heap
page read and write
4DE1000
heap
page read and write
457E000
stack
page read and write
F8D000
unkown
page execute and write copy
509B000
trusted library allocation
page execute and read and write
F26000
unkown
page execute and read and write
13AF000
heap
page read and write
4DD0000
direct allocation
page read and write
33BF000
stack
page read and write
47BF000
stack
page read and write
1012000
unkown
page execute and write copy
4F24000
trusted library allocation
page read and write
506F000
stack
page read and write
102A000
unkown
page execute and write copy
50B0000
heap
page read and write
41BE000
stack
page read and write
1260000
heap
page read and write
4DE1000
heap
page read and write
75EE000
stack
page read and write
4F14000
trusted library allocation
page read and write
F3C000
unkown
page execute and write copy
43FF000
stack
page read and write
FC8000
unkown
page execute and write copy
42FE000
stack
page read and write
6275000
trusted library allocation
page read and write
7600000
heap
page execute and read and write
D96000
unkown
page execute and write copy
453F000
stack
page read and write
F66000
unkown
page execute and write copy
403F000
stack
page read and write
3B7E000
stack
page read and write
4DE1000
heap
page read and write
D8A000
unkown
page execute and write copy
124F000
stack
page read and write
1267000
heap
page read and write
4DE1000
heap
page read and write
4DE1000
heap
page read and write
5240000
heap
page execute and read and write
7430000
trusted library allocation
page read and write
F63000
unkown
page execute and write copy
FCA000
unkown
page execute and read and write
4DD0000
direct allocation
page read and write
37BE000
stack
page read and write
5251000
trusted library allocation
page read and write
12BE000
stack
page read and write
3CBE000
stack
page read and write
1028000
unkown
page execute and write copy
4DE1000
heap
page read and write
46BE000
stack
page read and write
F7F000
unkown
page execute and read and write
50D0000
trusted library allocation
page execute and read and write
EE8000
unkown
page execute and read and write
50C0000
trusted library allocation
page read and write
D7E000
stack
page read and write
F25000
unkown
page execute and write copy
377F000
stack
page read and write
113D000
stack
page read and write
F8E000
unkown
page execute and read and write
317E000
stack
page read and write
F85000
unkown
page execute and read and write
F0C000
unkown
page execute and write copy
D86000
unkown
page write copy
417F000
stack
page read and write
407E000
stack
page read and write
6251000
trusted library allocation
page read and write
1140000
heap
page read and write
1010000
unkown
page execute and write copy
D82000
unkown
page execute and read and write
770E000
stack
page read and write
132E000
heap
page read and write
33FE000
stack
page read and write
F68000
unkown
page execute and read and write
2FFF000
stack
page read and write
FB8000
unkown
page execute and write copy
1367000
heap
page read and write
4DD0000
direct allocation
page read and write
4DE1000
heap
page read and write
FD9000
unkown
page execute and read and write
135F000
heap
page read and write
4DD0000
direct allocation
page read and write
4DD0000
direct allocation
page read and write
There are 195 hidden memdumps, click here to show them.