IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
E33000
unkown
page execute and write copy
37AE000
stack
page read and write
332F000
stack
page read and write
CA2000
unkown
page execute and write copy
5001000
heap
page read and write
4FF0000
direct allocation
page read and write
5001000
heap
page read and write
52B0000
direct allocation
page execute and read and write
366E000
stack
page read and write
5001000
heap
page read and write
768E000
stack
page read and write
64B4000
trusted library allocation
page read and write
342F000
stack
page read and write
4FF0000
direct allocation
page read and write
E5E000
unkown
page execute and read and write
4B6F000
stack
page read and write
3B2F000
stack
page read and write
3C6F000
stack
page read and write
E9C000
unkown
page execute and write copy
5001000
heap
page read and write
E67000
unkown
page execute and write copy
7A4E000
stack
page read and write
4FF0000
direct allocation
page read and write
E71000
unkown
page execute and read and write
E93000
unkown
page execute and read and write
CA6000
unkown
page write copy
CAA000
unkown
page execute and write copy
442E000
stack
page read and write
F9E000
stack
page read and write
C10000
heap
page read and write
39EF000
stack
page read and write
151F000
heap
page read and write
5001000
heap
page read and write
14CF000
heap
page read and write
3000000
heap
page read and write
5000000
heap
page read and write
4A2F000
stack
page read and write
14D7000
heap
page read and write
E2C000
unkown
page execute and read and write
14CD000
heap
page read and write
5001000
heap
page read and write
EEA000
unkown
page execute and write copy
778E000
stack
page read and write
EEB000
unkown
page execute and read and write
5001000
heap
page read and write
3DEE000
stack
page read and write
402F000
stack
page read and write
3A2E000
stack
page read and write
CAA000
unkown
page execute and read and write
E92000
unkown
page execute and write copy
52BA000
trusted library allocation
page execute and read and write
149A000
heap
page read and write
4FF0000
direct allocation
page read and write
CA2000
unkown
page execute and read and write
5001000
heap
page read and write
EAE000
unkown
page execute and read and write
52CB000
trusted library allocation
page execute and read and write
E2C000
unkown
page execute and write copy
178E000
stack
page read and write
E30000
unkown
page execute and write copy
FF0000
heap
page read and write
519B000
stack
page read and write
5140000
trusted library allocation
page read and write
149E000
heap
page read and write
ED7000
unkown
page execute and write copy
ECE000
unkown
page execute and write copy
46AE000
stack
page read and write
E7B000
unkown
page execute and write copy
13E0000
heap
page read and write
2FAE000
stack
page read and write
E5D000
unkown
page execute and write copy
5330000
heap
page read and write
5001000
heap
page read and write
5490000
trusted library allocation
page read and write
EB7000
unkown
page execute and write copy
F50000
unkown
page execute and read and write
F52000
unkown
page execute and write copy
362F000
stack
page read and write
F41000
unkown
page execute and write copy
C20000
heap
page read and write
4FF0000
direct allocation
page read and write
F52000
unkown
page execute and write copy
5120000
trusted library allocation
page read and write
794E000
stack
page read and write
466F000
stack
page read and write
CB6000
unkown
page execute and write copy
5134000
trusted library allocation
page read and write
54A0000
heap
page execute and read and write
EC6000
unkown
page execute and write copy
1490000
heap
page read and write
547C000
stack
page read and write
529E000
stack
page read and write
ECD000
unkown
page execute and read and write
48EF000
stack
page read and write
E20000
unkown
page execute and read and write
3B6E000
stack
page read and write
5480000
trusted library allocation
page execute and read and write
5160000
direct allocation
page read and write
C8E000
stack
page read and write
780E000
stack
page read and write
52C7000
trusted library allocation
page execute and read and write
42AF000
stack
page read and write
5133000
trusted library allocation
page execute and read and write
14EC000
heap
page read and write
3020000
heap
page read and write
5160000
direct allocation
page read and write
4FF0000
direct allocation
page read and write
E0E000
unkown
page execute and write copy
5100000
trusted library allocation
page read and write
416F000
stack
page read and write
64B1000
trusted library allocation
page read and write
EA3000
unkown
page execute and write copy
43EF000
stack
page read and write
5001000
heap
page read and write
5001000
heap
page read and write
764D000
stack
page read and write
14DF000
heap
page read and write
142B000
stack
page read and write
5010000
heap
page read and write
2F6E000
stack
page read and write
3DAF000
stack
page read and write
2FEE000
stack
page read and write
5001000
heap
page read and write
456E000
stack
page read and write
13E5000
heap
page read and write
312F000
stack
page read and write
5001000
heap
page read and write
352F000
stack
page read and write
5150000
heap
page read and write
52E0000
trusted library allocation
page read and write
5144000
trusted library allocation
page read and write
3CAE000
stack
page read and write
4FF0000
direct allocation
page read and write
4FF0000
direct allocation
page read and write
E9E000
unkown
page execute and read and write
EA2000
unkown
page execute and read and write
4CAF000
stack
page read and write
543E000
stack
page read and write
4FF0000
direct allocation
page read and write
1480000
direct allocation
page read and write
54B1000
trusted library allocation
page read and write
4FF0000
direct allocation
page read and write
CA6000
unkown
page write copy
E7F000
unkown
page execute and read and write
5160000
direct allocation
page read and write
790E000
stack
page read and write
E36000
unkown
page execute and read and write
5001000
heap
page read and write
E32000
unkown
page execute and read and write
146E000
stack
page read and write
7650000
trusted library allocation
page read and write
47AF000
stack
page read and write
4A6E000
stack
page read and write
3EEF000
stack
page read and write
532E000
stack
page read and write
41AE000
stack
page read and write
42EE000
stack
page read and write
E9F000
unkown
page execute and write copy
513D000
trusted library allocation
page execute and read and write
4BAE000
stack
page read and write
322F000
stack
page read and write
38AF000
stack
page read and write
4FF0000
direct allocation
page read and write
406E000
stack
page read and write
4FF0000
direct allocation
page read and write
CA0000
unkown
page readonly
5001000
heap
page read and write
F39000
unkown
page execute and write copy
4FF0000
direct allocation
page read and write
492E000
stack
page read and write
5001000
heap
page read and write
376F000
stack
page read and write
64D5000
trusted library allocation
page read and write
E7C000
unkown
page execute and read and write
EDA000
unkown
page execute and read and write
CA0000
unkown
page read and write
E7D000
unkown
page execute and write copy
52C0000
trusted library allocation
page read and write
3F2E000
stack
page read and write
5001000
heap
page read and write
168F000
stack
page read and write
77C0000
heap
page execute and read and write
52B0000
trusted library allocation
page read and write
F41000
unkown
page execute and write copy
38EE000
stack
page read and write
5001000
heap
page read and write
FEE000
stack
page read and write
4FF0000
direct allocation
page read and write
EA8000
unkown
page execute and read and write
12F9000
stack
page read and write
E0C000
unkown
page execute and read and write
EBB000
unkown
page execute and read and write
BAC000
stack
page read and write
3027000
heap
page read and write
452F000
stack
page read and write
EA9000
unkown
page execute and write copy
47EE000
stack
page read and write
F50000
unkown
page execute and write copy
ECF000
unkown
page execute and read and write
52E0000
direct allocation
page execute and read and write
There are 190 hidden memdumps, click here to show them.