IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
53D0000
trusted library allocation
page read and write
1210000
heap
page read and write
16FF000
stack
page read and write
2F40000
direct allocation
page read and write
CDB000
unkown
page execute and write copy
419F000
stack
page read and write
DD5000
unkown
page execute and write copy
1294000
heap
page read and write
1294000
heap
page read and write
1290000
heap
page read and write
1294000
heap
page read and write
2F40000
direct allocation
page read and write
53C0000
trusted library allocation
page execute and read and write
D12000
unkown
page execute and write copy
D6E000
unkown
page execute and read and write
D0A000
unkown
page execute and write copy
1294000
heap
page read and write
7820000
heap
page execute and read and write
53E0000
heap
page execute and read and write
405F000
stack
page read and write
2EDE000
stack
page read and write
1294000
heap
page read and write
52F0000
trusted library allocation
page read and write
77CF000
stack
page read and write
5020000
heap
page read and write
1294000
heap
page read and write
7A6F000
stack
page read and write
D00000
unkown
page execute and write copy
1294000
heap
page read and write
2F40000
direct allocation
page read and write
5021000
heap
page read and write
52D0000
direct allocation
page execute and read and write
B7A000
unkown
page execute and read and write
D01000
unkown
page execute and read and write
3A1F000
stack
page read and write
341E000
stack
page read and write
7690000
trusted library allocation
page read and write
DB5000
unkown
page execute and write copy
CF8000
unkown
page execute and write copy
128E000
stack
page read and write
D95000
unkown
page execute and write copy
5021000
heap
page read and write
D3F000
unkown
page execute and read and write
B76000
unkown
page write copy
2F40000
direct allocation
page read and write
148E000
heap
page read and write
41DE000
stack
page read and write
3DDF000
stack
page read and write
52E0000
trusted library allocation
page read and write
140A000
heap
page read and write
1294000
heap
page read and write
459E000
stack
page read and write
46DE000
stack
page read and write
54F1000
trusted library allocation
page read and write
64F4000
trusted library allocation
page read and write
E14000
unkown
page execute and write copy
51AB000
stack
page read and write
B70000
unkown
page read and write
1294000
heap
page read and write
51B0000
heap
page read and write
D74000
unkown
page execute and read and write
53BC000
stack
page read and write
1294000
heap
page read and write
13D0000
heap
page read and write
5021000
heap
page read and write
491F000
stack
page read and write
D69000
unkown
page execute and write copy
5170000
direct allocation
page read and write
3F1F000
stack
page read and write
CFF000
unkown
page execute and read and write
5300000
direct allocation
page execute and read and write
15FF000
stack
page read and write
D75000
unkown
page execute and write copy
530B000
trusted library allocation
page execute and read and write
B86000
unkown
page execute and write copy
2F40000
direct allocation
page read and write
2F40000
direct allocation
page read and write
D2E000
unkown
page execute and write copy
FA9000
stack
page read and write
5170000
direct allocation
page read and write
1452000
heap
page read and write
305F000
stack
page read and write
319E000
stack
page read and write
DA3000
unkown
page execute and write copy
1294000
heap
page read and write
32DE000
stack
page read and write
D9B000
unkown
page execute and read and write
33DF000
stack
page read and write
6515000
trusted library allocation
page read and write
1220000
heap
page read and write
369E000
stack
page read and write
355E000
stack
page read and write
495E000
stack
page read and write
2F40000
direct allocation
page read and write
792E000
stack
page read and write
1449000
heap
page read and write
13AE000
stack
page read and write
5170000
direct allocation
page read and write
5030000
heap
page read and write
481E000
stack
page read and write
D4F000
unkown
page execute and read and write
3E1E000
stack
page read and write
445E000
stack
page read and write
52FA000
trusted library allocation
page execute and read and write
E14000
unkown
page execute and read and write
B72000
unkown
page execute and write copy
1294000
heap
page read and write
E16000
unkown
page execute and write copy
1294000
heap
page read and write
DD6000
unkown
page execute and read and write
3CDE000
stack
page read and write
1294000
heap
page read and write
140E000
heap
page read and write
1441000
heap
page read and write
B7A000
unkown
page execute and write copy
52D4000
trusted library allocation
page read and write
3C9F000
stack
page read and write
DA7000
unkown
page execute and read and write
B70000
unkown
page readonly
D87000
unkown
page execute and write copy
5307000
trusted library allocation
page execute and read and write
D4C000
unkown
page execute and write copy
CEC000
unkown
page execute and read and write
D94000
unkown
page execute and read and write
37DE000
stack
page read and write
5160000
trusted library allocation
page read and write
2F40000
direct allocation
page read and write
2F1C000
stack
page read and write
4BDE000
stack
page read and write
D88000
unkown
page execute and read and write
145D000
heap
page read and write
DFF000
unkown
page execute and write copy
379F000
stack
page read and write
5021000
heap
page read and write
D6F000
unkown
page execute and write copy
329F000
stack
page read and write
2F40000
direct allocation
page read and write
52E4000
trusted library allocation
page read and write
CF9000
unkown
page execute and read and write
5320000
trusted library allocation
page read and write
D50000
unkown
page execute and write copy
D13000
unkown
page execute and read and write
796E000
stack
page read and write
2F20000
direct allocation
page read and write
47DF000
stack
page read and write
455F000
stack
page read and write
52D3000
trusted library allocation
page execute and read and write
D0B000
unkown
page execute and read and write
391E000
stack
page read and write
2F50000
heap
page read and write
365F000
stack
page read and write
52DD000
trusted library allocation
page execute and read and write
64F1000
trusted library allocation
page read and write
4B9F000
stack
page read and write
D52000
unkown
page execute and read and write
1294000
heap
page read and write
409E000
stack
page read and write
1400000
heap
page read and write
4A5F000
stack
page read and write
2F40000
direct allocation
page read and write
2F40000
direct allocation
page read and write
536E000
stack
page read and write
E05000
unkown
page execute and write copy
EAC000
stack
page read and write
315F000
stack
page read and write
2F57000
heap
page read and write
5120000
trusted library allocation
page read and write
CD9000
unkown
page execute and read and write
431E000
stack
page read and write
38DF000
stack
page read and write
5370000
heap
page read and write
1294000
heap
page read and write
1294000
heap
page read and write
5021000
heap
page read and write
DB7000
unkown
page execute and read and write
B72000
unkown
page execute and read and write
351F000
stack
page read and write
2F40000
direct allocation
page read and write
3B9E000
stack
page read and write
4CDF000
stack
page read and write
144E000
heap
page read and write
1294000
heap
page read and write
CFC000
unkown
page execute and write copy
5300000
trusted library allocation
page read and write
B76000
unkown
page write copy
52BE000
stack
page read and write
4A9E000
stack
page read and write
469F000
stack
page read and write
5120000
heap
page read and write
3B5F000
stack
page read and write
2F40000
direct allocation
page read and write
54EE000
stack
page read and write
441F000
stack
page read and write
780E000
stack
page read and write
42DF000
stack
page read and write
3F5E000
stack
page read and write
76CE000
stack
page read and write
D79000
unkown
page execute and read and write
E05000
unkown
page execute and write copy
3A5E000
stack
page read and write
D8F000
unkown
page execute and write copy
2F40000
direct allocation
page read and write
E16000
unkown
page execute and write copy
768D000
stack
page read and write
There are 194 hidden memdumps, click here to show them.