IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
2EBF000
stack
page read and write
4B41000
heap
page read and write
71DD000
stack
page read and write
E44000
heap
page read and write
834000
unkown
page execute and write copy
2A77000
heap
page read and write
672000
unkown
page execute and write copy
417F000
stack
page read and write
886000
unkown
page execute and read and write
91C000
unkown
page execute and write copy
4B30000
direct allocation
page read and write
676000
unkown
page write copy
4F80000
heap
page read and write
E44000
heap
page read and write
4DDF000
stack
page read and write
43FF000
stack
page read and write
672000
unkown
page execute and read and write
2A4E000
stack
page read and write
67A000
unkown
page execute and write copy
3F3E000
stack
page read and write
2A0C000
stack
page read and write
4B30000
direct allocation
page read and write
860000
unkown
page execute and write copy
E44000
heap
page read and write
47BF000
stack
page read and write
E44000
heap
page read and write
4CDC000
stack
page read and write
303E000
stack
page read and write
861000
unkown
page execute and read and write
3DFE000
stack
page read and write
804000
unkown
page execute and read and write
670000
unkown
page readonly
4E2B000
trusted library allocation
page execute and read and write
377F000
stack
page read and write
4B30000
direct allocation
page read and write
736E000
stack
page read and write
88F000
unkown
page execute and read and write
8BF000
unkown
page execute and read and write
863000
unkown
page execute and write copy
E44000
heap
page read and write
4F70000
trusted library allocation
page execute and read and write
822000
unkown
page execute and write copy
407E000
stack
page read and write
4B30000
direct allocation
page read and write
7220000
heap
page execute and read and write
2FFF000
stack
page read and write
E44000
heap
page read and write
367E000
stack
page read and write
FA0000
heap
page read and write
2C7F000
stack
page read and write
9CC000
stack
page read and write
443E000
stack
page read and write
74AE000
stack
page read and write
F8F000
stack
page read and write
890000
unkown
page execute and write copy
3EFE000
stack
page read and write
882000
unkown
page execute and write copy
4B40000
heap
page read and write
50D0000
heap
page execute and read and write
FF1000
heap
page read and write
50E1000
trusted library allocation
page read and write
922000
unkown
page execute and write copy
4F6C000
stack
page read and write
34FF000
stack
page read and write
FE1000
heap
page read and write
4E27000
trusted library allocation
page execute and read and write
363F000
stack
page read and write
721E000
stack
page read and write
887000
unkown
page execute and write copy
83D000
unkown
page execute and write copy
8AC000
unkown
page execute and write copy
8BB000
unkown
page execute and write copy
42FE000
stack
page read and write
932000
unkown
page execute and read and write
4E20000
trusted library allocation
page read and write
508E000
stack
page read and write
4B50000
heap
page read and write
457E000
stack
page read and write
39FF000
stack
page read and write
317E000
stack
page read and write
4E20000
direct allocation
page execute and read and write
467F000
stack
page read and write
FE9000
heap
page read and write
46BE000
stack
page read and write
D30000
heap
page read and write
E44000
heap
page read and write
33FE000
stack
page read and write
4E00000
trusted library allocation
page read and write
1032000
heap
page read and write
2D7F000
stack
page read and write
E40000
heap
page read and write
80C000
unkown
page execute and read and write
3B3F000
stack
page read and write
3A3E000
stack
page read and write
4DF4000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
11DF000
stack
page read and write
2B7F000
stack
page read and write
4B30000
direct allocation
page read and write
E44000
heap
page read and write
33BF000
stack
page read and write
4C50000
heap
page read and write
41BE000
stack
page read and write
4CA0000
direct allocation
page read and write
FDF000
heap
page read and write
854000
unkown
page execute and read and write
FFE000
heap
page read and write
67A000
unkown
page execute and read and write
89C000
unkown
page execute and read and write
FAA000
heap
page read and write
327F000
stack
page read and write
E44000
heap
page read and write
4B30000
direct allocation
page read and write
29CE000
stack
page read and write
2DBE000
stack
page read and write
87A000
unkown
page execute and read and write
4C90000
trusted library allocation
page read and write
4E1A000
trusted library allocation
page execute and read and write
8E2000
unkown
page execute and read and write
4B10000
direct allocation
page read and write
FC3000
heap
page read and write
3B7E000
stack
page read and write
89A000
unkown
page execute and write copy
4B30000
direct allocation
page read and write
10DE000
stack
page read and write
8AB000
unkown
page execute and read and write
3C7F000
stack
page read and write
4B41000
heap
page read and write
83E000
unkown
page execute and read and write
38BF000
stack
page read and write
E44000
heap
page read and write
801000
unkown
page execute and read and write
4C40000
trusted library allocation
page read and write
8AA000
unkown
page execute and write copy
2A70000
heap
page read and write
836000
unkown
page execute and read and write
4B30000
direct allocation
page read and write
4B30000
direct allocation
page read and write
E44000
heap
page read and write
353E000
stack
page read and write
8E1000
unkown
page execute and write copy
4CA0000
direct allocation
page read and write
E44000
heap
page read and write
875000
unkown
page execute and write copy
922000
unkown
page execute and write copy
934000
unkown
page execute and write copy
2EFE000
stack
page read and write
4DF3000
trusted library allocation
page execute and read and write
3CBE000
stack
page read and write
75AE000
stack
page read and write
E10000
heap
page read and write
686000
unkown
page execute and write copy
4B30000
direct allocation
page read and write
934000
unkown
page execute and write copy
E44000
heap
page read and write
CF9000
stack
page read and write
453F000
stack
page read and write
60E1000
trusted library allocation
page read and write
4DF0000
direct allocation
page execute and read and write
676000
unkown
page write copy
3DBF000
stack
page read and write
1030000
heap
page read and write
32BE000
stack
page read and write
7E8000
unkown
page execute and read and write
403F000
stack
page read and write
893000
unkown
page execute and read and write
4CA0000
direct allocation
page read and write
4B41000
heap
page read and write
4DFD000
trusted library allocation
page execute and read and write
4B30000
direct allocation
page read and write
4B41000
heap
page read and write
866000
unkown
page execute and read and write
37BE000
stack
page read and write
932000
unkown
page execute and write copy
FAE000
heap
page read and write
E44000
heap
page read and write
7EA000
unkown
page execute and write copy
4E04000
trusted library allocation
page read and write
4B30000
direct allocation
page read and write
4E8E000
stack
page read and write
4E10000
trusted library allocation
page read and write
60E4000
trusted library allocation
page read and write
E8E000
stack
page read and write
4C40000
heap
page read and write
802000
unkown
page execute and write copy
732E000
stack
page read and write
E44000
heap
page read and write
E44000
heap
page read and write
2A50000
heap
page read and write
746E000
stack
page read and write
E44000
heap
page read and write
5090000
trusted library allocation
page read and write
6105000
trusted library allocation
page read and write
4B41000
heap
page read and write
80C000
unkown
page execute and write copy
841000
unkown
page execute and write copy
4B30000
direct allocation
page read and write
829000
unkown
page execute and read and write
670000
unkown
page read and write
4B30000
direct allocation
page read and write
E44000
heap
page read and write
8B5000
unkown
page execute and read and write
42BF000
stack
page read and write
38FE000
stack
page read and write
4E40000
trusted library allocation
page read and write
313F000
stack
page read and write
There are 196 hidden memdumps, click here to show them.