IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
313E000
stack
page read and write
4D80000
direct allocation
page execute and read and write
4D97000
trusted library allocation
page execute and read and write
4AD1000
heap
page read and write
6045000
trusted library allocation
page read and write
4AC0000
direct allocation
page read and write
4DB0000
direct allocation
page execute and read and write
4AD1000
heap
page read and write
442000
unkown
page execute and read and write
6024000
trusted library allocation
page read and write
377E000
stack
page read and write
72D0000
heap
page execute and read and write
725E000
stack
page read and write
4C20000
direct allocation
page read and write
4AD0000
heap
page read and write
715E000
stack
page read and write
ED0000
direct allocation
page read and write
4EE0000
heap
page read and write
440000
unkown
page readonly
EB0000
heap
page read and write
446000
unkown
page write copy
E90000
heap
page read and write
403E000
stack
page read and write
3C7E000
stack
page read and write
33BE000
stack
page read and write
42BE000
stack
page read and write
4AC0000
direct allocation
page read and write
4D9B000
trusted library allocation
page execute and read and write
4BF0000
trusted library allocation
page read and write
751E000
stack
page read and write
3AFF000
stack
page read and write
3EFE000
stack
page read and write
4AC0000
direct allocation
page read and write
2AFC000
stack
page read and write
3FFF000
stack
page read and write
2D7E000
stack
page read and write
5021000
trusted library allocation
page read and write
E0E000
stack
page read and write
2C3E000
stack
page read and write
4AC0000
direct allocation
page read and write
4FF0000
trusted library allocation
page execute and read and write
4AD1000
heap
page read and write
4C10000
trusted library allocation
page read and write
3EBF000
stack
page read and write
7120000
trusted library allocation
page read and write
741E000
stack
page read and write
10B1000
heap
page read and write
CF9000
stack
page read and write
4AD1000
heap
page read and write
4AD1000
heap
page read and write
89C000
unkown
page execute and read and write
39FE000
stack
page read and write
107D000
heap
page read and write
73DF000
stack
page read and write
4AC0000
direct allocation
page read and write
3DBE000
stack
page read and write
323F000
stack
page read and write
4D90000
trusted library allocation
page read and write
4AE0000
heap
page read and write
4DFE000
stack
page read and write
2EBE000
stack
page read and write
417E000
stack
page read and write
4AD1000
heap
page read and write
4BD0000
trusted library allocation
page read and write
4AD1000
heap
page read and write
EF0000
heap
page read and write
93C000
stack
page read and write
6021000
trusted library allocation
page read and write
4AD1000
heap
page read and write
363E000
stack
page read and write
34BF000
stack
page read and write
2BFF000
stack
page read and write
30FF000
stack
page read and write
38BE000
stack
page read and write
EB7000
heap
page read and write
4AC0000
direct allocation
page read and write
4AD1000
heap
page read and write
89E000
unkown
page execute and write copy
4C20000
direct allocation
page read and write
4AC0000
direct allocation
page read and write
427F000
stack
page read and write
4AD1000
heap
page read and write
413F000
stack
page read and write
121E000
stack
page read and write
E4E000
stack
page read and write
1071000
heap
page read and write
4D70000
heap
page read and write
5000000
trusted library allocation
page read and write
4AD1000
heap
page read and write
4AD1000
heap
page read and write
9B0000
heap
page read and write
453E000
stack
page read and write
4AC0000
direct allocation
page read and write
10AF000
heap
page read and write
327E000
stack
page read and write
446000
unkown
page write copy
4AD1000
heap
page read and write
2D3F000
stack
page read and write
4D5E000
stack
page read and write
4AD1000
heap
page read and write
44A000
unkown
page execute and read and write
43BF000
stack
page read and write
1069000
heap
page read and write
4EDC000
stack
page read and write
6E5000
unkown
page execute and read and write
43FE000
stack
page read and write
4AC0000
direct allocation
page read and write
5010000
heap
page execute and read and write
337F000
stack
page read and write
5D6000
unkown
page execute and read and write
729E000
stack
page read and write
4C04000
trusted library allocation
page read and write
4AD1000
heap
page read and write
440000
unkown
page read and write
102A000
heap
page read and write
4C0D000
trusted library allocation
page execute and read and write
2FBF000
stack
page read and write
4AC0000
direct allocation
page read and write
4C14000
trusted library allocation
page read and write
711D000
stack
page read and write
2FFE000
stack
page read and write
2E7F000
stack
page read and write
4AD1000
heap
page read and write
4C20000
direct allocation
page read and write
EF5000
heap
page read and write
373F000
stack
page read and write
4AC0000
direct allocation
page read and write
FFF000
stack
page read and write
387F000
stack
page read and write
4D80000
trusted library allocation
page read and write
1000000
heap
page read and write
44FF000
stack
page read and write
2ABF000
stack
page read and write
4AC0000
direct allocation
page read and write
1061000
heap
page read and write
6F5000
unkown
page execute and write copy
463F000
stack
page read and write
467E000
stack
page read and write
442000
unkown
page execute and write copy
3D7F000
stack
page read and write
9A0000
heap
page read and write
4AC0000
direct allocation
page read and write
6F4000
unkown
page execute and write copy
102E000
heap
page read and write
4AC0000
direct allocation
page read and write
477F000
stack
page read and write
4DB0000
trusted library allocation
page read and write
E8E000
stack
page read and write
34FE000
stack
page read and write
3B3E000
stack
page read and write
89E000
unkown
page execute and write copy
35FF000
stack
page read and write
1020000
heap
page read and write
4C5C000
stack
page read and write
4FEE000
stack
page read and write
4D8A000
trusted library allocation
page execute and read and write
39BF000
stack
page read and write
6F4000
unkown
page execute and read and write
4C03000
trusted library allocation
page execute and read and write
3C3F000
stack
page read and write
There are 150 hidden memdumps, click here to show them.