IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
344E000
stack
page read and write
4BA0000
direct allocation
page read and write
4BF4000
trusted library allocation
page read and write
AD2000
unkown
page execute and write copy
4A40000
direct allocation
page read and write
368F000
stack
page read and write
749E000
stack
page read and write
B12000
unkown
page execute and read and write
4DC0000
heap
page read and write
A7F000
unkown
page execute and write copy
340F000
stack
page read and write
380E000
stack
page read and write
5F05000
trusted library allocation
page read and write
434E000
stack
page read and write
D20000
heap
page read and write
4C20000
trusted library allocation
page read and write
D64000
heap
page read and write
E5E000
heap
page read and write
9D4000
unkown
page execute and write copy
A94000
unkown
page execute and read and write
AA1000
unkown
page execute and read and write
4DBE000
stack
page read and write
A95000
unkown
page execute and write copy
D64000
heap
page read and write
A46000
unkown
page execute and write copy
83C000
stack
page read and write
739E000
stack
page read and write
D64000
heap
page read and write
4A40000
direct allocation
page read and write
4C04000
trusted library allocation
page read and write
37CF000
stack
page read and write
299E000
stack
page read and write
A34000
unkown
page execute and write copy
70FE000
stack
page read and write
3F8E000
stack
page read and write
10FF000
stack
page read and write
3B8F000
stack
page read and write
41CF000
stack
page read and write
304F000
stack
page read and write
C19000
stack
page read and write
9F4000
unkown
page execute and write copy
354F000
stack
page read and write
4A51000
heap
page read and write
4A40000
direct allocation
page read and write
FFE000
stack
page read and write
308E000
stack
page read and write
408F000
stack
page read and write
D64000
heap
page read and write
A84000
unkown
page execute and write copy
D64000
heap
page read and write
318F000
stack
page read and write
86A000
unkown
page execute and write copy
B12000
unkown
page execute and write copy
B03000
unkown
page execute and write copy
4A40000
direct allocation
page read and write
A25000
unkown
page execute and write copy
420E000
stack
page read and write
32CF000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
E0E000
heap
page read and write
AFB000
unkown
page execute and write copy
A33000
unkown
page execute and read and write
D64000
heap
page read and write
6FBC000
stack
page read and write
4A40000
direct allocation
page read and write
E00000
heap
page read and write
4ED0000
heap
page execute and read and write
4A51000
heap
page read and write
2BCF000
stack
page read and write
4BF3000
trusted library allocation
page execute and read and write
A39000
unkown
page execute and read and write
70C0000
trusted library allocation
page read and write
DEE000
stack
page read and write
A8D000
unkown
page execute and write copy
4A51000
heap
page read and write
4A40000
direct allocation
page read and write
717E000
stack
page read and write
9F4000
unkown
page execute and read and write
4C2B000
trusted library allocation
page execute and read and write
D64000
heap
page read and write
D60000
heap
page read and write
860000
unkown
page read and write
3E4E000
stack
page read and write
29C0000
heap
page read and write
D64000
heap
page read and write
A83000
unkown
page execute and read and write
7190000
heap
page execute and read and write
4A51000
heap
page read and write
4A40000
direct allocation
page read and write
866000
unkown
page write copy
D64000
heap
page read and write
A98000
unkown
page execute and read and write
4A40000
direct allocation
page read and write
4A40000
direct allocation
page read and write
4C50000
trusted library allocation
page execute and read and write
4C1A000
trusted library allocation
page execute and read and write
4C70000
heap
page read and write
4A40000
direct allocation
page read and write
448E000
stack
page read and write
C40000
heap
page read and write
AC1000
unkown
page execute and read and write
A74000
unkown
page execute and write copy
458F000
stack
page read and write
3A8E000
stack
page read and write
86A000
unkown
page execute and read and write
3BCE000
stack
page read and write
4A51000
heap
page read and write
4B50000
trusted library allocation
page read and write
4EE1000
trusted library allocation
page read and write
4A60000
heap
page read and write
5EE4000
trusted library allocation
page read and write
3D0D000
stack
page read and write
430F000
stack
page read and write
3CCF000
stack
page read and write
D64000
heap
page read and write
D64000
heap
page read and write
29C7000
heap
page read and write
4A20000
direct allocation
page read and write
70BD000
stack
page read and write
4C10000
trusted library allocation
page read and write
4A50000
heap
page read and write
358E000
stack
page read and write
D64000
heap
page read and write
A44000
unkown
page execute and write copy
4B90000
trusted library allocation
page read and write
2ACF000
stack
page read and write
28DE000
stack
page read and write
3F4F000
stack
page read and write
862000
unkown
page execute and write copy
E0A000
heap
page read and write
D64000
heap
page read and write
4A51000
heap
page read and write
4BFD000
trusted library allocation
page execute and read and write
A6C000
unkown
page execute and write copy
A8E000
unkown
page execute and read and write
B14000
unkown
page execute and write copy
4C60000
trusted library allocation
page read and write
E42000
heap
page read and write
4BA0000
direct allocation
page read and write
4C20000
direct allocation
page execute and read and write
A60000
unkown
page execute and read and write
3A4F000
stack
page read and write
A76000
unkown
page execute and read and write
A85000
unkown
page execute and read and write
295E000
stack
page read and write
DAE000
stack
page read and write
4A51000
heap
page read and write
E50000
heap
page read and write
3E0E000
stack
page read and write
860000
unkown
page readonly
4C40000
trusted library allocation
page read and write
A45000
unkown
page execute and read and write
4BA0000
direct allocation
page read and write
45CE000
stack
page read and write
9D2000
unkown
page execute and read and write
4D7E000
stack
page read and write
D64000
heap
page read and write
2F0F000
stack
page read and write
B14000
unkown
page execute and write copy
D64000
heap
page read and write
A6B000
unkown
page execute and read and write
29A0000
heap
page read and write
713E000
stack
page read and write
4A40000
direct allocation
page read and write
444F000
stack
page read and write
A69000
unkown
page execute and write copy
330E000
stack
page read and write
A73000
unkown
page execute and read and write
D64000
heap
page read and write
46CF000
stack
page read and write
390F000
stack
page read and write
A90000
unkown
page execute and write copy
40CE000
stack
page read and write
4B50000
heap
page read and write
A59000
unkown
page execute and write copy
862000
unkown
page execute and read and write
AC0000
unkown
page execute and write copy
4A40000
direct allocation
page read and write
D64000
heap
page read and write
2E0E000
stack
page read and write
AD3000
unkown
page execute and read and write
4BDB000
stack
page read and write
AA0000
unkown
page execute and write copy
D64000
heap
page read and write
4ECF000
stack
page read and write
36CE000
stack
page read and write
A4A000
unkown
page execute and read and write
2F4E000
stack
page read and write
4A40000
direct allocation
page read and write
4A40000
direct allocation
page read and write
2CCF000
stack
page read and write
E49000
heap
page read and write
9E9000
unkown
page execute and read and write
31CE000
stack
page read and write
2DCF000
stack
page read and write
B03000
unkown
page execute and write copy
729E000
stack
page read and write
4C00000
trusted library allocation
page read and write
866000
unkown
page write copy
291B000
stack
page read and write
394E000
stack
page read and write
5EE1000
trusted library allocation
page read and write
876000
unkown
page execute and write copy
4C27000
trusted library allocation
page execute and read and write
There are 194 hidden memdumps, click here to show them.