IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
48E0000
trusted library allocation
page read and write
48A0000
heap
page read and write
AD0000
unkown
page read and write
4790000
direct allocation
page read and write
CA3000
unkown
page execute and read and write
F5F000
heap
page read and write
4790000
direct allocation
page read and write
3B8E000
stack
page read and write
864000
heap
page read and write
CDC000
unkown
page execute and write copy
300F000
stack
page read and write
85E000
stack
page read and write
864000
heap
page read and write
AD2000
unkown
page execute and read and write
340E000
stack
page read and write
378F000
stack
page read and write
864000
heap
page read and write
4770000
direct allocation
page read and write
4B10000
trusted library allocation
page read and write
864000
heap
page read and write
42CF000
stack
page read and write
4A70000
direct allocation
page execute and read and write
38CF000
stack
page read and write
6FD0000
heap
page execute and read and write
2A0E000
stack
page read and write
864000
heap
page read and write
D02000
unkown
page execute and write copy
96F000
stack
page read and write
70DE000
stack
page read and write
37CE000
stack
page read and write
4B00000
trusted library allocation
page read and write
354E000
stack
page read and write
4A4D000
trusted library allocation
page execute and read and write
4A54000
trusted library allocation
page read and write
390E000
stack
page read and write
4790000
direct allocation
page read and write
304E000
stack
page read and write
CB6000
unkown
page execute and read and write
4A43000
trusted library allocation
page execute and read and write
4790000
direct allocation
page read and write
ADA000
unkown
page execute and write copy
2B0F000
stack
page read and write
6F5F000
stack
page read and write
ACE000
stack
page read and write
CA4000
unkown
page execute and write copy
3A4E000
stack
page read and write
48F0000
direct allocation
page read and write
864000
heap
page read and write
430E000
stack
page read and write
5CE4000
trusted library allocation
page read and write
711E000
stack
page read and write
864000
heap
page read and write
6F9E000
stack
page read and write
D01000
unkown
page execute and read and write
D66000
unkown
page execute and read and write
864000
heap
page read and write
27B0000
heap
page read and write
48F0000
direct allocation
page read and write
276C000
stack
page read and write
4B20000
heap
page execute and read and write
2F0E000
stack
page read and write
F7C000
heap
page read and write
4790000
direct allocation
page read and write
2C4F000
stack
page read and write
CB9000
unkown
page execute and read and write
C82000
unkown
page execute and write copy
4790000
direct allocation
page read and write
3DCF000
stack
page read and write
4AF0000
trusted library allocation
page execute and read and write
CE7000
unkown
page execute and read and write
F2E000
heap
page read and write
2C8E000
stack
page read and write
CF0000
unkown
page execute and read and write
C69000
unkown
page execute and read and write
4790000
direct allocation
page read and write
C97000
unkown
page execute and write copy
3E0000
heap
page read and write
AD0000
unkown
page readonly
ADA000
unkown
page execute and read and write
864000
heap
page read and write
C43000
unkown
page execute and write copy
314F000
stack
page read and write
47B0000
heap
page read and write
6F9000
stack
page read and write
28CF000
stack
page read and write
3D0000
heap
page read and write
864000
heap
page read and write
C9F000
unkown
page execute and write copy
CB7000
unkown
page execute and write copy
864000
heap
page read and write
492C000
stack
page read and write
36C000
stack
page read and write
4790000
direct allocation
page read and write
C86000
unkown
page execute and read and write
27AE000
stack
page read and write
41CE000
stack
page read and write
AD2000
unkown
page execute and write copy
CE4000
unkown
page execute and write copy
33CF000
stack
page read and write
3CCE000
stack
page read and write
3B4F000
stack
page read and write
F67000
heap
page read and write
D05000
unkown
page execute and read and write
864000
heap
page read and write
FAF000
heap
page read and write
F5D000
heap
page read and write
4CE1000
trusted library allocation
page read and write
27C0000
heap
page read and write
27C7000
heap
page read and write
D7E000
unkown
page execute and write copy
81E000
stack
page read and write
C98000
unkown
page execute and read and write
C5B000
unkown
page execute and read and write
2B4E000
stack
page read and write
48A0000
trusted library allocation
page read and write
C5E000
unkown
page execute and read and write
3C8F000
stack
page read and write
404F000
stack
page read and write
368E000
stack
page read and write
2DCE000
stack
page read and write
CEF000
unkown
page execute and write copy
CAB000
unkown
page execute and read and write
CE3000
unkown
page execute and read and write
4A2F000
stack
page read and write
C85000
unkown
page execute and write copy
D7C000
unkown
page execute and read and write
A6F000
stack
page read and write
AD6000
unkown
page write copy
C69000
unkown
page execute and write copy
4AA0000
trusted library allocation
page read and write
D7C000
unkown
page execute and write copy
D06000
unkown
page execute and write copy
AE6000
unkown
page execute and write copy
C73000
unkown
page execute and read and write
4BD0000
heap
page read and write
4790000
direct allocation
page read and write
440F000
stack
page read and write
F70000
heap
page read and write
4790000
direct allocation
page read and write
48F0000
direct allocation
page read and write
864000
heap
page read and write
C5C000
unkown
page execute and write copy
C88000
unkown
page execute and read and write
4A70000
trusted library allocation
page read and write
4A40000
direct allocation
page execute and read and write
47A1000
heap
page read and write
408E000
stack
page read and write
F20000
heap
page read and write
4A6A000
trusted library allocation
page execute and read and write
318E000
stack
page read and write
860000
heap
page read and write
4A50000
trusted library allocation
page read and write
32CE000
stack
page read and write
D0D000
unkown
page execute and read and write
29CF000
stack
page read and write
3E0E000
stack
page read and write
D67000
unkown
page execute and write copy
CCD000
unkown
page execute and read and write
4790000
direct allocation
page read and write
864000
heap
page read and write
F6C000
heap
page read and write
4AEE000
stack
page read and write
6D1C000
stack
page read and write
47A1000
heap
page read and write
4790000
direct allocation
page read and write
721E000
stack
page read and write
C83000
unkown
page execute and read and write
4790000
direct allocation
page read and write
47A1000
heap
page read and write
6E5E000
stack
page read and write
350F000
stack
page read and write
47A0000
heap
page read and write
D64000
unkown
page execute and write copy
3F0F000
stack
page read and write
418F000
stack
page read and write
4A60000
trusted library allocation
page read and write
4CDF000
stack
page read and write
C71000
unkown
page execute and write copy
D7E000
unkown
page execute and write copy
4790000
direct allocation
page read and write
4A44000
trusted library allocation
page read and write
364F000
stack
page read and write
272F000
stack
page read and write
47A1000
heap
page read and write
3F4E000
stack
page read and write
864000
heap
page read and write
328F000
stack
page read and write
47A1000
heap
page read and write
AD6000
unkown
page write copy
2ECF000
stack
page read and write
F2A000
heap
page read and write
5CE1000
trusted library allocation
page read and write
864000
heap
page read and write
CC9000
unkown
page execute and write copy
C87000
unkown
page execute and write copy
CB5000
unkown
page execute and write copy
4A7B000
trusted library allocation
page execute and read and write
3A0F000
stack
page read and write
D6E000
unkown
page execute and write copy
CFC000
unkown
page execute and write copy
6E1D000
stack
page read and write
864000
heap
page read and write
4A90000
heap
page read and write
D6E000
unkown
page execute and write copy
4A77000
trusted library allocation
page execute and read and write
2D8F000
stack
page read and write
C40000
unkown
page execute and read and write
47A1000
heap
page read and write
5D05000
trusted library allocation
page read and write
864000
heap
page read and write
There are 200 hidden memdumps, click here to show them.