IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
357F000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4BB4000
trusted library allocation
page read and write
36BF000
stack
page read and write
1163000
unkown
page execute and read and write
4D3B000
trusted library allocation
page execute and read and write
40FE000
stack
page read and write
113B000
unkown
page execute and write copy
4BC0000
direct allocation
page read and write
2CFE000
stack
page read and write
45BF000
stack
page read and write
11E0000
unkown
page execute and read and write
117A000
unkown
page execute and read and write
1264000
unkown
page execute and write copy
3E3E000
stack
page read and write
4A71000
heap
page read and write
BDE000
stack
page read and write
11B7000
unkown
page execute and write copy
1150000
unkown
page execute and write copy
4D10000
heap
page read and write
4D20000
trusted library allocation
page read and write
4BAD000
trusted library allocation
page execute and read and write
939000
stack
page read and write
347E000
stack
page read and write
1181000
unkown
page execute and write copy
96A000
heap
page read and write
1266000
unkown
page execute and write copy
423E000
stack
page read and write
45FE000
stack
page read and write
4D30000
trusted library allocation
page read and write
A60000
heap
page read and write
4A71000
heap
page read and write
124E000
unkown
page execute and write copy
70A0000
trusted library allocation
page execute and read and write
4EAF000
stack
page read and write
FB2000
unkown
page execute and read and write
83C000
stack
page read and write
1145000
unkown
page execute and write copy
46FF000
stack
page read and write
343F000
stack
page read and write
CDF000
stack
page read and write
32FF000
stack
page read and write
4D37000
trusted library allocation
page execute and read and write
FB6000
unkown
page write copy
FB6000
unkown
page write copy
112A000
unkown
page execute and write copy
9C4000
heap
page read and write
4A60000
direct allocation
page read and write
41FF000
stack
page read and write
1264000
unkown
page execute and read and write
4BA3000
trusted library allocation
page execute and read and write
70FE000
stack
page read and write
4A70000
heap
page read and write
4A71000
heap
page read and write
40BF000
stack
page read and write
4BC0000
direct allocation
page read and write
960000
heap
page read and write
71A0000
heap
page execute and read and write
1255000
unkown
page execute and write copy
2F7E000
stack
page read and write
1204000
unkown
page execute and read and write
4A60000
direct allocation
page read and write
9B5000
heap
page read and write
70C0000
trusted library allocation
page read and write
2BB7000
heap
page read and write
35BE000
stack
page read and write
3BBF000
stack
page read and write
9AC000
heap
page read and write
433F000
stack
page read and write
36FE000
stack
page read and write
3D3E000
stack
page read and write
2E3E000
stack
page read and write
5EE5000
trusted library allocation
page read and write
113A000
unkown
page execute and read and write
9A5000
heap
page read and write
4A60000
direct allocation
page read and write
11E8000
unkown
page execute and write copy
3ABE000
stack
page read and write
3E7E000
stack
page read and write
4A60000
direct allocation
page read and write
2A4B000
stack
page read and write
B70000
heap
page read and write
FC5000
unkown
page execute and read and write
5EC4000
trusted library allocation
page read and write
307F000
stack
page read and write
1159000
unkown
page execute and write copy
F80000
heap
page read and write
4A71000
heap
page read and write
4CFE000
stack
page read and write
11C7000
unkown
page execute and write copy
4A71000
heap
page read and write
4A60000
direct allocation
page read and write
3CFF000
stack
page read and write
1162000
unkown
page execute and write copy
3FBE000
stack
page read and write
4A60000
direct allocation
page read and write
2B8E000
stack
page read and write
73AE000
stack
page read and write
4A40000
heap
page read and write
1255000
unkown
page execute and write copy
4A71000
heap
page read and write
1145000
unkown
page execute and read and write
4A71000
heap
page read and write
4A60000
direct allocation
page read and write
2B4F000
stack
page read and write
3BFE000
stack
page read and write
11BB000
unkown
page execute and write copy
4A60000
direct allocation
page read and write
115A000
unkown
page execute and read and write
4B90000
trusted library allocation
page read and write
1266000
unkown
page execute and write copy
4D20000
direct allocation
page execute and read and write
4A71000
heap
page read and write
4D50000
trusted library allocation
page read and write
1197000
unkown
page execute and read and write
E1E000
stack
page read and write
11BA000
unkown
page execute and read and write
5EC1000
trusted library allocation
page read and write
1128000
unkown
page execute and read and write
4A60000
direct allocation
page read and write
9A3000
heap
page read and write
3A7F000
stack
page read and write
E7E000
stack
page read and write
FB2000
unkown
page execute and write copy
44BE000
stack
page read and write
713E000
stack
page read and write
30BE000
stack
page read and write
4BC0000
direct allocation
page read and write
2B90000
direct allocation
page read and write
4A71000
heap
page read and write
2DFF000
stack
page read and write
383E000
stack
page read and write
FBA000
unkown
page execute and write copy
11CA000
unkown
page execute and read and write
4A71000
heap
page read and write
3F7F000
stack
page read and write
11F3000
unkown
page execute and write copy
4D50000
direct allocation
page execute and read and write
2CBF000
stack
page read and write
4A60000
direct allocation
page read and write
96E000
heap
page read and write
1151000
unkown
page execute and read and write
D1E000
stack
page read and write
A90000
heap
page read and write
11DC000
unkown
page execute and write copy
113C000
unkown
page execute and read and write
447F000
stack
page read and write
4D2A000
trusted library allocation
page execute and read and write
437E000
stack
page read and write
333E000
stack
page read and write
31FE000
stack
page read and write
A65000
heap
page read and write
FC6000
unkown
page execute and write copy
4DA0000
heap
page read and write
4A71000
heap
page read and write
4BA4000
trusted library allocation
page read and write
4A60000
direct allocation
page read and write
11F6000
unkown
page execute and read and write
4BB0000
trusted library allocation
page read and write
4A60000
direct allocation
page read and write
4A71000
heap
page read and write
717E000
stack
page read and write
1195000
unkown
page execute and write copy
4A60000
direct allocation
page read and write
4A60000
direct allocation
page read and write
FB0000
unkown
page readonly
11D5000
unkown
page execute and read and write
4A71000
heap
page read and write
FC4000
unkown
page execute and write copy
2F3F000
stack
page read and write
F7F000
stack
page read and write
9C1000
heap
page read and write
1178000
unkown
page execute and write copy
72AF000
stack
page read and write
397E000
stack
page read and write
6F9C000
stack
page read and write
11EB000
unkown
page execute and read and write
11C6000
unkown
page execute and read and write
709D000
stack
page read and write
4EB0000
heap
page execute and read and write
31BF000
stack
page read and write
4A80000
heap
page read and write
4B70000
trusted library allocation
page read and write
393F000
stack
page read and write
11D1000
unkown
page execute and write copy
1202000
unkown
page execute and write copy
37FF000
stack
page read and write
4BFB000
stack
page read and write
FB0000
unkown
page read and write
118B000
unkown
page execute and read and write
FBA000
unkown
page execute and read and write
70B0000
trusted library allocation
page read and write
74AF000
stack
page read and write
4EC1000
trusted library allocation
page read and write
2BB0000
heap
page read and write
4A71000
heap
page read and write
4D9E000
stack
page read and write
There are 188 hidden memdumps, click here to show them.