Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
301E000
|
stack
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
DB1000
|
unkown
|
page execute and read and write
|
||
C10000
|
unkown
|
page read and write
|
||
50C0000
|
direct allocation
|
page read and write
|
||
66C5000
|
trusted library allocation
|
page read and write
|
||
E25000
|
unkown
|
page execute and read and write
|
||
1560000
|
heap
|
page read and write
|
||
E43000
|
unkown
|
page execute and write copy
|
||
356F000
|
stack
|
page read and write
|
||
77DE000
|
stack
|
page read and write
|
||
396E000
|
stack
|
page read and write
|
||
66A1000
|
trusted library allocation
|
page read and write
|
||
5260000
|
heap
|
page read and write
|
||
C12000
|
unkown
|
page execute and write copy
|
||
140D000
|
stack
|
page read and write
|
||
DC2000
|
unkown
|
page execute and read and write
|
||
4BF0000
|
heap
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
7A5E000
|
stack
|
page read and write
|
||
151E000
|
stack
|
page read and write
|
||
5220000
|
direct allocation
|
page read and write
|
||
536E000
|
stack
|
page read and write
|
||
EB2000
|
unkown
|
page execute and write copy
|
||
35AE000
|
stack
|
page read and write
|
||
4AAF000
|
stack
|
page read and write
|
||
55EF000
|
stack
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
4BEF000
|
stack
|
page read and write
|
||
50C0000
|
direct allocation
|
page read and write
|
||
44AE000
|
stack
|
page read and write
|
||
DAD000
|
unkown
|
page execute and write copy
|
||
DE3000
|
unkown
|
page execute and write copy
|
||
322F000
|
stack
|
page read and write
|
||
78DE000
|
stack
|
page read and write
|
||
49AE000
|
stack
|
page read and write
|
||
C12000
|
unkown
|
page execute and read and write
|
||
E1B000
|
unkown
|
page execute and write copy
|
||
1414000
|
heap
|
page read and write
|
||
159E000
|
heap
|
page read and write
|
||
50C0000
|
direct allocation
|
page read and write
|
||
E2C000
|
unkown
|
page execute and write copy
|
||
5650000
|
heap
|
page execute and read and write
|
||
3027000
|
heap
|
page read and write
|
||
C10000
|
unkown
|
page readonly
|
||
3E6E000
|
stack
|
page read and write
|
||
DAB000
|
unkown
|
page execute and read and write
|
||
C1A000
|
unkown
|
page execute and read and write
|
||
50C0000
|
direct allocation
|
page read and write
|
||
50C0000
|
direct allocation
|
page read and write
|
||
3AAE000
|
stack
|
page read and write
|
||
45EE000
|
stack
|
page read and write
|
||
DAA000
|
unkown
|
page execute and write copy
|
||
332F000
|
stack
|
page read and write
|
||
156E000
|
heap
|
page read and write
|
||
53A0000
|
trusted library allocation
|
page read and write
|
||
EA9000
|
unkown
|
page execute and write copy
|
||
DDB000
|
unkown
|
page execute and write copy
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
unkown
|
page execute and read and write
|
||
5384000
|
trusted library allocation
|
page read and write
|
||
3BEE000
|
stack
|
page read and write
|
||
56A1000
|
trusted library allocation
|
page read and write
|
||
7A1E000
|
stack
|
page read and write
|
||
C1A000
|
unkown
|
page execute and write copy
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
40EE000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
C16000
|
unkown
|
page write copy
|
||
E11000
|
unkown
|
page execute and write copy
|
||
1414000
|
heap
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
EB2000
|
unkown
|
page execute and write copy
|
||
1414000
|
heap
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
392F000
|
stack
|
page read and write
|
||
E1A000
|
unkown
|
page execute and read and write
|
||
5383000
|
trusted library allocation
|
page execute and read and write
|
||
41EF000
|
stack
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page execute and read and write
|
||
496F000
|
stack
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
D80000
|
unkown
|
page execute and read and write
|
||
5690000
|
heap
|
page execute and read and write
|
||
D9D000
|
unkown
|
page execute and read and write
|
||
5220000
|
direct allocation
|
page read and write
|
||
3E2F000
|
stack
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
53AA000
|
trusted library allocation
|
page execute and read and write
|
||
525B000
|
stack
|
page read and write
|
||
E53000
|
unkown
|
page execute and read and write
|
||
779D000
|
stack
|
page read and write
|
||
C16000
|
unkown
|
page write copy
|
||
1410000
|
heap
|
page read and write
|
||
15E8000
|
heap
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
DEF000
|
unkown
|
page execute and read and write
|
||
50C0000
|
direct allocation
|
page read and write
|
||
DBE000
|
unkown
|
page execute and write copy
|
||
346E000
|
stack
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
DBF000
|
unkown
|
page execute and read and write
|
||
50C0000
|
direct allocation
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
4AEE000
|
stack
|
page read and write
|
||
15BC000
|
heap
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
D82000
|
unkown
|
page execute and write copy
|
||
50C0000
|
direct allocation
|
page read and write
|
||
53B7000
|
trusted library allocation
|
page execute and read and write
|
||
5390000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
unkown
|
page execute and write copy
|
||
53B0000
|
direct allocation
|
page execute and read and write
|
||
E16000
|
unkown
|
page execute and read and write
|
||
E4B000
|
unkown
|
page execute and read and write
|
||
50D1000
|
heap
|
page read and write
|
||
37EF000
|
stack
|
page read and write
|
||
156A000
|
heap
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
E17000
|
unkown
|
page execute and write copy
|
||
1414000
|
heap
|
page read and write
|
||
432F000
|
stack
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
53BB000
|
trusted library allocation
|
page execute and read and write
|
||
DC1000
|
unkown
|
page execute and write copy
|
||
66A4000
|
trusted library allocation
|
page read and write
|
||
791E000
|
stack
|
page read and write
|
||
DE1000
|
unkown
|
page execute and read and write
|
||
E23000
|
unkown
|
page execute and write copy
|
||
2F9C000
|
stack
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
7B5E000
|
stack
|
page read and write
|
||
50E0000
|
heap
|
page read and write
|
||
155E000
|
stack
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
50A0000
|
direct allocation
|
page read and write
|
||
4C3E000
|
stack
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
40AF000
|
stack
|
page read and write
|
||
E1C000
|
unkown
|
page execute and read and write
|
||
F5C000
|
stack
|
page read and write
|
||
50C0000
|
direct allocation
|
page read and write
|
||
50C0000
|
direct allocation
|
page read and write
|
||
E4C000
|
unkown
|
page execute and write copy
|
||
50C0000
|
direct allocation
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
C26000
|
unkown
|
page execute and write copy
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
50C0000
|
direct allocation
|
page read and write
|
||
5380000
|
direct allocation
|
page execute and read and write
|
||
50C0000
|
direct allocation
|
page read and write
|
||
486E000
|
stack
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
482F000
|
stack
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
3CEF000
|
stack
|
page read and write
|
||
562C000
|
stack
|
page read and write
|
||
12F9000
|
stack
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
54E0000
|
heap
|
page read and write
|
||
E2D000
|
unkown
|
page execute and read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
538D000
|
trusted library allocation
|
page execute and read and write
|
||
4D3F000
|
stack
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
46EF000
|
stack
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
541E000
|
stack
|
page read and write
|
||
50D0000
|
heap
|
page read and write
|
||
51D0000
|
heap
|
page read and write
|
||
45AF000
|
stack
|
page read and write
|
||
15A8000
|
heap
|
page read and write
|
||
50C0000
|
direct allocation
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
5220000
|
direct allocation
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
175F000
|
stack
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
36AF000
|
stack
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
There are 183 hidden memdumps, click here to show them.