Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
310F000
|
stack
|
page read and write
|
||
DCC000
|
stack
|
page read and write
|
||
10F8000
|
unkown
|
page execute and write copy
|
||
E30000
|
heap
|
page read and write
|
||
1654000
|
heap
|
page read and write
|
||
172B000
|
stack
|
page read and write
|
||
1654000
|
heap
|
page read and write
|
||
35CE000
|
stack
|
page read and write
|
||
5660000
|
heap
|
page execute and read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
E6A000
|
unkown
|
page execute and write copy
|
||
1654000
|
heap
|
page read and write
|
||
17BF000
|
heap
|
page read and write
|
||
105A000
|
unkown
|
page execute and write copy
|
||
54E0000
|
direct allocation
|
page execute and read and write
|
||
1654000
|
heap
|
page read and write
|
||
10EF000
|
unkown
|
page execute and read and write
|
||
5201000
|
heap
|
page read and write
|
||
5201000
|
heap
|
page read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
108A000
|
unkown
|
page execute and write copy
|
||
1654000
|
heap
|
page read and write
|
||
1110000
|
unkown
|
page execute and write copy
|
||
1740000
|
heap
|
page read and write
|
||
1044000
|
unkown
|
page execute and write copy
|
||
5590000
|
trusted library allocation
|
page execute and read and write
|
||
108F000
|
unkown
|
page execute and read and write
|
||
110E000
|
unkown
|
page execute and read and write
|
||
5660000
|
trusted library allocation
|
page read and write
|
||
7B2E000
|
stack
|
page read and write
|
||
3F8F000
|
stack
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
67D5000
|
trusted library allocation
|
page read and write
|
||
398E000
|
stack
|
page read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
FCC000
|
unkown
|
page execute and read and write
|
||
FE9000
|
unkown
|
page execute and write copy
|
||
E40000
|
heap
|
page read and write
|
||
106B000
|
unkown
|
page execute and write copy
|
||
5310000
|
heap
|
page read and write
|
||
3D0F000
|
stack
|
page read and write
|
||
106F000
|
unkown
|
page execute and read and write
|
||
3FCE000
|
stack
|
page read and write
|
||
163F000
|
stack
|
page read and write
|
||
438E000
|
stack
|
page read and write
|
||
104F000
|
unkown
|
page execute and write copy
|
||
1070000
|
unkown
|
page execute and write copy
|
||
460E000
|
stack
|
page read and write
|
||
3E8E000
|
stack
|
page read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
5201000
|
heap
|
page read and write
|
||
E60000
|
unkown
|
page readonly
|
||
E66000
|
unkown
|
page write copy
|
||
4E8F000
|
stack
|
page read and write
|
||
5200000
|
heap
|
page read and write
|
||
1654000
|
heap
|
page read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
424E000
|
stack
|
page read and write
|
||
FF1000
|
unkown
|
page execute and write copy
|
||
370E000
|
stack
|
page read and write
|
||
4C4E000
|
stack
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
FF3000
|
unkown
|
page execute and write copy
|
||
108C000
|
unkown
|
page execute and read and write
|
||
558C000
|
stack
|
page read and write
|
||
FFC000
|
unkown
|
page execute and read and write
|
||
3C0E000
|
stack
|
page read and write
|
||
1091000
|
unkown
|
page execute and read and write
|
||
1024000
|
unkown
|
page execute and write copy
|
||
1654000
|
heap
|
page read and write
|
||
344F000
|
stack
|
page read and write
|
||
100D000
|
unkown
|
page execute and write copy
|
||
100F000
|
unkown
|
page execute and read and write
|
||
54DA000
|
trusted library allocation
|
page execute and read and write
|
||
448F000
|
stack
|
page read and write
|
||
108D000
|
unkown
|
page execute and write copy
|
||
4D8E000
|
stack
|
page read and write
|
||
7A2E000
|
stack
|
page read and write
|
||
44CD000
|
stack
|
page read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
3ACE000
|
stack
|
page read and write
|
||
56A0000
|
heap
|
page read and write
|
||
1082000
|
unkown
|
page execute and read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
109D000
|
unkown
|
page execute and read and write
|
||
10FE000
|
unkown
|
page execute and write copy
|
||
5360000
|
direct allocation
|
page read and write
|
||
1051000
|
unkown
|
page execute and read and write
|
||
101E000
|
unkown
|
page execute and write copy
|
||
45CF000
|
stack
|
page read and write
|
||
5201000
|
heap
|
page read and write
|
||
420F000
|
stack
|
page read and write
|
||
1654000
|
heap
|
page read and write
|
||
16EE000
|
stack
|
page read and write
|
||
7B6E000
|
stack
|
page read and write
|
||
1654000
|
heap
|
page read and write
|
||
67B4000
|
trusted library allocation
|
page read and write
|
||
169E000
|
stack
|
page read and write
|
||
109B000
|
unkown
|
page execute and write copy
|
||
5210000
|
heap
|
page read and write
|
||
498F000
|
stack
|
page read and write
|
||
107D000
|
unkown
|
page execute and write copy
|
||
434F000
|
stack
|
page read and write
|
||
E76000
|
unkown
|
page execute and write copy
|
||
51F0000
|
direct allocation
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
384E000
|
stack
|
page read and write
|
||
488E000
|
stack
|
page read and write
|
||
1654000
|
heap
|
page read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
3D4E000
|
stack
|
page read and write
|
||
E66000
|
unkown
|
page write copy
|
||
17B1000
|
heap
|
page read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
1110000
|
unkown
|
page execute and write copy
|
||
539C000
|
stack
|
page read and write
|
||
E62000
|
unkown
|
page execute and write copy
|
||
51F0000
|
direct allocation
|
page read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
5360000
|
direct allocation
|
page read and write
|
||
4D4F000
|
stack
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
FF7000
|
unkown
|
page execute and write copy
|
||
1025000
|
unkown
|
page execute and read and write
|
||
549F000
|
stack
|
page read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
1093000
|
unkown
|
page execute and read and write
|
||
1654000
|
heap
|
page read and write
|
||
17CD000
|
heap
|
page read and write
|
||
484F000
|
stack
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
79EE000
|
stack
|
page read and write
|
||
554E000
|
stack
|
page read and write
|
||
57B1000
|
trusted library allocation
|
page read and write
|
||
1654000
|
heap
|
page read and write
|
||
7C6E000
|
stack
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
4C0F000
|
stack
|
page read and write
|
||
177E000
|
heap
|
page read and write
|
||
1092000
|
unkown
|
page execute and write copy
|
||
51F0000
|
direct allocation
|
page read and write
|
||
FFB000
|
unkown
|
page execute and write copy
|
||
1090000
|
unkown
|
page execute and write copy
|
||
1654000
|
heap
|
page read and write
|
||
14F9000
|
stack
|
page read and write
|
||
3E4F000
|
stack
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
FEA000
|
unkown
|
page execute and read and write
|
||
57AE000
|
stack
|
page read and write
|
||
36CF000
|
stack
|
page read and write
|
||
FE7000
|
unkown
|
page execute and read and write
|
||
1039000
|
unkown
|
page execute and read and write
|
||
49CE000
|
stack
|
page read and write
|
||
FF3000
|
unkown
|
page execute and read and write
|
||
380F000
|
stack
|
page read and write
|
||
3A8F000
|
stack
|
page read and write
|
||
10ED000
|
unkown
|
page execute and write copy
|
||
1654000
|
heap
|
page read and write
|
||
E62000
|
unkown
|
page execute and read and write
|
||
1770000
|
heap
|
page read and write
|
||
10FE000
|
unkown
|
page execute and write copy
|
||
54E7000
|
trusted library allocation
|
page execute and read and write
|
||
1654000
|
heap
|
page read and write
|
||
1654000
|
heap
|
page read and write
|
||
5360000
|
direct allocation
|
page read and write
|
||
1063000
|
unkown
|
page execute and read and write
|
||
10B9000
|
unkown
|
page execute and write copy
|
||
102E000
|
unkown
|
page execute and write copy
|
||
5201000
|
heap
|
page read and write
|
||
55B0000
|
heap
|
page execute and read and write
|
||
394F000
|
stack
|
page read and write
|
||
1730000
|
heap
|
page read and write
|
||
105E000
|
unkown
|
page execute and read and write
|
||
110E000
|
unkown
|
page execute and write copy
|
||
17B8000
|
heap
|
page read and write
|
||
1047000
|
unkown
|
page execute and read and write
|
||
1654000
|
heap
|
page read and write
|
||
54EB000
|
trusted library allocation
|
page execute and read and write
|
||
E6A000
|
unkown
|
page execute and read and write
|
||
5201000
|
heap
|
page read and write
|
||
E60000
|
unkown
|
page read and write
|
||
FCE000
|
unkown
|
page execute and write copy
|
||
1800000
|
heap
|
page read and write
|
||
67B1000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
1075000
|
unkown
|
page execute and read and write
|
||
474E000
|
stack
|
page read and write
|
||
10BD000
|
unkown
|
page execute and read and write
|
||
1737000
|
heap
|
page read and write
|
||
54B4000
|
trusted library allocation
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
54B3000
|
trusted library allocation
|
page execute and read and write
|
||
105F000
|
unkown
|
page execute and write copy
|
||
358F000
|
stack
|
page read and write
|
||
FF8000
|
unkown
|
page execute and read and write
|
||
1654000
|
heap
|
page read and write
|
||
470F000
|
stack
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
78EE000
|
stack
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
||
54BD000
|
trusted library allocation
|
page execute and read and write
|
||
4ACF000
|
stack
|
page read and write
|
||
1020000
|
unkown
|
page execute and read and write
|
||
348E000
|
stack
|
page read and write
|
||
410E000
|
stack
|
page read and write
|
||
3BCF000
|
stack
|
page read and write
|
||
5320000
|
heap
|
page read and write
|
||
40CF000
|
stack
|
page read and write
|
||
177A000
|
heap
|
page read and write
|
||
78AD000
|
stack
|
page read and write
|
There are 205 hidden memdumps, click here to show them.