Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
FC0000
|
heap
|
page read and write
|
||
87F000
|
unkown
|
page execute and read and write
|
||
344F000
|
stack
|
page read and write
|
||
685000
|
unkown
|
page execute and read and write
|
||
158F000
|
stack
|
page read and write
|
||
7FF000
|
unkown
|
page execute and write copy
|
||
50F1000
|
heap
|
page read and write
|
||
812000
|
unkown
|
page execute and read and write
|
||
8D9000
|
unkown
|
page execute and read and write
|
||
438E000
|
stack
|
page read and write
|
||
856000
|
unkown
|
page execute and read and write
|
||
5420000
|
trusted library allocation
|
page execute and read and write
|
||
3E8E000
|
stack
|
page read and write
|
||
5440000
|
heap
|
page execute and read and write
|
||
879000
|
unkown
|
page execute and read and write
|
||
3A8F000
|
stack
|
page read and write
|
||
8C4000
|
unkown
|
page execute and read and write
|
||
50F1000
|
heap
|
page read and write
|
||
53BE000
|
stack
|
page read and write
|
||
358F000
|
stack
|
page read and write
|
||
15EC000
|
heap
|
page read and write
|
||
50F1000
|
heap
|
page read and write
|
||
50F1000
|
heap
|
page read and write
|
||
161E000
|
heap
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
394F000
|
stack
|
page read and write
|
||
6615000
|
trusted library allocation
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
159E000
|
heap
|
page read and write
|
||
8C0000
|
unkown
|
page execute and write copy
|
||
384E000
|
stack
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
50E0000
|
direct allocation
|
page read and write
|
||
434F000
|
stack
|
page read and write
|
||
527B000
|
stack
|
page read and write
|
||
50E0000
|
direct allocation
|
page read and write
|
||
670000
|
unkown
|
page readonly
|
||
672000
|
unkown
|
page execute and write copy
|
||
529A000
|
trusted library allocation
|
page execute and read and write
|
||
7FD000
|
unkown
|
page execute and write copy
|
||
35CE000
|
stack
|
page read and write
|
||
50E0000
|
direct allocation
|
page read and write
|
||
91C000
|
unkown
|
page execute and write copy
|
||
348E000
|
stack
|
page read and write
|
||
55F1000
|
trusted library allocation
|
page read and write
|
||
7910000
|
heap
|
page execute and read and write
|
||
50E0000
|
direct allocation
|
page read and write
|
||
67A000
|
unkown
|
page execute and read and write
|
||
424E000
|
stack
|
page read and write
|
||
8A7000
|
unkown
|
page execute and write copy
|
||
330F000
|
stack
|
page read and write
|
||
905000
|
unkown
|
page execute and write copy
|
||
541E000
|
stack
|
page read and write
|
||
398E000
|
stack
|
page read and write
|
||
50E0000
|
direct allocation
|
page read and write
|
||
4C4E000
|
stack
|
page read and write
|
||
50F0000
|
heap
|
page read and write
|
||
7F6000
|
unkown
|
page execute and write copy
|
||
50E0000
|
direct allocation
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
7FE000
|
unkown
|
page execute and read and write
|
||
8F8000
|
unkown
|
page execute and write copy
|
||
672000
|
unkown
|
page execute and read and write
|
||
40CF000
|
stack
|
page read and write
|
||
861000
|
unkown
|
page execute and read and write
|
||
498F000
|
stack
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
8F9000
|
unkown
|
page execute and read and write
|
||
85E000
|
unkown
|
page execute and write copy
|
||
13B5000
|
heap
|
page read and write
|
||
778D000
|
stack
|
page read and write
|
||
827000
|
unkown
|
page execute and write copy
|
||
13A0000
|
heap
|
page read and write
|
||
88A000
|
unkown
|
page execute and read and write
|
||
895000
|
unkown
|
page execute and write copy
|
||
869000
|
unkown
|
page execute and write copy
|
||
548C000
|
stack
|
page read and write
|
||
420F000
|
stack
|
page read and write
|
||
54CE000
|
stack
|
page read and write
|
||
801000
|
unkown
|
page execute and read and write
|
||
875000
|
unkown
|
page execute and read and write
|
||
45CF000
|
stack
|
page read and write
|
||
5223000
|
trusted library allocation
|
page execute and read and write
|
||
55EE000
|
stack
|
page read and write
|
||
7DD000
|
unkown
|
page execute and write copy
|
||
5100000
|
heap
|
page read and write
|
||
84C000
|
unkown
|
page execute and write copy
|
||
873000
|
unkown
|
page execute and write copy
|
||
4B0E000
|
stack
|
page read and write
|
||
91E000
|
unkown
|
page execute and write copy
|
||
5234000
|
trusted library allocation
|
page read and write
|
||
84D000
|
unkown
|
page execute and read and write
|
||
15D1000
|
heap
|
page read and write
|
||
50F1000
|
heap
|
page read and write
|
||
5240000
|
direct allocation
|
page read and write
|
||
7A1F000
|
stack
|
page read and write
|
||
52AB000
|
trusted library allocation
|
page execute and read and write
|
||
50E0000
|
direct allocation
|
page read and write
|
||
15CF000
|
heap
|
page read and write
|
||
4C0F000
|
stack
|
page read and write
|
||
50F1000
|
heap
|
page read and write
|
||
684000
|
unkown
|
page execute and write copy
|
||
80E000
|
unkown
|
page execute and read and write
|
||
3C0E000
|
stack
|
page read and write
|
||
49CE000
|
stack
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
7F6000
|
unkown
|
page execute and read and write
|
||
82A000
|
unkown
|
page execute and write copy
|
||
5240000
|
direct allocation
|
page read and write
|
||
67A000
|
unkown
|
page execute and write copy
|
||
90D000
|
unkown
|
page execute and write copy
|
||
3100000
|
heap
|
page read and write
|
||
90D000
|
unkown
|
page execute and write copy
|
||
65F1000
|
trusted library allocation
|
page read and write
|
||
676000
|
unkown
|
page write copy
|
||
7EB000
|
unkown
|
page execute and read and write
|
||
370E000
|
stack
|
page read and write
|
||
89A000
|
unkown
|
page execute and read and write
|
||
44CE000
|
stack
|
page read and write
|
||
3107000
|
heap
|
page read and write
|
||
54E0000
|
heap
|
page read and write
|
||
3D0F000
|
stack
|
page read and write
|
||
5240000
|
direct allocation
|
page read and write
|
||
50E0000
|
direct allocation
|
page read and write
|
||
50F1000
|
heap
|
page read and write
|
||
F5C000
|
stack
|
page read and write
|
||
50E0000
|
direct allocation
|
page read and write
|
||
8B6000
|
unkown
|
page execute and read and write
|
||
36CF000
|
stack
|
page read and write
|
||
178E000
|
stack
|
page read and write
|
||
50A0000
|
direct allocation
|
page read and write
|
||
50F1000
|
heap
|
page read and write
|
||
50E0000
|
direct allocation
|
page read and write
|
||
686000
|
unkown
|
page execute and write copy
|
||
8D8000
|
unkown
|
page execute and write copy
|
||
3E4F000
|
stack
|
page read and write
|
||
52A7000
|
trusted library allocation
|
page execute and read and write
|
||
5224000
|
trusted library allocation
|
page read and write
|
||
8DB000
|
unkown
|
page execute and read and write
|
||
460E000
|
stack
|
page read and write
|
||
8B5000
|
unkown
|
page execute and write copy
|
||
FD0000
|
heap
|
page read and write
|
||
8A9000
|
unkown
|
page execute and read and write
|
||
811000
|
unkown
|
page execute and write copy
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
65F4000
|
trusted library allocation
|
page read and write
|
||
83D000
|
unkown
|
page execute and read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
50F1000
|
heap
|
page read and write
|
||
133D000
|
stack
|
page read and write
|
||
3BCF000
|
stack
|
page read and write
|
||
8DA000
|
unkown
|
page execute and write copy
|
||
7B1E000
|
stack
|
page read and write
|
||
89B000
|
unkown
|
page execute and write copy
|
||
854000
|
unkown
|
page execute and write copy
|
||
50E0000
|
direct allocation
|
page read and write
|
||
50F1000
|
heap
|
page read and write
|
||
670000
|
unkown
|
page read and write
|
||
470F000
|
stack
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
676000
|
unkown
|
page write copy
|
||
5290000
|
trusted library allocation
|
page read and write
|
||
4D4F000
|
stack
|
page read and write
|
||
488E000
|
stack
|
page read and write
|
||
3FCE000
|
stack
|
page read and write
|
||
474E000
|
stack
|
page read and write
|
||
30AB000
|
stack
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
12F9000
|
stack
|
page read and write
|
||
4ACF000
|
stack
|
page read and write
|
||
410E000
|
stack
|
page read and write
|
||
380F000
|
stack
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
306F000
|
stack
|
page read and write
|
||
89E000
|
unkown
|
page execute and read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
5430000
|
trusted library allocation
|
page read and write
|
||
50E0000
|
direct allocation
|
page read and write
|
||
50F1000
|
heap
|
page read and write
|
||
159A000
|
heap
|
page read and write
|
||
50F1000
|
heap
|
page read and write
|
||
86B000
|
unkown
|
page execute and read and write
|
||
78CE000
|
stack
|
page read and write
|
||
3D4E000
|
stack
|
page read and write
|
||
876000
|
unkown
|
page execute and write copy
|
||
887000
|
unkown
|
page execute and write copy
|
||
448F000
|
stack
|
page read and write
|
||
790E000
|
stack
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
||
828000
|
unkown
|
page execute and read and write
|
||
91E000
|
unkown
|
page execute and write copy
|
||
3ACE000
|
stack
|
page read and write
|
||
87A000
|
unkown
|
page execute and write copy
|
||
50F1000
|
heap
|
page read and write
|
||
50F1000
|
heap
|
page read and write
|
||
50C0000
|
heap
|
page read and write
|
||
522D000
|
trusted library allocation
|
page execute and read and write
|
||
484F000
|
stack
|
page read and write
|
||
80B000
|
unkown
|
page execute and write copy
|
||
50E0000
|
direct allocation
|
page read and write
|
||
50F1000
|
heap
|
page read and write
|
||
7DA000
|
unkown
|
page execute and read and write
|
||
52B0000
|
heap
|
page read and write
|
||
788E000
|
stack
|
page read and write
|
||
15D8000
|
heap
|
page read and write
|
||
50F1000
|
heap
|
page read and write
|
||
50E0000
|
direct allocation
|
page read and write
|
||
3F8F000
|
stack
|
page read and write
|
||
52A0000
|
trusted library allocation
|
page read and write
|
||
91C000
|
unkown
|
page execute and read and write
|
There are 201 hidden memdumps, click here to show them.