Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
48F1000
|
heap
|
page read and write
|
||
4BAA000
|
trusted library allocation
|
page execute and read and write
|
||
3F6000
|
unkown
|
page execute and write copy
|
||
4A50000
|
direct allocation
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
E57000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page execute and read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
5D61000
|
trusted library allocation
|
page read and write
|
||
3CE000
|
unkown
|
page execute and write copy
|
||
1D0000
|
unkown
|
page readonly
|
||
48F1000
|
heap
|
page read and write
|
||
10AF000
|
stack
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
4D3E000
|
stack
|
page read and write
|
||
3DB000
|
unkown
|
page execute and write copy
|
||
3EA000
|
unkown
|
page execute and read and write
|
||
6F3D000
|
stack
|
page read and write
|
||
378F000
|
stack
|
page read and write
|
||
378000
|
unkown
|
page execute and write copy
|
||
1D6000
|
unkown
|
page write copy
|
||
48F1000
|
heap
|
page read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
49F0000
|
heap
|
page read and write
|
||
4BBB000
|
trusted library allocation
|
page execute and read and write
|
||
1E5000
|
unkown
|
page execute and read and write
|
||
48E0000
|
direct allocation
|
page read and write
|
||
368000
|
unkown
|
page execute and write copy
|
||
3EB000
|
unkown
|
page execute and write copy
|
||
3E0000
|
unkown
|
page execute and read and write
|
||
48E0000
|
direct allocation
|
page read and write
|
||
723E000
|
stack
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
48A0000
|
direct allocation
|
page read and write
|
||
4BF0000
|
heap
|
page execute and read and write
|
||
4A50000
|
direct allocation
|
page read and write
|
||
3EE000
|
unkown
|
page execute and read and write
|
||
2ECF000
|
stack
|
page read and write
|
||
4BB0000
|
trusted library allocation
|
page read and write
|
||
47A000
|
unkown
|
page execute and write copy
|
||
2C4F000
|
stack
|
page read and write
|
||
48F1000
|
heap
|
page read and write
|
||
70FE000
|
stack
|
page read and write
|
||
3E8000
|
unkown
|
page execute and write copy
|
||
38CF000
|
stack
|
page read and write
|
||
48E0000
|
direct allocation
|
page read and write
|
||
48E0000
|
direct allocation
|
page read and write
|
||
6FBE000
|
stack
|
page read and write
|
||
3F0000
|
unkown
|
page execute and read and write
|
||
4900000
|
heap
|
page read and write
|
||
5D85000
|
trusted library allocation
|
page read and write
|
||
2A4F000
|
stack
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
3B4F000
|
stack
|
page read and write
|
||
48E0000
|
direct allocation
|
page read and write
|
||
4D61000
|
trusted library allocation
|
page read and write
|
||
1DA000
|
unkown
|
page execute and read and write
|
||
48F0000
|
heap
|
page read and write
|
||
41B000
|
unkown
|
page execute and read and write
|
||
CB5000
|
heap
|
page read and write
|
||
430E000
|
stack
|
page read and write
|
||
340000
|
unkown
|
page execute and write copy
|
||
75C000
|
stack
|
page read and write
|
||
48E0000
|
direct allocation
|
page read and write
|
||
48F1000
|
heap
|
page read and write
|
||
4A33000
|
trusted library allocation
|
page execute and read and write
|
||
2B4F000
|
stack
|
page read and write
|
||
48E0000
|
direct allocation
|
page read and write
|
||
48F1000
|
heap
|
page read and write
|
||
1D2000
|
unkown
|
page execute and write copy
|
||
7C0000
|
heap
|
page read and write
|
||
48E0000
|
direct allocation
|
page read and write
|
||
294F000
|
stack
|
page read and write
|
||
4D50000
|
heap
|
page read and write
|
||
3A4000
|
unkown
|
page execute and read and write
|
||
3F4E000
|
stack
|
page read and write
|
||
3F7000
|
unkown
|
page execute and read and write
|
||
3C6000
|
unkown
|
page execute and read and write
|
||
6FF0000
|
heap
|
page execute and read and write
|
||
48F1000
|
heap
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
468000
|
unkown
|
page execute and write copy
|
||
3C4000
|
unkown
|
page execute and write copy
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
3D3000
|
unkown
|
page execute and read and write
|
||
71FF000
|
stack
|
page read and write
|
||
1D6000
|
unkown
|
page write copy
|
||
EBE000
|
heap
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
1D0000
|
unkown
|
page read and write
|
||
E9E000
|
stack
|
page read and write
|
||
3FE000
|
unkown
|
page execute and read and write
|
||
41A000
|
unkown
|
page execute and write copy
|
||
375000
|
unkown
|
page execute and read and write
|
||
1DA000
|
unkown
|
page execute and write copy
|
||
440F000
|
stack
|
page read and write
|
||
3B7000
|
unkown
|
page execute and read and write
|
||
48F1000
|
heap
|
page read and write
|
||
48E0000
|
direct allocation
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
48F1000
|
heap
|
page read and write
|
||
3DCF000
|
stack
|
page read and write
|
||
402000
|
unkown
|
page execute and write copy
|
||
35E000
|
unkown
|
page execute and read and write
|
||
461000
|
unkown
|
page execute and write copy
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
4BB7000
|
trusted library allocation
|
page execute and read and write
|
||
4B8F000
|
stack
|
page read and write
|
||
3FF000
|
unkown
|
page execute and write copy
|
||
328F000
|
stack
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
3F8000
|
unkown
|
page execute and write copy
|
||
EEE000
|
heap
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
478000
|
unkown
|
page execute and read and write
|
||
304E000
|
stack
|
page read and write
|
||
3A0F000
|
stack
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
48F1000
|
heap
|
page read and write
|
||
3CCE000
|
stack
|
page read and write
|
||
4A44000
|
trusted library allocation
|
page read and write
|
||
47A000
|
unkown
|
page execute and write copy
|
||
351000
|
unkown
|
page execute and read and write
|
||
E3E000
|
stack
|
page read and write
|
||
33D000
|
unkown
|
page execute and read and write
|
||
3F0F000
|
stack
|
page read and write
|
||
390E000
|
stack
|
page read and write
|
||
48C0000
|
heap
|
page read and write
|
||
4A8C000
|
stack
|
page read and write
|
||
3EF000
|
unkown
|
page execute and write copy
|
||
35E000
|
unkown
|
page execute and write copy
|
||
408E000
|
stack
|
page read and write
|
||
48E0000
|
direct allocation
|
page read and write
|
||
733E000
|
stack
|
page read and write
|
||
48E0000
|
direct allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
42CF000
|
stack
|
page read and write
|
||
454F000
|
stack
|
page read and write
|
||
379000
|
unkown
|
page execute and read and write
|
||
368E000
|
stack
|
page read and write
|
||
48F1000
|
heap
|
page read and write
|
||
48F1000
|
heap
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
3C8F000
|
stack
|
page read and write
|
||
4BA0000
|
direct allocation
|
page execute and read and write
|
||
41CE000
|
stack
|
page read and write
|
||
6F7E000
|
stack
|
page read and write
|
||
48E0000
|
direct allocation
|
page read and write
|
||
1DA000
|
unkown
|
page execute and write copy
|
||
45A000
|
unkown
|
page execute and read and write
|
||
390000
|
unkown
|
page execute and write copy
|
||
418F000
|
stack
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
2D8F000
|
stack
|
page read and write
|
||
4BA0000
|
trusted library allocation
|
page read and write
|
||
6E3C000
|
stack
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
DFB000
|
stack
|
page read and write
|
||
372000
|
unkown
|
page execute and write copy
|
||
300F000
|
stack
|
page read and write
|
||
48E0000
|
direct allocation
|
page read and write
|
||
4A50000
|
direct allocation
|
page read and write
|
||
3A4E000
|
stack
|
page read and write
|
||
478000
|
unkown
|
page execute and write copy
|
||
48F1000
|
heap
|
page read and write
|
||
444E000
|
stack
|
page read and write
|
||
404F000
|
stack
|
page read and write
|
||
1E6000
|
unkown
|
page execute and write copy
|
||
AF9000
|
stack
|
page read and write
|
||
37CE000
|
stack
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
EF7000
|
heap
|
page read and write
|
||
1E4000
|
unkown
|
page execute and write copy
|
||
DBE000
|
stack
|
page read and write
|
||
F0C000
|
heap
|
page read and write
|
||
369000
|
unkown
|
page execute and read and write
|
||
CAE000
|
stack
|
page read and write
|
||
4A3D000
|
trusted library allocation
|
page execute and read and write
|
||
4C3E000
|
stack
|
page read and write
|
||
468000
|
unkown
|
page execute and write copy
|
||
4D40000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute and read and write
|
||
C4E000
|
stack
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
4BD0000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page execute and read and write
|
||
EBA000
|
heap
|
page read and write
|
||
3B4000
|
unkown
|
page execute and write copy
|
||
1D2000
|
unkown
|
page execute and read and write
|
||
48F1000
|
heap
|
page read and write
|
||
48F1000
|
heap
|
page read and write
|
||
4A34000
|
trusted library allocation
|
page read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
48E0000
|
direct allocation
|
page read and write
|
There are 189 hidden memdumps, click here to show them.