Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
106F000
|
heap
|
page read and write
|
||
70DC000
|
stack
|
page read and write
|
||
8EC000
|
unkown
|
page execute and write copy
|
||
4B80000
|
heap
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
4E6A000
|
trusted library allocation
|
page execute and read and write
|
||
4D00000
|
direct allocation
|
page read and write
|
||
6004000
|
trusted library allocation
|
page read and write
|
||
473E000
|
stack
|
page read and write
|
||
D39000
|
stack
|
page read and write
|
||
74BE000
|
stack
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
8FC000
|
unkown
|
page execute and read and write
|
||
343F000
|
stack
|
page read and write
|
||
6E5000
|
unkown
|
page execute and read and write
|
||
918000
|
unkown
|
page execute and read and write
|
||
86A000
|
unkown
|
page execute and read and write
|
||
8C1000
|
unkown
|
page execute and write copy
|
||
4BB1000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
2B7F000
|
stack
|
page read and write
|
||
44BE000
|
stack
|
page read and write
|
||
101F000
|
heap
|
page read and write
|
||
36BF000
|
stack
|
page read and write
|
||
4BA0000
|
direct allocation
|
page read and write
|
||
8F9000
|
unkown
|
page execute and write copy
|
||
3BBF000
|
stack
|
page read and write
|
||
437E000
|
stack
|
page read and write
|
||
6E4000
|
unkown
|
page execute and write copy
|
||
3E7E000
|
stack
|
page read and write
|
||
4EDE000
|
stack
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
4CE4000
|
trusted library allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
844000
|
unkown
|
page execute and read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
4BA0000
|
direct allocation
|
page read and write
|
||
6DA000
|
unkown
|
page execute and write copy
|
||
6DA000
|
unkown
|
page execute and read and write
|
||
8BB000
|
unkown
|
page execute and write copy
|
||
8D9000
|
unkown
|
page execute and read and write
|
||
89A000
|
unkown
|
page execute and write copy
|
||
98A000
|
unkown
|
page execute and read and write
|
||
6D6000
|
unkown
|
page write copy
|
||
FC0000
|
direct allocation
|
page read and write
|
||
90B000
|
unkown
|
page execute and write copy
|
||
974000
|
unkown
|
page execute and write copy
|
||
98A000
|
unkown
|
page execute and write copy
|
||
4BA0000
|
direct allocation
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
4CB0000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
E55000
|
heap
|
page read and write
|
||
3BFE000
|
stack
|
page read and write
|
||
4E90000
|
direct allocation
|
page execute and read and write
|
||
393F000
|
stack
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
733F000
|
stack
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
4BA0000
|
direct allocation
|
page read and write
|
||
447F000
|
stack
|
page read and write
|
||
4BA0000
|
direct allocation
|
page read and write
|
||
8DA000
|
unkown
|
page execute and write copy
|
||
45FE000
|
stack
|
page read and write
|
||
4CED000
|
trusted library allocation
|
page execute and read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
8DE000
|
unkown
|
page execute and read and write
|
||
71DD000
|
stack
|
page read and write
|
||
4D00000
|
direct allocation
|
page read and write
|
||
919000
|
unkown
|
page execute and write copy
|
||
4BCA000
|
heap
|
page read and write
|
||
97B000
|
unkown
|
page execute and write copy
|
||
4BA0000
|
direct allocation
|
page read and write
|
||
6001000
|
trusted library allocation
|
page read and write
|
||
41FF000
|
stack
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
6D0000
|
unkown
|
page readonly
|
||
6D2000
|
unkown
|
page execute and write copy
|
||
904000
|
unkown
|
page execute and read and write
|
||
3F7F000
|
stack
|
page read and write
|
||
423E000
|
stack
|
page read and write
|
||
6E6000
|
unkown
|
page execute and write copy
|
||
4BB1000
|
heap
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
98C000
|
unkown
|
page execute and write copy
|
||
2CFE000
|
stack
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
4E77000
|
trusted library allocation
|
page execute and read and write
|
||
4D00000
|
direct allocation
|
page read and write
|
||
873000
|
unkown
|
page execute and write copy
|
||
31FE000
|
stack
|
page read and write
|
||
8ED000
|
unkown
|
page execute and read and write
|
||
1021000
|
heap
|
page read and write
|
||
4BA0000
|
direct allocation
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
5001000
|
trusted library allocation
|
page read and write
|
||
4BA0000
|
direct allocation
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
4CF4000
|
trusted library allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
75FE000
|
stack
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
102B000
|
heap
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
3ABE000
|
stack
|
page read and write
|
||
C3C000
|
stack
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
3FBE000
|
stack
|
page read and write
|
||
875000
|
unkown
|
page execute and read and write
|
||
347E000
|
stack
|
page read and write
|
||
4FF0000
|
heap
|
page read and write
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
71E0000
|
trusted library allocation
|
page execute and read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
8E4000
|
unkown
|
page execute and read and write
|
||
6D6000
|
unkown
|
page write copy
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
40FE000
|
stack
|
page read and write
|
||
4E60000
|
direct allocation
|
page execute and read and write
|
||
4D3C000
|
stack
|
page read and write
|
||
4BA0000
|
direct allocation
|
page read and write
|
||
8D7000
|
unkown
|
page execute and write copy
|
||
7370000
|
heap
|
page execute and read and write
|
||
1029000
|
heap
|
page read and write
|
||
4E7B000
|
trusted library allocation
|
page execute and read and write
|
||
73BE000
|
stack
|
page read and write
|
||
FEE000
|
heap
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
6D0000
|
unkown
|
page read and write
|
||
8AB000
|
unkown
|
page execute and read and write
|
||
91C000
|
unkown
|
page execute and read and write
|
||
8FD000
|
unkown
|
page execute and write copy
|
||
4E3E000
|
stack
|
page read and write
|
||
1046000
|
heap
|
page read and write
|
||
97B000
|
unkown
|
page execute and write copy
|
||
3A7F000
|
stack
|
page read and write
|
||
40BF000
|
stack
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
4CE3000
|
trusted library allocation
|
page execute and read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
3CFF000
|
stack
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
2CBF000
|
stack
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
4BA0000
|
direct allocation
|
page read and write
|
||
4EE0000
|
heap
|
page execute and read and write
|
||
85D000
|
unkown
|
page execute and read and write
|
||
8DF000
|
unkown
|
page execute and write copy
|
||
6D2000
|
unkown
|
page execute and read and write
|
||
4BB0000
|
heap
|
page read and write
|
||
103E000
|
heap
|
page read and write
|
||
8BF000
|
unkown
|
page execute and read and write
|
||
11DF000
|
stack
|
page read and write
|
||
846000
|
unkown
|
page execute and write copy
|
||
98C000
|
unkown
|
page execute and write copy
|
||
723E000
|
stack
|
page read and write
|
||
4CD0000
|
trusted library allocation
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
885000
|
unkown
|
page execute and read and write
|
||
4BA0000
|
direct allocation
|
page read and write
|
||
433F000
|
stack
|
page read and write
|
||
4BA0000
|
direct allocation
|
page read and write
|
||
6025000
|
trusted library allocation
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
4FEF000
|
stack
|
page read and write
|
||
74FE000
|
stack
|
page read and write
|
||
71F0000
|
trusted library allocation
|
page read and write
|
||
8C5000
|
unkown
|
page execute and read and write
|
||
F70000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
46FF000
|
stack
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
1031000
|
heap
|
page read and write
|
||
90F000
|
unkown
|
page execute and read and write
|
||
86A000
|
unkown
|
page execute and write copy
|
||
12DF000
|
stack
|
page read and write
|
||
884000
|
unkown
|
page execute and write copy
|
||
4BA0000
|
direct allocation
|
page read and write
|
||
45BF000
|
stack
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
F77000
|
heap
|
page read and write
|
||
483F000
|
stack
|
page read and write
|
||
2BBC000
|
stack
|
page read and write
|
||
4BA0000
|
direct allocation
|
page read and write
|
||
3E3F000
|
stack
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
7200000
|
trusted library allocation
|
page read and write
|
||
FEA000
|
heap
|
page read and write
|
||
916000
|
unkown
|
page execute and write copy
|
There are 188 hidden memdumps, click here to show them.