Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4C41000
|
heap
|
page read and write
|
||
F0000
|
unkown
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
318000
|
unkown
|
page execute and write copy
|
||
2AF7000
|
heap
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
43CE000
|
stack
|
page read and write
|
||
748E000
|
stack
|
page read and write
|
||
4C30000
|
direct allocation
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
EC3000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
2BFF000
|
stack
|
page read and write
|
||
4F4F000
|
stack
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
4DCB000
|
stack
|
page read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
30BF000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4DF0000
|
trusted library allocation
|
page read and write
|
||
4D73000
|
trusted library allocation
|
page execute and read and write
|
||
75CE000
|
stack
|
page read and write
|
||
279000
|
unkown
|
page execute and write copy
|
||
321000
|
unkown
|
page execute and read and write
|
||
381000
|
unkown
|
page execute and write copy
|
||
2D9000
|
unkown
|
page execute and write copy
|
||
4C40000
|
heap
|
page read and write
|
||
2CA000
|
unkown
|
page execute and read and write
|
||
AAC000
|
stack
|
page read and write
|
||
474F000
|
stack
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
E3A000
|
heap
|
page read and write
|
||
E3E000
|
heap
|
page read and write
|
||
E8E000
|
heap
|
page read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
E79000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
2F5000
|
unkown
|
page execute and write copy
|
||
4380000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
4D84000
|
trusted library allocation
|
page read and write
|
||
4C30000
|
direct allocation
|
page read and write
|
||
2E7E000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
44CF000
|
stack
|
page read and write
|
||
118F000
|
stack
|
page read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
F6000
|
unkown
|
page write copy
|
||
259000
|
unkown
|
page execute and read and write
|
||
3EBD000
|
stack
|
page read and write
|
||
F2000
|
unkown
|
page execute and read and write
|
||
61F5000
|
trusted library allocation
|
page read and write
|
||
4BF0000
|
direct allocation
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4D7D000
|
trusted library allocation
|
page execute and read and write
|
||
2A9000
|
unkown
|
page execute and write copy
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
3FBF000
|
stack
|
page read and write
|
||
26C000
|
unkown
|
page execute and read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
282000
|
unkown
|
page execute and write copy
|
||
3AFE000
|
stack
|
page read and write
|
||
387E000
|
stack
|
page read and write
|
||
50C0000
|
heap
|
page execute and read and write
|
||
347F000
|
stack
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
E71000
|
heap
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
39A000
|
unkown
|
page execute and write copy
|
||
4C41000
|
heap
|
page read and write
|
||
4E30000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page execute and read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
478E000
|
stack
|
page read and write
|
||
28D000
|
unkown
|
page execute and write copy
|
||
30FE000
|
stack
|
page read and write
|
||
2EE000
|
unkown
|
page execute and read and write
|
||
39A000
|
unkown
|
page execute and read and write
|
||
2FF000
|
unkown
|
page execute and write copy
|
||
4C50000
|
heap
|
page read and write
|
||
104000
|
unkown
|
page execute and write copy
|
||
3C3E000
|
stack
|
page read and write
|
||
4C30000
|
direct allocation
|
page read and write
|
||
38A000
|
unkown
|
page execute and write copy
|
||
BA9000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
333F000
|
stack
|
page read and write
|
||
4FE0000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page read and write
|
||
4C30000
|
direct allocation
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4E10000
|
trusted library allocation
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page read and write
|
||
740F000
|
stack
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
61D4000
|
trusted library allocation
|
page read and write
|
||
F2000
|
unkown
|
page execute and write copy
|
||
413E000
|
stack
|
page read and write
|
||
51CE000
|
stack
|
page read and write
|
||
4FCC000
|
stack
|
page read and write
|
||
302000
|
unkown
|
page execute and read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
40FF000
|
stack
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
4C30000
|
direct allocation
|
page read and write
|
||
E81000
|
heap
|
page read and write
|
||
423F000
|
stack
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
2AAE000
|
stack
|
page read and write
|
||
E6F000
|
heap
|
page read and write
|
||
294000
|
unkown
|
page execute and read and write
|
||
F6000
|
unkown
|
page write copy
|
||
4E40000
|
heap
|
page read and write
|
||
12CF000
|
stack
|
page read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
4C30000
|
direct allocation
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
F0000
|
unkown
|
page readonly
|
||
38A000
|
unkown
|
page execute and write copy
|
||
337E000
|
stack
|
page read and write
|
||
314000
|
unkown
|
page execute and write copy
|
||
2E2000
|
unkown
|
page execute and read and write
|
||
279000
|
unkown
|
page execute and read and write
|
||
25C000
|
unkown
|
page execute and write copy
|
||
488F000
|
stack
|
page read and write
|
||
4DE0000
|
direct allocation
|
page execute and read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
383000
|
unkown
|
page execute and write copy
|
||
F8E000
|
stack
|
page read and write
|
||
450E000
|
stack
|
page read and write
|
||
744E000
|
stack
|
page read and write
|
||
730E000
|
stack
|
page read and write
|
||
FA000
|
unkown
|
page execute and read and write
|
||
3D3F000
|
stack
|
page read and write
|
||
FA000
|
unkown
|
page execute and write copy
|
||
317000
|
unkown
|
page execute and read and write
|
||
397F000
|
stack
|
page read and write
|
||
2E9000
|
unkown
|
page execute and write copy
|
||
4D74000
|
trusted library allocation
|
page read and write
|
||
30E000
|
unkown
|
page execute and read and write
|
||
4C30000
|
direct allocation
|
page read and write
|
||
2BB000
|
unkown
|
page execute and read and write
|
||
2AEC000
|
stack
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
4C30000
|
direct allocation
|
page read and write
|
||
4C30000
|
direct allocation
|
page read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4D40000
|
trusted library allocation
|
page read and write
|
||
4F8E000
|
stack
|
page read and write
|
||
4C30000
|
direct allocation
|
page read and write
|
||
284000
|
unkown
|
page execute and read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
74C0000
|
heap
|
page execute and read and write
|
||
2C6000
|
unkown
|
page execute and write copy
|
||
382000
|
unkown
|
page execute and read and write
|
||
279000
|
unkown
|
page execute and write copy
|
||
76CE000
|
stack
|
page read and write
|
||
427E000
|
stack
|
page read and write
|
||
105000
|
unkown
|
page execute and read and write
|
||
309000
|
unkown
|
page execute and write copy
|
||
4DFB000
|
trusted library allocation
|
page execute and read and write
|
||
FB5000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page read and write
|
||
2F7000
|
unkown
|
page execute and read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
72CD000
|
stack
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
51D1000
|
trusted library allocation
|
page read and write
|
||
4DEA000
|
trusted library allocation
|
page execute and read and write
|
||
FA000
|
unkown
|
page execute and write copy
|
||
4DF7000
|
trusted library allocation
|
page execute and read and write
|
||
464E000
|
stack
|
page read and write
|
||
106000
|
unkown
|
page execute and write copy
|
||
39BE000
|
stack
|
page read and write
|
||
61D1000
|
trusted library allocation
|
page read and write
|
||
460F000
|
stack
|
page read and write
|
There are 182 hidden memdumps, click here to show them.