Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
D7D000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
47AF000
|
stack
|
page read and write
|
||
4F1B000
|
trusted library allocation
|
page execute and read and write
|
||
5141000
|
trusted library allocation
|
page read and write
|
||
2C70000
|
direct allocation
|
page read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
11BE000
|
unkown
|
page execute and write copy
|
||
3EEF000
|
stack
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
48EF000
|
stack
|
page read and write
|
||
3A2E000
|
stack
|
page read and write
|
||
731E000
|
stack
|
page read and write
|
||
73F0000
|
heap
|
page execute and read and write
|
||
735E000
|
stack
|
page read and write
|
||
1150000
|
unkown
|
page execute and read and write
|
||
113D000
|
unkown
|
page execute and read and write
|
||
42EE000
|
stack
|
page read and write
|
||
452F000
|
stack
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
41AE000
|
stack
|
page read and write
|
||
109A000
|
unkown
|
page execute and read and write
|
||
1169000
|
unkown
|
page execute and write copy
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
11AE000
|
unkown
|
page execute and write copy
|
||
10CC000
|
unkown
|
page execute and write copy
|
||
33AF000
|
stack
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
10F8000
|
unkown
|
page execute and read and write
|
||
4EFE000
|
stack
|
page read and write
|
||
113C000
|
unkown
|
page execute and write copy
|
||
2EAF000
|
stack
|
page read and write
|
||
A3C000
|
stack
|
page read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
BEE000
|
stack
|
page read and write
|
||
115E000
|
unkown
|
page execute and write copy
|
||
43EF000
|
stack
|
page read and write
|
||
4D84000
|
trusted library allocation
|
page read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
F22000
|
unkown
|
page execute and write copy
|
||
116A000
|
unkown
|
page execute and read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
1134000
|
unkown
|
page execute and read and write
|
||
2FEF000
|
stack
|
page read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
10F7000
|
unkown
|
page execute and write copy
|
||
D2E000
|
stack
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
466F000
|
stack
|
page read and write
|
||
76FF000
|
stack
|
page read and write
|
||
4F7E000
|
stack
|
page read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
4D83000
|
trusted library allocation
|
page execute and read and write
|
||
39EF000
|
stack
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
D3A000
|
heap
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
10AE000
|
unkown
|
page execute and write copy
|
||
3C6F000
|
stack
|
page read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
F26000
|
unkown
|
page write copy
|
||
4F0A000
|
trusted library allocation
|
page execute and read and write
|
||
D75000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
F2A000
|
unkown
|
page execute and write copy
|
||
4C30000
|
heap
|
page read and write
|
||
6141000
|
trusted library allocation
|
page read and write
|
||
302E000
|
stack
|
page read and write
|
||
10E0000
|
unkown
|
page execute and write copy
|
||
456E000
|
stack
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
D73000
|
heap
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
B39000
|
stack
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
10EC000
|
unkown
|
page execute and read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4DFB000
|
stack
|
page read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
2CA7000
|
heap
|
page read and write
|
||
42AF000
|
stack
|
page read and write
|
||
4C50000
|
heap
|
page read and write
|
||
739E000
|
stack
|
page read and write
|
||
1161000
|
unkown
|
page execute and read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4FFC000
|
stack
|
page read and write
|
||
416F000
|
stack
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
6144000
|
trusted library allocation
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
1113000
|
unkown
|
page execute and write copy
|
||
D3E000
|
heap
|
page read and write
|
||
10CD000
|
unkown
|
page execute and read and write
|
||
11BE000
|
unkown
|
page execute and read and write
|
||
109D000
|
unkown
|
page execute and read and write
|
||
EF0000
|
heap
|
page read and write
|
||
2DAF000
|
stack
|
page read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
112F000
|
unkown
|
page execute and write copy
|
||
2C90000
|
direct allocation
|
page read and write
|
||
DA9000
|
heap
|
page read and write
|
||
6165000
|
trusted library allocation
|
page read and write
|
||
10B1000
|
unkown
|
page execute and read and write
|
||
4C51000
|
heap
|
page read and write
|
||
3B2F000
|
stack
|
page read and write
|
||
37AE000
|
stack
|
page read and write
|
||
C15000
|
heap
|
page read and write
|
||
11A8000
|
unkown
|
page execute and write copy
|
||
4D50000
|
trusted library allocation
|
page read and write
|
||
1132000
|
unkown
|
page execute and write copy
|
||
442E000
|
stack
|
page read and write
|
||
10A5000
|
unkown
|
page execute and write copy
|
||
2C6F000
|
stack
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page execute and read and write
|
||
F36000
|
unkown
|
page execute and write copy
|
||
2CA0000
|
heap
|
page read and write
|
||
1125000
|
unkown
|
page execute and write copy
|
||
10DA000
|
unkown
|
page execute and read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
1115000
|
unkown
|
page execute and read and write
|
||
4D70000
|
trusted library allocation
|
page read and write
|
||
1145000
|
unkown
|
page execute and write copy
|
||
4D94000
|
trusted library allocation
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
46AE000
|
stack
|
page read and write
|
||
1127000
|
unkown
|
page execute and read and write
|
||
72DD000
|
stack
|
page read and write
|
||
1083000
|
unkown
|
page execute and read and write
|
||
5030000
|
heap
|
page read and write
|
||
1116000
|
unkown
|
page execute and write copy
|
||
1131000
|
unkown
|
page execute and read and write
|
||
4C51000
|
heap
|
page read and write
|
||
114E000
|
unkown
|
page execute and write copy
|
||
75FE000
|
stack
|
page read and write
|
||
F2A000
|
unkown
|
page execute and read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
402F000
|
stack
|
page read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
F20000
|
unkown
|
page readonly
|
||
EAB000
|
stack
|
page read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
10C2000
|
unkown
|
page execute and write copy
|
||
326F000
|
stack
|
page read and write
|
||
4F30000
|
direct allocation
|
page execute and read and write
|
||
4F00000
|
direct allocation
|
page execute and read and write
|
||
362F000
|
stack
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
1085000
|
unkown
|
page execute and write copy
|
||
10D8000
|
unkown
|
page execute and write copy
|
||
D92000
|
heap
|
page read and write
|
||
47EE000
|
stack
|
page read and write
|
||
F20000
|
unkown
|
page read and write
|
||
111D000
|
unkown
|
page execute and read and write
|
||
109B000
|
unkown
|
page execute and write copy
|
||
3DEE000
|
stack
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
4C60000
|
heap
|
page read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
11AE000
|
unkown
|
page execute and write copy
|
||
10C3000
|
unkown
|
page execute and read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
4D8D000
|
trusted library allocation
|
page execute and read and write
|
||
4F17000
|
trusted library allocation
|
page execute and read and write
|
||
F26000
|
unkown
|
page write copy
|
||
10A5000
|
unkown
|
page execute and read and write
|
||
1146000
|
unkown
|
page execute and read and write
|
||
4C51000
|
heap
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
2C90000
|
direct allocation
|
page read and write
|
||
38EE000
|
stack
|
page read and write
|
||
F22000
|
unkown
|
page execute and read and write
|
||
4FB0000
|
heap
|
page execute and read and write
|
||
74FE000
|
stack
|
page read and write
|
There are 189 hidden memdumps, click here to show them.