Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
DC1000
|
unkown
|
page execute and write copy
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
B86000
|
unkown
|
page write copy
|
||
313E000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
E4C000
|
unkown
|
page execute and write copy
|
||
71DE000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
740E000
|
stack
|
page read and write
|
||
E8A000
|
heap
|
page read and write
|
||
3B3E000
|
stack
|
page read and write
|
||
4C50000
|
trusted library allocation
|
page read and write
|
||
4B23000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
467E000
|
stack
|
page read and write
|
||
453E000
|
stack
|
page read and write
|
||
E4A000
|
unkown
|
page execute and write copy
|
||
2A9F000
|
stack
|
page read and write
|
||
D28000
|
unkown
|
page execute and write copy
|
||
427F000
|
stack
|
page read and write
|
||
7200000
|
heap
|
page execute and read and write
|
||
337F000
|
stack
|
page read and write
|
||
B82000
|
unkown
|
page execute and write copy
|
||
4DCA000
|
trusted library allocation
|
page execute and read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
4C60000
|
direct allocation
|
page read and write
|
||
DE7000
|
unkown
|
page execute and write copy
|
||
4B11000
|
heap
|
page read and write
|
||
EDD000
|
heap
|
page read and write
|
||
6AC000
|
stack
|
page read and write
|
||
4C10000
|
trusted library allocation
|
page read and write
|
||
3EFE000
|
stack
|
page read and write
|
||
4D9E000
|
stack
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
463F000
|
stack
|
page read and write
|
||
DD3000
|
unkown
|
page execute and write copy
|
||
417E000
|
stack
|
page read and write
|
||
4C4D000
|
trusted library allocation
|
page execute and read and write
|
||
E32000
|
unkown
|
page execute and write copy
|
||
34BF000
|
stack
|
page read and write
|
||
4FB0000
|
trusted library allocation
|
page read and write
|
||
4E10000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
DB6000
|
unkown
|
page execute and read and write
|
||
D9C000
|
unkown
|
page execute and write copy
|
||
B86000
|
unkown
|
page write copy
|
||
4E00000
|
trusted library allocation
|
page execute and read and write
|
||
299E000
|
stack
|
page read and write
|
||
DD2000
|
unkown
|
page execute and read and write
|
||
4B11000
|
heap
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
35FF000
|
stack
|
page read and write
|
||
D2A000
|
unkown
|
page execute and write copy
|
||
B80000
|
unkown
|
page readonly
|
||
43BF000
|
stack
|
page read and write
|
||
7A9000
|
stack
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
DF8000
|
unkown
|
page execute and read and write
|
||
B8A000
|
unkown
|
page execute and read and write
|
||
39FE000
|
stack
|
page read and write
|
||
DB2000
|
unkown
|
page execute and write copy
|
||
E27000
|
unkown
|
page execute and write copy
|
||
38BE000
|
stack
|
page read and write
|
||
D3B000
|
unkown
|
page execute and write copy
|
||
D7C000
|
unkown
|
page execute and write copy
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
D5B000
|
unkown
|
page execute and read and write
|
||
2FBF000
|
stack
|
page read and write
|
||
AF5000
|
heap
|
page read and write
|
||
CFF000
|
unkown
|
page execute and read and write
|
||
E34000
|
unkown
|
page execute and write copy
|
||
730E000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
11BF000
|
stack
|
page read and write
|
||
B80000
|
unkown
|
page read and write
|
||
43FE000
|
stack
|
page read and write
|
||
D3C000
|
unkown
|
page execute and read and write
|
||
4C30000
|
trusted library allocation
|
page read and write
|
||
D95000
|
unkown
|
page execute and read and write
|
||
4DDB000
|
trusted library allocation
|
page execute and read and write
|
||
4B11000
|
heap
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
DC5000
|
unkown
|
page execute and write copy
|
||
D01000
|
unkown
|
page execute and write copy
|
||
2FFE000
|
stack
|
page read and write
|
||
4DC0000
|
direct allocation
|
page execute and read and write
|
||
D5A000
|
unkown
|
page execute and write copy
|
||
E4C000
|
unkown
|
page execute and write copy
|
||
D1D000
|
unkown
|
page execute and write copy
|
||
4DB0000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
E8E000
|
heap
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
4F9C000
|
stack
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
107F000
|
stack
|
page read and write
|
||
39BF000
|
stack
|
page read and write
|
||
744E000
|
stack
|
page read and write
|
||
5001000
|
trusted library allocation
|
page read and write
|
||
6004000
|
trusted library allocation
|
page read and write
|
||
D6B000
|
unkown
|
page execute and read and write
|
||
B96000
|
unkown
|
page execute and write copy
|
||
ED1000
|
heap
|
page read and write
|
||
DC2000
|
unkown
|
page execute and read and write
|
||
D44000
|
unkown
|
page execute and read and write
|
||
4FEE000
|
stack
|
page read and write
|
||
DC3000
|
unkown
|
page execute and write copy
|
||
377E000
|
stack
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
E3B000
|
unkown
|
page execute and write copy
|
||
DC4000
|
unkown
|
page execute and read and write
|
||
4B11000
|
heap
|
page read and write
|
||
D3E000
|
unkown
|
page execute and write copy
|
||
E3B000
|
unkown
|
page execute and write copy
|
||
DE9000
|
unkown
|
page execute and read and write
|
||
44FF000
|
stack
|
page read and write
|
||
4B30000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
D62000
|
unkown
|
page execute and write copy
|
||
4C60000
|
direct allocation
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
387F000
|
stack
|
page read and write
|
||
4E5E000
|
stack
|
page read and write
|
||
4DF0000
|
direct allocation
|
page execute and read and write
|
||
DCF000
|
unkown
|
page execute and write copy
|
||
4C54000
|
trusted library allocation
|
page read and write
|
||
6025000
|
trusted library allocation
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
B8A000
|
unkown
|
page execute and write copy
|
||
4DD7000
|
trusted library allocation
|
page execute and read and write
|
||
4AC0000
|
direct allocation
|
page read and write
|
||
403E000
|
stack
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
EC9000
|
heap
|
page read and write
|
||
D7F000
|
unkown
|
page execute and read and write
|
||
3C7E000
|
stack
|
page read and write
|
||
B82000
|
unkown
|
page execute and read and write
|
||
4C44000
|
trusted library allocation
|
page read and write
|
||
D31000
|
unkown
|
page execute and read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
3EBF000
|
stack
|
page read and write
|
||
DA3000
|
unkown
|
page execute and read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
4B10000
|
heap
|
page read and write
|
||
4C43000
|
trusted library allocation
|
page execute and read and write
|
||
F0E000
|
heap
|
page read and write
|
||
3FFF000
|
stack
|
page read and write
|
||
D8C000
|
unkown
|
page execute and write copy
|
||
4DF0000
|
trusted library allocation
|
page read and write
|
||
6001000
|
trusted library allocation
|
page read and write
|
||
2B37000
|
heap
|
page read and write
|
||
3D7F000
|
stack
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
E29000
|
unkown
|
page execute and read and write
|
||
4FF0000
|
heap
|
page execute and read and write
|
||
327E000
|
stack
|
page read and write
|
||
719D000
|
stack
|
page read and write
|
||
DD6000
|
unkown
|
page execute and read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
DCE000
|
unkown
|
page execute and read and write
|
||
4F5E000
|
stack
|
page read and write
|
||
4C60000
|
direct allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
DC9000
|
unkown
|
page execute and read and write
|
||
4B11000
|
heap
|
page read and write
|
||
D20000
|
unkown
|
page execute and read and write
|
||
754F000
|
stack
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
3AFF000
|
stack
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
D2E000
|
unkown
|
page execute and write copy
|
||
42BE000
|
stack
|
page read and write
|
||
413F000
|
stack
|
page read and write
|
||
3DBE000
|
stack
|
page read and write
|
||
2ADC000
|
stack
|
page read and write
|
||
4C9C000
|
stack
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
DF7000
|
unkown
|
page execute and write copy
|
||
4B11000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
E4A000
|
unkown
|
page execute and read and write
|
||
DCA000
|
unkown
|
page execute and write copy
|
||
3C3F000
|
stack
|
page read and write
|
||
D1C000
|
unkown
|
page execute and read and write
|
||
2D3F000
|
stack
|
page read and write
|
||
D2A000
|
unkown
|
page execute and read and write
|
||
477F000
|
stack
|
page read and write
|
||
E33000
|
unkown
|
page execute and read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
10BE000
|
stack
|
page read and write
|
||
EBE000
|
heap
|
page read and write
|
There are 198 hidden memdumps, click here to show them.