Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
432F000
|
stack
|
page read and write
|
||
66F5000
|
trusted library allocation
|
page read and write
|
||
482F000
|
stack
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
3BEE000
|
stack
|
page read and write
|
||
3DE000
|
unkown
|
page execute and write copy
|
||
51F0000
|
direct allocation
|
page read and write
|
||
49AE000
|
stack
|
page read and write
|
||
53AA000
|
trusted library allocation
|
page execute and read and write
|
||
47A000
|
unkown
|
page execute and read and write
|
||
471000
|
unkown
|
page execute and read and write
|
||
516000
|
unkown
|
page execute and write copy
|
||
3E6E000
|
stack
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
44E000
|
unkown
|
page execute and write copy
|
||
5201000
|
heap
|
page read and write
|
||
5590000
|
trusted library allocation
|
page read and write
|
||
5201000
|
heap
|
page read and write
|
||
53A0000
|
trusted library allocation
|
page read and write
|
||
36AF000
|
stack
|
page read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
5201000
|
heap
|
page read and write
|
||
496F000
|
stack
|
page read and write
|
||
266000
|
unkown
|
page write copy
|
||
66D1000
|
trusted library allocation
|
page read and write
|
||
40EE000
|
stack
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
4FF000
|
unkown
|
page execute and write copy
|
||
51F0000
|
direct allocation
|
page read and write
|
||
478000
|
unkown
|
page execute and write copy
|
||
3E2F000
|
stack
|
page read and write
|
||
262000
|
unkown
|
page execute and write copy
|
||
13D0000
|
heap
|
page read and write
|
||
151E000
|
stack
|
page read and write
|
||
40AF000
|
stack
|
page read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
4AAF000
|
stack
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
3CEF000
|
stack
|
page read and write
|
||
26A000
|
unkown
|
page execute and write copy
|
||
506000
|
unkown
|
page execute and write copy
|
||
51F0000
|
direct allocation
|
page read and write
|
||
3DB000
|
unkown
|
page execute and read and write
|
||
492000
|
unkown
|
page execute and read and write
|
||
47D000
|
unkown
|
page execute and read and write
|
||
4AEE000
|
stack
|
page read and write
|
||
450000
|
unkown
|
page execute and read and write
|
||
446F000
|
stack
|
page read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
186E000
|
stack
|
page read and write
|
||
488000
|
unkown
|
page execute and write copy
|
||
514000
|
unkown
|
page execute and write copy
|
||
1679000
|
heap
|
page read and write
|
||
5201000
|
heap
|
page read and write
|
||
260000
|
unkown
|
page readonly
|
||
48B000
|
unkown
|
page execute and write copy
|
||
37EF000
|
stack
|
page read and write
|
||
53BB000
|
trusted library allocation
|
page execute and read and write
|
||
4BEF000
|
stack
|
page read and write
|
||
5201000
|
heap
|
page read and write
|
||
7B2E000
|
stack
|
page read and write
|
||
41D000
|
unkown
|
page execute and read and write
|
||
554E000
|
stack
|
page read and write
|
||
53B7000
|
trusted library allocation
|
page execute and read and write
|
||
30AE000
|
stack
|
page read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
51D0000
|
heap
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
5334000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
heap
|
page execute and read and write
|
||
36EE000
|
stack
|
page read and write
|
||
41EF000
|
stack
|
page read and write
|
||
5350000
|
direct allocation
|
page read and write
|
||
49B000
|
unkown
|
page execute and write copy
|
||
400000
|
unkown
|
page execute and write copy
|
||
5333000
|
trusted library allocation
|
page execute and read and write
|
||
5201000
|
heap
|
page read and write
|
||
5201000
|
heap
|
page read and write
|
||
31AF000
|
stack
|
page read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
402000
|
unkown
|
page execute and write copy
|
||
276000
|
unkown
|
page execute and write copy
|
||
51F0000
|
direct allocation
|
page read and write
|
||
5440000
|
heap
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
79AF000
|
stack
|
page read and write
|
||
4A7000
|
unkown
|
page execute and read and write
|
||
176E000
|
stack
|
page read and write
|
||
44AE000
|
stack
|
page read and write
|
||
5201000
|
heap
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
5210000
|
heap
|
page read and write
|
||
1525000
|
heap
|
page read and write
|
||
51B0000
|
direct allocation
|
page read and write
|
||
5200000
|
heap
|
page read and write
|
||
3067000
|
heap
|
page read and write
|
||
468000
|
unkown
|
page execute and write copy
|
||
506000
|
unkown
|
page execute and write copy
|
||
451000
|
unkown
|
page execute and write copy
|
||
53A0000
|
direct allocation
|
page execute and read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
14B0000
|
heap
|
page read and write
|
||
4A6000
|
unkown
|
page execute and write copy
|
||
31EB000
|
stack
|
page read and write
|
||
46D000
|
unkown
|
page execute and write copy
|
||
32EF000
|
stack
|
page read and write
|
||
538B000
|
stack
|
page read and write
|
||
7AEE000
|
stack
|
page read and write
|
||
55C0000
|
heap
|
page execute and read and write
|
||
266000
|
unkown
|
page write copy
|
||
5201000
|
heap
|
page read and write
|
||
516000
|
unkown
|
page execute and write copy
|
||
5344000
|
trusted library allocation
|
page read and write
|
||
41B000
|
unkown
|
page execute and write copy
|
||
66D4000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
5201000
|
heap
|
page read and write
|
||
4E6F000
|
stack
|
page read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
514000
|
unkown
|
page execute and read and write
|
||
26A000
|
unkown
|
page execute and read and write
|
||
45AF000
|
stack
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
4D2F000
|
stack
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
5350000
|
direct allocation
|
page read and write
|
||
53E0000
|
heap
|
page read and write
|
||
126C000
|
stack
|
page read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
346E000
|
stack
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
5201000
|
heap
|
page read and write
|
||
5430000
|
trusted library allocation
|
page execute and read and write
|
||
392F000
|
stack
|
page read and write
|
||
1369000
|
stack
|
page read and write
|
||
49E000
|
unkown
|
page execute and read and write
|
||
542E000
|
stack
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
56CF000
|
stack
|
page read and write
|
||
45EE000
|
stack
|
page read and write
|
||
3F4000
|
unkown
|
page execute and read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
16BE000
|
heap
|
page read and write
|
||
48A000
|
unkown
|
page execute and read and write
|
||
46EF000
|
stack
|
page read and write
|
||
5340000
|
trusted library allocation
|
page read and write
|
||
4C2E000
|
stack
|
page read and write
|
||
453000
|
unkown
|
page execute and read and write
|
||
5201000
|
heap
|
page read and write
|
||
47B000
|
unkown
|
page execute and write copy
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
342F000
|
stack
|
page read and write
|
||
4D6E000
|
stack
|
page read and write
|
||
163A000
|
heap
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
786D000
|
stack
|
page read and write
|
||
444000
|
unkown
|
page execute and read and write
|
||
5350000
|
direct allocation
|
page read and write
|
||
5201000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
166E000
|
heap
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
26A000
|
unkown
|
page execute and write copy
|
||
3AAE000
|
stack
|
page read and write
|
||
558C000
|
stack
|
page read and write
|
||
16C0000
|
heap
|
page read and write
|
||
5201000
|
heap
|
page read and write
|
||
262000
|
unkown
|
page execute and read and write
|
||
167F000
|
heap
|
page read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
533D000
|
trusted library allocation
|
page execute and read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
163E000
|
heap
|
page read and write
|
||
5201000
|
heap
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
79EE000
|
stack
|
page read and write
|
||
396E000
|
stack
|
page read and write
|
||
78AE000
|
stack
|
page read and write
|
||
438000
|
unkown
|
page execute and write copy
|
||
486E000
|
stack
|
page read and write
|
||
7C2E000
|
stack
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
162F000
|
stack
|
page read and write
|
||
168D000
|
heap
|
page read and write
|
||
46C000
|
unkown
|
page execute and read and write
|
||
5201000
|
heap
|
page read and write
|
There are 183 hidden memdumps, click here to show them.