Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
396F000
|
stack
|
page read and write
|
||
28F0000
|
direct allocation
|
page read and write
|
||
A4A000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
10FD000
|
unkown
|
page execute and read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
F06000
|
unkown
|
page execute and write copy
|
||
9F4000
|
heap
|
page read and write
|
||
1064000
|
unkown
|
page execute and write copy
|
||
4A30000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
4AD3000
|
trusted library allocation
|
page execute and read and write
|
||
332F000
|
stack
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
10CF000
|
unkown
|
page execute and write copy
|
||
6FDE000
|
stack
|
page read and write
|
||
1113000
|
unkown
|
page execute and write copy
|
||
1102000
|
unkown
|
page execute and read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
28EF000
|
stack
|
page read and write
|
||
AA2000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
1072000
|
unkown
|
page execute and read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
2CEF000
|
stack
|
page read and write
|
||
4A30000
|
trusted library allocation
|
page read and write
|
||
4A70000
|
trusted library allocation
|
page read and write
|
||
EF2000
|
unkown
|
page execute and write copy
|
||
70DE000
|
stack
|
page read and write
|
||
4B7E000
|
stack
|
page read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
EF0000
|
unkown
|
page read and write
|
||
EFA000
|
unkown
|
page execute and write copy
|
||
2910000
|
direct allocation
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
10B9000
|
unkown
|
page execute and write copy
|
||
C3E000
|
stack
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
EFA000
|
unkown
|
page execute and read and write
|
||
9F4000
|
heap
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
1121000
|
unkown
|
page execute and write copy
|
||
10D6000
|
unkown
|
page execute and read and write
|
||
9F4000
|
heap
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
6E8C000
|
stack
|
page read and write
|
||
4930000
|
heap
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
4B0B000
|
trusted library allocation
|
page execute and read and write
|
||
1148000
|
unkown
|
page execute and write copy
|
||
2910000
|
direct allocation
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
10EE000
|
unkown
|
page execute and write copy
|
||
1099000
|
unkown
|
page execute and read and write
|
||
4AE4000
|
trusted library allocation
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
4D40000
|
heap
|
page execute and read and write
|
||
110A000
|
unkown
|
page execute and write copy
|
||
426E000
|
stack
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
4AD4000
|
trusted library allocation
|
page read and write
|
||
4E4E000
|
stack
|
page read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
110C000
|
unkown
|
page execute and read and write
|
||
118A000
|
unkown
|
page execute and write copy
|
||
3E6F000
|
stack
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
1198000
|
unkown
|
page execute and write copy
|
||
111A000
|
unkown
|
page execute and read and write
|
||
580000
|
heap
|
page read and write
|
||
112B000
|
unkown
|
page execute and write copy
|
||
4C9F000
|
stack
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
A85000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
4ADD000
|
trusted library allocation
|
page execute and read and write
|
||
2927000
|
heap
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
5E51000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page execute and read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
ACD000
|
heap
|
page read and write
|
||
422F000
|
stack
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
738E000
|
stack
|
page read and write
|
||
119A000
|
unkown
|
page execute and write copy
|
||
382F000
|
stack
|
page read and write
|
||
EF6000
|
unkown
|
page write copy
|
||
4B80000
|
trusted library allocation
|
page execute and read and write
|
||
45EF000
|
stack
|
page read and write
|
||
6F8D000
|
stack
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
EF6000
|
unkown
|
page write copy
|
||
715E000
|
stack
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
8F9000
|
stack
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
10FE000
|
unkown
|
page execute and write copy
|
||
9E0000
|
heap
|
page read and write
|
||
50C000
|
stack
|
page read and write
|
||
27EE000
|
stack
|
page read and write
|
||
1182000
|
unkown
|
page execute and write copy
|
||
4B00000
|
direct allocation
|
page execute and read and write
|
||
10C3000
|
unkown
|
page execute and read and write
|
||
4931000
|
heap
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
EF0000
|
unkown
|
page readonly
|
||
2AAE000
|
stack
|
page read and write
|
||
30AF000
|
stack
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
2A6F000
|
stack
|
page read and write
|
||
412E000
|
stack
|
page read and write
|
||
114A000
|
unkown
|
page execute and read and write
|
||
9F4000
|
heap
|
page read and write
|
||
5E75000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
A83000
|
heap
|
page read and write
|
||
107D000
|
unkown
|
page execute and read and write
|
||
1062000
|
unkown
|
page execute and read and write
|
||
43AE000
|
stack
|
page read and write
|
||
1095000
|
unkown
|
page execute and write copy
|
||
570000
|
heap
|
page read and write
|
||
118A000
|
unkown
|
page execute and write copy
|
||
A95000
|
heap
|
page read and write
|
||
10C6000
|
unkown
|
page execute and read and write
|
||
D3F000
|
stack
|
page read and write
|
||
1123000
|
unkown
|
page execute and read and write
|
||
10F5000
|
unkown
|
page execute and write copy
|
||
4AE0000
|
trusted library allocation
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
2E2F000
|
stack
|
page read and write
|
||
1094000
|
unkown
|
page execute and read and write
|
||
9F4000
|
heap
|
page read and write
|
||
7180000
|
heap
|
page execute and read and write
|
||
4931000
|
heap
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
10F4000
|
unkown
|
page execute and read and write
|
||
4B07000
|
trusted library allocation
|
page execute and read and write
|
||
4E51000
|
trusted library allocation
|
page read and write
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
A8D000
|
heap
|
page read and write
|
||
4AFA000
|
trusted library allocation
|
page execute and read and write
|
||
9F4000
|
heap
|
page read and write
|
||
4ABC000
|
stack
|
page read and write
|
||
4B00000
|
trusted library allocation
|
page read and write
|
||
1198000
|
unkown
|
page execute and read and write
|
||
31EF000
|
stack
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
44AF000
|
stack
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
711E000
|
stack
|
page read and write
|
||
EF2000
|
unkown
|
page execute and read and write
|
||
119A000
|
unkown
|
page execute and write copy
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
1112000
|
unkown
|
page execute and read and write
|
||
296C000
|
stack
|
page read and write
|
||
4B30000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
A3E000
|
stack
|
page read and write
|
||
112D000
|
unkown
|
page execute and read and write
|
||
9F4000
|
heap
|
page read and write
|
||
110D000
|
unkown
|
page execute and write copy
|
||
4931000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
107D000
|
unkown
|
page execute and write copy
|
||
10C4000
|
unkown
|
page execute and write copy
|
||
372E000
|
stack
|
page read and write
|
||
2BAF000
|
stack
|
page read and write
|
||
728E000
|
stack
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
4941000
|
heap
|
page read and write
|
||
4B20000
|
trusted library allocation
|
page read and write
|
||
1093000
|
unkown
|
page execute and write copy
|
There are 191 hidden memdumps, click here to show them.