Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
206000
|
unkown
|
page write copy
|
||
6F00000
|
heap
|
page execute and read and write
|
||
46B0000
|
direct allocation
|
page read and write
|
||
4990000
|
trusted library allocation
|
page read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
273E000
|
stack
|
page read and write
|
||
420F000
|
stack
|
page read and write
|
||
2CCF000
|
stack
|
page read and write
|
||
5BB5000
|
trusted library allocation
|
page read and write
|
||
46C1000
|
heap
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
46B0000
|
direct allocation
|
page read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
410E000
|
stack
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
4B2000
|
unkown
|
page execute and read and write
|
||
A4E000
|
stack
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
431000
|
unkown
|
page execute and read and write
|
||
A74000
|
heap
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
4B91000
|
trusted library allocation
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
4A50000
|
heap
|
page execute and read and write
|
||
3BCF000
|
stack
|
page read and write
|
||
6EEE000
|
stack
|
page read and write
|
||
5B94000
|
trusted library allocation
|
page read and write
|
||
6D2D000
|
stack
|
page read and write
|
||
4B8E000
|
stack
|
page read and write
|
||
3E9000
|
unkown
|
page execute and write copy
|
||
334E000
|
stack
|
page read and write
|
||
46D0000
|
heap
|
page read and write
|
||
36E000
|
unkown
|
page execute and write copy
|
||
4980000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
2F4F000
|
stack
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
3CF000
|
unkown
|
page execute and write copy
|
||
49C000
|
unkown
|
page execute and write copy
|
||
277E000
|
stack
|
page read and write
|
||
29CF000
|
stack
|
page read and write
|
||
46C1000
|
heap
|
page read and write
|
||
35CE000
|
stack
|
page read and write
|
||
3A8F000
|
stack
|
page read and write
|
||
4973000
|
trusted library allocation
|
page execute and read and write
|
||
3FA000
|
unkown
|
page execute and write copy
|
||
2F8E000
|
stack
|
page read and write
|
||
36CF000
|
stack
|
page read and write
|
||
3D7000
|
unkown
|
page execute and read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
46B0000
|
direct allocation
|
page read and write
|
||
424E000
|
stack
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
443000
|
unkown
|
page execute and read and write
|
||
216000
|
unkown
|
page execute and write copy
|
||
A74000
|
heap
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
4A70000
|
trusted library allocation
|
page read and write
|
||
46B0000
|
direct allocation
|
page read and write
|
||
496E000
|
stack
|
page read and write
|
||
4690000
|
direct allocation
|
page read and write
|
||
8F9000
|
stack
|
page read and write
|
||
4984000
|
trusted library allocation
|
page read and write
|
||
46B0000
|
direct allocation
|
page read and write
|
||
4820000
|
trusted library allocation
|
page read and write
|
||
3D4E000
|
stack
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
38F000
|
unkown
|
page execute and read and write
|
||
4A3000
|
unkown
|
page execute and write copy
|
||
3CA000
|
unkown
|
page execute and write copy
|
||
3EC000
|
unkown
|
page execute and read and write
|
||
3E8E000
|
stack
|
page read and write
|
||
3F8F000
|
stack
|
page read and write
|
||
3F9000
|
unkown
|
page execute and read and write
|
||
A74000
|
heap
|
page read and write
|
||
410000
|
unkown
|
page execute and write copy
|
||
3F6000
|
unkown
|
page execute and write copy
|
||
26FF000
|
stack
|
page read and write
|
||
5B91000
|
trusted library allocation
|
page read and write
|
||
54C000
|
stack
|
page read and write
|
||
46B0000
|
direct allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
36C000
|
unkown
|
page execute and read and write
|
||
49A7000
|
trusted library allocation
|
page execute and read and write
|
||
A74000
|
heap
|
page read and write
|
||
49A0000
|
trusted library allocation
|
page read and write
|
||
40CF000
|
stack
|
page read and write
|
||
344F000
|
stack
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
C6A000
|
heap
|
page read and write
|
||
202000
|
unkown
|
page execute and read and write
|
||
416000
|
unkown
|
page execute and read and write
|
||
4A4C000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
202000
|
unkown
|
page execute and write copy
|
||
417000
|
unkown
|
page execute and write copy
|
||
A74000
|
heap
|
page read and write
|
||
20A000
|
unkown
|
page execute and read and write
|
||
46C0000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
49C0000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
46B0000
|
direct allocation
|
page read and write
|
||
4974000
|
trusted library allocation
|
page read and write
|
||
46B0000
|
direct allocation
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
B7F000
|
stack
|
page read and write
|
||
46B0000
|
direct allocation
|
page read and write
|
||
4B4000
|
unkown
|
page execute and write copy
|
||
4A60000
|
trusted library allocation
|
page execute and read and write
|
||
C9F000
|
heap
|
page read and write
|
||
3E4F000
|
stack
|
page read and write
|
||
27C7000
|
heap
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
397000
|
unkown
|
page execute and write copy
|
||
6D6E000
|
stack
|
page read and write
|
||
46C1000
|
heap
|
page read and write
|
||
710F000
|
stack
|
page read and write
|
||
399000
|
unkown
|
page execute and read and write
|
||
CA9000
|
heap
|
page read and write
|
||
46B0000
|
direct allocation
|
page read and write
|
||
407000
|
unkown
|
page execute and read and write
|
||
4970000
|
direct allocation
|
page execute and read and write
|
||
42A000
|
unkown
|
page execute and write copy
|
||
46C1000
|
heap
|
page read and write
|
||
700E000
|
stack
|
page read and write
|
||
4A0E000
|
stack
|
page read and write
|
||
3FCE000
|
stack
|
page read and write
|
||
3D0F000
|
stack
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
C6E000
|
heap
|
page read and write
|
||
46B0000
|
direct allocation
|
page read and write
|
||
46B0000
|
direct allocation
|
page read and write
|
||
CBE000
|
heap
|
page read and write
|
||
394F000
|
stack
|
page read and write
|
||
46B0000
|
direct allocation
|
page read and write
|
||
434F000
|
stack
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
28CF000
|
stack
|
page read and write
|
||
6E6F000
|
stack
|
page read and write
|
||
49AB000
|
trusted library allocation
|
page execute and read and write
|
||
3C0E000
|
stack
|
page read and write
|
||
358F000
|
stack
|
page read and write
|
||
38E000
|
unkown
|
page execute and write copy
|
||
43A000
|
unkown
|
page execute and read and write
|
||
3CE000
|
unkown
|
page execute and read and write
|
||
C3E000
|
stack
|
page read and write
|
||
3AC000
|
unkown
|
page execute and write copy
|
||
4B2000
|
unkown
|
page execute and write copy
|
||
3ACE000
|
stack
|
page read and write
|
||
380F000
|
stack
|
page read and write
|
||
2E0F000
|
stack
|
page read and write
|
||
4B4000
|
unkown
|
page execute and write copy
|
||
4A3000
|
unkown
|
page execute and write copy
|
||
403000
|
unkown
|
page execute and write copy
|
||
49A0000
|
direct allocation
|
page execute and read and write
|
||
308F000
|
stack
|
page read and write
|
||
27BE000
|
stack
|
page read and write
|
||
46B0000
|
direct allocation
|
page read and write
|
||
486C000
|
stack
|
page read and write
|
||
BFC000
|
stack
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
384E000
|
stack
|
page read and write
|
||
3AD000
|
unkown
|
page execute and read and write
|
||
46C1000
|
heap
|
page read and write
|
||
4A80000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
6EAE000
|
stack
|
page read and write
|
||
497D000
|
trusted library allocation
|
page execute and read and write
|
||
206000
|
unkown
|
page write copy
|
||
A60000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
47F0000
|
heap
|
page read and write
|
||
419000
|
unkown
|
page execute and read and write
|
||
383000
|
unkown
|
page execute and read and write
|
||
20A000
|
unkown
|
page execute and write copy
|
||
5B0000
|
heap
|
page read and write
|
||
499A000
|
trusted library allocation
|
page execute and read and write
|
||
A74000
|
heap
|
page read and write
|
||
20A000
|
unkown
|
page execute and write copy
|
||
46C1000
|
heap
|
page read and write
|
||
398E000
|
stack
|
page read and write
|
||
43B000
|
unkown
|
page execute and write copy
|
||
370E000
|
stack
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
439000
|
unkown
|
page execute and write copy
|
||
348E000
|
stack
|
page read and write
|
||
47E0000
|
heap
|
page read and write
|
There are 188 hidden memdumps, click here to show them.