Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
E33000
|
unkown
|
page execute and write copy
|
||
37AE000
|
stack
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
CA2000
|
unkown
|
page execute and write copy
|
||
5001000
|
heap
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
5001000
|
heap
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
366E000
|
stack
|
page read and write
|
||
5001000
|
heap
|
page read and write
|
||
768E000
|
stack
|
page read and write
|
||
64B4000
|
trusted library allocation
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
E5E000
|
unkown
|
page execute and read and write
|
||
4B6F000
|
stack
|
page read and write
|
||
3B2F000
|
stack
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
E9C000
|
unkown
|
page execute and write copy
|
||
5001000
|
heap
|
page read and write
|
||
E67000
|
unkown
|
page execute and write copy
|
||
7A4E000
|
stack
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
E71000
|
unkown
|
page execute and read and write
|
||
E93000
|
unkown
|
page execute and read and write
|
||
CA6000
|
unkown
|
page write copy
|
||
CAA000
|
unkown
|
page execute and write copy
|
||
442E000
|
stack
|
page read and write
|
||
F9E000
|
stack
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
39EF000
|
stack
|
page read and write
|
||
151F000
|
heap
|
page read and write
|
||
5001000
|
heap
|
page read and write
|
||
14CF000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
5000000
|
heap
|
page read and write
|
||
4A2F000
|
stack
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
E2C000
|
unkown
|
page execute and read and write
|
||
14CD000
|
heap
|
page read and write
|
||
5001000
|
heap
|
page read and write
|
||
EEA000
|
unkown
|
page execute and write copy
|
||
778E000
|
stack
|
page read and write
|
||
EEB000
|
unkown
|
page execute and read and write
|
||
5001000
|
heap
|
page read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
402F000
|
stack
|
page read and write
|
||
3A2E000
|
stack
|
page read and write
|
||
CAA000
|
unkown
|
page execute and read and write
|
||
E92000
|
unkown
|
page execute and write copy
|
||
52BA000
|
trusted library allocation
|
page execute and read and write
|
||
149A000
|
heap
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
CA2000
|
unkown
|
page execute and read and write
|
||
5001000
|
heap
|
page read and write
|
||
EAE000
|
unkown
|
page execute and read and write
|
||
52CB000
|
trusted library allocation
|
page execute and read and write
|
||
E2C000
|
unkown
|
page execute and write copy
|
||
178E000
|
stack
|
page read and write
|
||
E30000
|
unkown
|
page execute and write copy
|
||
FF0000
|
heap
|
page read and write
|
||
519B000
|
stack
|
page read and write
|
||
5140000
|
trusted library allocation
|
page read and write
|
||
149E000
|
heap
|
page read and write
|
||
ED7000
|
unkown
|
page execute and write copy
|
||
ECE000
|
unkown
|
page execute and write copy
|
||
46AE000
|
stack
|
page read and write
|
||
E7B000
|
unkown
|
page execute and write copy
|
||
13E0000
|
heap
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
E5D000
|
unkown
|
page execute and write copy
|
||
5330000
|
heap
|
page read and write
|
||
5001000
|
heap
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
EB7000
|
unkown
|
page execute and write copy
|
||
F50000
|
unkown
|
page execute and read and write
|
||
F52000
|
unkown
|
page execute and write copy
|
||
362F000
|
stack
|
page read and write
|
||
F41000
|
unkown
|
page execute and write copy
|
||
C20000
|
heap
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
F52000
|
unkown
|
page execute and write copy
|
||
5120000
|
trusted library allocation
|
page read and write
|
||
794E000
|
stack
|
page read and write
|
||
466F000
|
stack
|
page read and write
|
||
CB6000
|
unkown
|
page execute and write copy
|
||
5134000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
heap
|
page execute and read and write
|
||
EC6000
|
unkown
|
page execute and write copy
|
||
1490000
|
heap
|
page read and write
|
||
547C000
|
stack
|
page read and write
|
||
529E000
|
stack
|
page read and write
|
||
ECD000
|
unkown
|
page execute and read and write
|
||
48EF000
|
stack
|
page read and write
|
||
E20000
|
unkown
|
page execute and read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
5480000
|
trusted library allocation
|
page execute and read and write
|
||
5160000
|
direct allocation
|
page read and write
|
||
C8E000
|
stack
|
page read and write
|
||
780E000
|
stack
|
page read and write
|
||
52C7000
|
trusted library allocation
|
page execute and read and write
|
||
42AF000
|
stack
|
page read and write
|
||
5133000
|
trusted library allocation
|
page execute and read and write
|
||
14EC000
|
heap
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
5160000
|
direct allocation
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
E0E000
|
unkown
|
page execute and write copy
|
||
5100000
|
trusted library allocation
|
page read and write
|
||
416F000
|
stack
|
page read and write
|
||
64B1000
|
trusted library allocation
|
page read and write
|
||
EA3000
|
unkown
|
page execute and write copy
|
||
43EF000
|
stack
|
page read and write
|
||
5001000
|
heap
|
page read and write
|
||
5001000
|
heap
|
page read and write
|
||
764D000
|
stack
|
page read and write
|
||
14DF000
|
heap
|
page read and write
|
||
142B000
|
stack
|
page read and write
|
||
5010000
|
heap
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
5001000
|
heap
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
13E5000
|
heap
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
5001000
|
heap
|
page read and write
|
||
352F000
|
stack
|
page read and write
|
||
5150000
|
heap
|
page read and write
|
||
52E0000
|
trusted library allocation
|
page read and write
|
||
5144000
|
trusted library allocation
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
E9E000
|
unkown
|
page execute and read and write
|
||
EA2000
|
unkown
|
page execute and read and write
|
||
4CAF000
|
stack
|
page read and write
|
||
543E000
|
stack
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
1480000
|
direct allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
CA6000
|
unkown
|
page write copy
|
||
E7F000
|
unkown
|
page execute and read and write
|
||
5160000
|
direct allocation
|
page read and write
|
||
790E000
|
stack
|
page read and write
|
||
E36000
|
unkown
|
page execute and read and write
|
||
5001000
|
heap
|
page read and write
|
||
E32000
|
unkown
|
page execute and read and write
|
||
146E000
|
stack
|
page read and write
|
||
7650000
|
trusted library allocation
|
page read and write
|
||
47AF000
|
stack
|
page read and write
|
||
4A6E000
|
stack
|
page read and write
|
||
3EEF000
|
stack
|
page read and write
|
||
532E000
|
stack
|
page read and write
|
||
41AE000
|
stack
|
page read and write
|
||
42EE000
|
stack
|
page read and write
|
||
E9F000
|
unkown
|
page execute and write copy
|
||
513D000
|
trusted library allocation
|
page execute and read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
CA0000
|
unkown
|
page readonly
|
||
5001000
|
heap
|
page read and write
|
||
F39000
|
unkown
|
page execute and write copy
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
492E000
|
stack
|
page read and write
|
||
5001000
|
heap
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
64D5000
|
trusted library allocation
|
page read and write
|
||
E7C000
|
unkown
|
page execute and read and write
|
||
EDA000
|
unkown
|
page execute and read and write
|
||
CA0000
|
unkown
|
page read and write
|
||
E7D000
|
unkown
|
page execute and write copy
|
||
52C0000
|
trusted library allocation
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
5001000
|
heap
|
page read and write
|
||
168F000
|
stack
|
page read and write
|
||
77C0000
|
heap
|
page execute and read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
F41000
|
unkown
|
page execute and write copy
|
||
38EE000
|
stack
|
page read and write
|
||
5001000
|
heap
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
EA8000
|
unkown
|
page execute and read and write
|
||
12F9000
|
stack
|
page read and write
|
||
E0C000
|
unkown
|
page execute and read and write
|
||
EBB000
|
unkown
|
page execute and read and write
|
||
BAC000
|
stack
|
page read and write
|
||
3027000
|
heap
|
page read and write
|
||
452F000
|
stack
|
page read and write
|
||
EA9000
|
unkown
|
page execute and write copy
|
||
47EE000
|
stack
|
page read and write
|
||
F50000
|
unkown
|
page execute and write copy
|
||
ECF000
|
unkown
|
page execute and read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
There are 190 hidden memdumps, click here to show them.