Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
350F000
|
stack
|
page read and write
|
||
5430000
|
heap
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
534E000
|
stack
|
page read and write
|
||
E62000
|
unkown
|
page execute and write copy
|
||
3DCF000
|
stack
|
page read and write
|
||
1434000
|
heap
|
page read and write
|
||
2FE0000
|
direct allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
1434000
|
heap
|
page read and write
|
||
76DE000
|
stack
|
page read and write
|
||
792E000
|
stack
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
4B8F000
|
stack
|
page read and write
|
||
FF9000
|
unkown
|
page execute and read and write
|
||
5110000
|
heap
|
page read and write
|
||
52B3000
|
trusted library allocation
|
page execute and read and write
|
||
1434000
|
heap
|
page read and write
|
||
553E000
|
stack
|
page read and write
|
||
2FE0000
|
direct allocation
|
page read and write
|
||
111C000
|
unkown
|
page execute and write copy
|
||
133E000
|
stack
|
page read and write
|
||
542C000
|
stack
|
page read and write
|
||
4CCF000
|
stack
|
page read and write
|
||
2FE0000
|
direct allocation
|
page read and write
|
||
1434000
|
heap
|
page read and write
|
||
1434000
|
heap
|
page read and write
|
||
5550000
|
trusted library allocation
|
page read and write
|
||
3F4E000
|
stack
|
page read and write
|
||
52EB000
|
trusted library allocation
|
page execute and read and write
|
||
38CF000
|
stack
|
page read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
418F000
|
stack
|
page read and write
|
||
15EE000
|
heap
|
page read and write
|
||
51AB000
|
stack
|
page read and write
|
||
E60000
|
unkown
|
page readonly
|
||
2FE0000
|
direct allocation
|
page read and write
|
||
52E7000
|
trusted library allocation
|
page execute and read and write
|
||
1434000
|
heap
|
page read and write
|
||
65A4000
|
trusted library allocation
|
page read and write
|
||
404F000
|
stack
|
page read and write
|
||
157E000
|
stack
|
page read and write
|
||
2FE0000
|
direct allocation
|
page read and write
|
||
141B000
|
stack
|
page read and write
|
||
65C5000
|
trusted library allocation
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
D39000
|
stack
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
1434000
|
heap
|
page read and write
|
||
17AE000
|
stack
|
page read and write
|
||
12C8000
|
unkown
|
page execute and write copy
|
||
480E000
|
stack
|
page read and write
|
||
1602000
|
heap
|
page read and write
|
||
2FE0000
|
direct allocation
|
page read and write
|
||
15BA000
|
heap
|
page read and write
|
||
1434000
|
heap
|
page read and write
|
||
3A0F000
|
stack
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
796E000
|
stack
|
page read and write
|
||
52D0000
|
trusted library allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
42CF000
|
stack
|
page read and write
|
||
4BCE000
|
stack
|
page read and write
|
||
77DF000
|
stack
|
page read and write
|
||
5590000
|
heap
|
page execute and read and write
|
||
41CE000
|
stack
|
page read and write
|
||
378F000
|
stack
|
page read and write
|
||
2FE0000
|
direct allocation
|
page read and write
|
||
37CE000
|
stack
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
7820000
|
heap
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
3C8F000
|
stack
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
2FE0000
|
direct allocation
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
2FE0000
|
direct allocation
|
page read and write
|
||
111D000
|
unkown
|
page execute and write copy
|
||
5150000
|
direct allocation
|
page read and write
|
||
1434000
|
heap
|
page read and write
|
||
52B4000
|
trusted library allocation
|
page read and write
|
||
408E000
|
stack
|
page read and write
|
||
111C000
|
unkown
|
page execute and read and write
|
||
1434000
|
heap
|
page read and write
|
||
769D000
|
stack
|
page read and write
|
||
430E000
|
stack
|
page read and write
|
||
46CE000
|
stack
|
page read and write
|
||
1434000
|
heap
|
page read and write
|
||
12C8000
|
unkown
|
page execute and write copy
|
||
C3C000
|
stack
|
page read and write
|
||
3CCE000
|
stack
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
3B4F000
|
stack
|
page read and write
|
||
E6A000
|
unkown
|
page execute and read and write
|
||
5010000
|
heap
|
page read and write
|
||
65A1000
|
trusted library allocation
|
page read and write
|
||
E66000
|
unkown
|
page write copy
|
||
320F000
|
stack
|
page read and write
|
||
55A1000
|
trusted library allocation
|
page read and write
|
||
5160000
|
heap
|
page read and write
|
||
163C000
|
heap
|
page read and write
|
||
15F9000
|
heap
|
page read and write
|
||
494E000
|
stack
|
page read and write
|
||
3007000
|
heap
|
page read and write
|
||
1434000
|
heap
|
page read and write
|
||
454F000
|
stack
|
page read and write
|
||
52BD000
|
trusted library allocation
|
page execute and read and write
|
||
E66000
|
unkown
|
page write copy
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
52C4000
|
trusted library allocation
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
390E000
|
stack
|
page read and write
|
||
110D000
|
unkown
|
page execute and read and write
|
||
440F000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
7A6F000
|
stack
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
13DE000
|
stack
|
page read and write
|
||
160D000
|
heap
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
52E0000
|
trusted library allocation
|
page read and write
|
||
5140000
|
trusted library allocation
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
15A0000
|
direct allocation
|
page read and write
|
||
15FF000
|
heap
|
page read and write
|
||
E60000
|
unkown
|
page read and write
|
||
2FE0000
|
direct allocation
|
page read and write
|
||
5540000
|
trusted library allocation
|
page execute and read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
5110000
|
trusted library allocation
|
page read and write
|
||
5560000
|
trusted library allocation
|
page read and write
|
||
2FE0000
|
direct allocation
|
page read and write
|
||
458E000
|
stack
|
page read and write
|
||
1434000
|
heap
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
3F0F000
|
stack
|
page read and write
|
||
1434000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
5150000
|
direct allocation
|
page read and write
|
||
1434000
|
heap
|
page read and write
|
||
5150000
|
direct allocation
|
page read and write
|
||
444E000
|
stack
|
page read and write
|
||
12C6000
|
unkown
|
page execute and read and write
|
||
1434000
|
heap
|
page read and write
|
||
1434000
|
heap
|
page read and write
|
||
47CF000
|
stack
|
page read and write
|
||
4A4F000
|
stack
|
page read and write
|
||
468F000
|
stack
|
page read and write
|
||
2FE0000
|
direct allocation
|
page read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
490F000
|
stack
|
page read and write
|
||
52DA000
|
trusted library allocation
|
page execute and read and write
|
||
15BE000
|
heap
|
page read and write
|
||
E62000
|
unkown
|
page execute and read and write
|
||
1434000
|
heap
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
52AE000
|
stack
|
page read and write
|
||
781E000
|
stack
|
page read and write
|
||
2FE0000
|
direct allocation
|
page read and write
|
||
2FE0000
|
direct allocation
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
3A4E000
|
stack
|
page read and write
|
There are 158 hidden memdumps, click here to show them.