Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
8DC000
|
stack
|
page read and write
|
||
4910000
|
direct allocation
|
page read and write
|
||
4921000
|
heap
|
page read and write
|
||
443F000
|
stack
|
page read and write
|
||
F5A000
|
heap
|
page read and write
|
||
303F000
|
stack
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
4910000
|
direct allocation
|
page read and write
|
||
4A53000
|
trusted library allocation
|
page execute and read and write
|
||
447E000
|
stack
|
page read and write
|
||
4BCA000
|
trusted library allocation
|
page execute and read and write
|
||
714E000
|
stack
|
page read and write
|
||
4D60000
|
heap
|
page execute and read and write
|
||
84E000
|
stack
|
page read and write
|
||
710E000
|
stack
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
4C4E000
|
stack
|
page read and write
|
||
4A54000
|
trusted library allocation
|
page read and write
|
||
4921000
|
heap
|
page read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
37BF000
|
stack
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
5E15000
|
trusted library allocation
|
page read and write
|
||
4930000
|
heap
|
page read and write
|
||
5DF4000
|
trusted library allocation
|
page read and write
|
||
4921000
|
heap
|
page read and write
|
||
34C000
|
stack
|
page read and write
|
||
4921000
|
heap
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
4910000
|
direct allocation
|
page read and write
|
||
4921000
|
heap
|
page read and write
|
||
70CE000
|
stack
|
page read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
5DF1000
|
trusted library allocation
|
page read and write
|
||
4920000
|
heap
|
page read and write
|
||
38FF000
|
stack
|
page read and write
|
||
4910000
|
direct allocation
|
page read and write
|
||
40BE000
|
stack
|
page read and write
|
||
FDF000
|
heap
|
page read and write
|
||
4910000
|
direct allocation
|
page read and write
|
||
4921000
|
heap
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
7170000
|
heap
|
page execute and read and write
|
||
4DE0000
|
heap
|
page read and write
|
||
3F3F000
|
stack
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
986000
|
unkown
|
page write copy
|
||
DBC000
|
unkown
|
page execute and write copy
|
||
4BD0000
|
trusted library allocation
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
2AFF000
|
stack
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
986000
|
unkown
|
page write copy
|
||
3B7F000
|
stack
|
page read and write
|
||
4910000
|
direct allocation
|
page read and write
|
||
4910000
|
direct allocation
|
page read and write
|
||
980000
|
unkown
|
page read and write
|
||
89E000
|
stack
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
98A000
|
unkown
|
page execute and read and write
|
||
31BE000
|
stack
|
page read and write
|
||
29EF000
|
stack
|
page read and write
|
||
4910000
|
direct allocation
|
page read and write
|
||
727E000
|
stack
|
page read and write
|
||
FA2000
|
heap
|
page read and write
|
||
8E5000
|
heap
|
page read and write
|
||
C11000
|
unkown
|
page execute and read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
4921000
|
heap
|
page read and write
|
||
737E000
|
stack
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
4AAB000
|
stack
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
4921000
|
heap
|
page read and write
|
||
4921000
|
heap
|
page read and write
|
||
41FE000
|
stack
|
page read and write
|
||
4A64000
|
trusted library allocation
|
page read and write
|
||
6F9000
|
stack
|
page read and write
|
||
4BF0000
|
heap
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
6F8D000
|
stack
|
page read and write
|
||
4910000
|
direct allocation
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
C21000
|
unkown
|
page execute and write copy
|
||
3CBF000
|
stack
|
page read and write
|
||
2BFF000
|
stack
|
page read and write
|
||
29F7000
|
heap
|
page read and write
|
||
DBC000
|
unkown
|
page execute and write copy
|
||
41BF000
|
stack
|
page read and write
|
||
48F0000
|
heap
|
page read and write
|
||
4921000
|
heap
|
page read and write
|
||
4DF1000
|
trusted library allocation
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
96E000
|
stack
|
page read and write
|
||
4921000
|
heap
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
F92000
|
heap
|
page read and write
|
||
982000
|
unkown
|
page execute and write copy
|
||
3E3E000
|
stack
|
page read and write
|
||
4921000
|
heap
|
page read and write
|
||
114E000
|
stack
|
page read and write
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
4A60000
|
trusted library allocation
|
page read and write
|
||
4921000
|
heap
|
page read and write
|
||
DBA000
|
unkown
|
page execute and read and write
|
||
4D4F000
|
stack
|
page read and write
|
||
4BDB000
|
trusted library allocation
|
page execute and read and write
|
||
FAE000
|
heap
|
page read and write
|
||
C20000
|
unkown
|
page execute and write copy
|
||
4D50000
|
trusted library allocation
|
page execute and read and write
|
||
3DFE000
|
stack
|
page read and write
|
||
4910000
|
direct allocation
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
4921000
|
heap
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
4910000
|
direct allocation
|
page read and write
|
||
4910000
|
direct allocation
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
982000
|
unkown
|
page execute and read and write
|
||
4921000
|
heap
|
page read and write
|
||
407F000
|
stack
|
page read and write
|
||
4BC0000
|
direct allocation
|
page execute and read and write
|
||
4910000
|
direct allocation
|
page read and write
|
||
F3E000
|
stack
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
4A5D000
|
trusted library allocation
|
page execute and read and write
|
||
F5E000
|
heap
|
page read and write
|
||
457F000
|
stack
|
page read and write
|
||
B01000
|
unkown
|
page execute and read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
C20000
|
unkown
|
page execute and read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
4DAC000
|
stack
|
page read and write
|
||
4910000
|
direct allocation
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
48D0000
|
direct allocation
|
page read and write
|
||
4BD7000
|
trusted library allocation
|
page execute and read and write
|
||
3B0000
|
heap
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
6FCE000
|
stack
|
page read and write
|
||
980000
|
unkown
|
page readonly
|
||
4C00000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
There are 149 hidden memdumps, click here to show them.