Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4A90000
|
direct allocation
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
296C000
|
stack
|
page read and write
|
||
424E000
|
stack
|
page read and write
|
||
398E000
|
stack
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
5FB5000
|
trusted library allocation
|
page read and write
|
||
943000
|
heap
|
page read and write
|
||
8EE000
|
stack
|
page read and write
|
||
742E000
|
stack
|
page read and write
|
||
4D7A000
|
trusted library allocation
|
page execute and read and write
|
||
CBA000
|
unkown
|
page execute and read and write
|
||
3BCF000
|
stack
|
page read and write
|
||
5B9000
|
stack
|
page read and write
|
||
962000
|
heap
|
page read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
5F91000
|
trusted library allocation
|
page read and write
|
||
4F8E000
|
stack
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
CBA000
|
unkown
|
page execute and write copy
|
||
864000
|
heap
|
page read and write
|
||
292E000
|
stack
|
page read and write
|
||
448F000
|
stack
|
page read and write
|
||
3A8F000
|
stack
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
4D5E000
|
stack
|
page read and write
|
||
94D000
|
heap
|
page read and write
|
||
4F91000
|
trusted library allocation
|
page read and write
|
||
45CF000
|
stack
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
3C0E000
|
stack
|
page read and write
|
||
4DE0000
|
heap
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
4C5C000
|
stack
|
page read and write
|
||
4AA0000
|
heap
|
page read and write
|
||
2E0F000
|
stack
|
page read and write
|
||
344F000
|
stack
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
4D70000
|
trusted library allocation
|
page read and write
|
||
5F94000
|
trusted library allocation
|
page read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
72EE000
|
stack
|
page read and write
|
||
A06000
|
unkown
|
page write copy
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
2A8F000
|
stack
|
page read and write
|
||
7160000
|
heap
|
page execute and read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
4C14000
|
trusted library allocation
|
page read and write
|
||
36CF000
|
stack
|
page read and write
|
||
752E000
|
stack
|
page read and write
|
||
3D0F000
|
stack
|
page read and write
|
||
968000
|
heap
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
E68000
|
unkown
|
page execute and write copy
|
||
4A90000
|
direct allocation
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
A02000
|
unkown
|
page execute and write copy
|
||
4A90000
|
direct allocation
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
410E000
|
stack
|
page read and write
|
||
113F000
|
stack
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
4E2E000
|
stack
|
page read and write
|
||
4BC0000
|
direct allocation
|
page execute and read and write
|
||
E66000
|
unkown
|
page execute and write copy
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
358F000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
71AE000
|
stack
|
page read and write
|
||
4BC000
|
stack
|
page read and write
|
||
CAA000
|
unkown
|
page execute and read and write
|
||
4BA0000
|
trusted library allocation
|
page read and write
|
||
103F000
|
stack
|
page read and write
|
||
434F000
|
stack
|
page read and write
|
||
CBB000
|
unkown
|
page execute and write copy
|
||
A0A000
|
unkown
|
page execute and read and write
|
||
370E000
|
stack
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
A06000
|
unkown
|
page write copy
|
||
B9B000
|
unkown
|
page execute and read and write
|
||
3E8E000
|
stack
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
44CE000
|
stack
|
page read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
380F000
|
stack
|
page read and write
|
||
3F8F000
|
stack
|
page read and write
|
||
308F000
|
stack
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
A00000
|
unkown
|
page readonly
|
||
3ACE000
|
stack
|
page read and write
|
||
945000
|
heap
|
page read and write
|
||
384E000
|
stack
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
2B8F000
|
stack
|
page read and write
|
||
3FCE000
|
stack
|
page read and write
|
||
40CF000
|
stack
|
page read and write
|
||
4C1D000
|
trusted library allocation
|
page execute and read and write
|
||
3E4F000
|
stack
|
page read and write
|
||
4D87000
|
trusted library allocation
|
page execute and read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
73EE000
|
stack
|
page read and write
|
||
2987000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
470F000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
460E000
|
stack
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
4C13000
|
trusted library allocation
|
page execute and read and write
|
||
2CCF000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
3D4D000
|
stack
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
90A000
|
heap
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
4E6C000
|
stack
|
page read and write
|
||
90E000
|
heap
|
page read and write
|
||
4D8B000
|
trusted library allocation
|
page execute and read and write
|
||
4BD0000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
35CE000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
A02000
|
unkown
|
page execute and read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
438E000
|
stack
|
page read and write
|
||
E66000
|
unkown
|
page execute and read and write
|
||
864000
|
heap
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
8AE000
|
stack
|
page read and write
|
||
4AB1000
|
heap
|
page read and write
|
||
72AE000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
712D000
|
stack
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
420F000
|
stack
|
page read and write
|
||
E68000
|
unkown
|
page execute and write copy
|
||
A00000
|
unkown
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
4D64000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page execute and read and write
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
4E80000
|
heap
|
page execute and read and write
|
||
955000
|
heap
|
page read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
394F000
|
stack
|
page read and write
|
||
4C00000
|
trusted library allocation
|
page read and write
|
There are 158 hidden memdumps, click here to show them.