Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
313E000
|
stack
|
page read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
4D97000
|
trusted library allocation
|
page execute and read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
6045000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
direct allocation
|
page read and write
|
||
4DB0000
|
direct allocation
|
page execute and read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
442000
|
unkown
|
page execute and read and write
|
||
6024000
|
trusted library allocation
|
page read and write
|
||
377E000
|
stack
|
page read and write
|
||
72D0000
|
heap
|
page execute and read and write
|
||
725E000
|
stack
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
4AD0000
|
heap
|
page read and write
|
||
715E000
|
stack
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
4EE0000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
EB0000
|
heap
|
page read and write
|
||
446000
|
unkown
|
page write copy
|
||
E90000
|
heap
|
page read and write
|
||
403E000
|
stack
|
page read and write
|
||
3C7E000
|
stack
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
4AC0000
|
direct allocation
|
page read and write
|
||
4D9B000
|
trusted library allocation
|
page execute and read and write
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
751E000
|
stack
|
page read and write
|
||
3AFF000
|
stack
|
page read and write
|
||
3EFE000
|
stack
|
page read and write
|
||
4AC0000
|
direct allocation
|
page read and write
|
||
2AFC000
|
stack
|
page read and write
|
||
3FFF000
|
stack
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
5021000
|
trusted library allocation
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
4AC0000
|
direct allocation
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page execute and read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
4C10000
|
trusted library allocation
|
page read and write
|
||
3EBF000
|
stack
|
page read and write
|
||
7120000
|
trusted library allocation
|
page read and write
|
||
741E000
|
stack
|
page read and write
|
||
10B1000
|
heap
|
page read and write
|
||
CF9000
|
stack
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
89C000
|
unkown
|
page execute and read and write
|
||
39FE000
|
stack
|
page read and write
|
||
107D000
|
heap
|
page read and write
|
||
73DF000
|
stack
|
page read and write
|
||
4AC0000
|
direct allocation
|
page read and write
|
||
3DBE000
|
stack
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
4DFE000
|
stack
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
417E000
|
stack
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
4BD0000
|
trusted library allocation
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
93C000
|
stack
|
page read and write
|
||
6021000
|
trusted library allocation
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
34BF000
|
stack
|
page read and write
|
||
2BFF000
|
stack
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
38BE000
|
stack
|
page read and write
|
||
EB7000
|
heap
|
page read and write
|
||
4AC0000
|
direct allocation
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
89E000
|
unkown
|
page execute and write copy
|
||
4C20000
|
direct allocation
|
page read and write
|
||
4AC0000
|
direct allocation
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
413F000
|
stack
|
page read and write
|
||
121E000
|
stack
|
page read and write
|
||
E4E000
|
stack
|
page read and write
|
||
1071000
|
heap
|
page read and write
|
||
4D70000
|
heap
|
page read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
453E000
|
stack
|
page read and write
|
||
4AC0000
|
direct allocation
|
page read and write
|
||
10AF000
|
heap
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
446000
|
unkown
|
page write copy
|
||
4AD1000
|
heap
|
page read and write
|
||
2D3F000
|
stack
|
page read and write
|
||
4D5E000
|
stack
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
44A000
|
unkown
|
page execute and read and write
|
||
43BF000
|
stack
|
page read and write
|
||
1069000
|
heap
|
page read and write
|
||
4EDC000
|
stack
|
page read and write
|
||
6E5000
|
unkown
|
page execute and read and write
|
||
43FE000
|
stack
|
page read and write
|
||
4AC0000
|
direct allocation
|
page read and write
|
||
5010000
|
heap
|
page execute and read and write
|
||
337F000
|
stack
|
page read and write
|
||
5D6000
|
unkown
|
page execute and read and write
|
||
729E000
|
stack
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
102A000
|
heap
|
page read and write
|
||
4C0D000
|
trusted library allocation
|
page execute and read and write
|
||
2FBF000
|
stack
|
page read and write
|
||
4AC0000
|
direct allocation
|
page read and write
|
||
4C14000
|
trusted library allocation
|
page read and write
|
||
711D000
|
stack
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
EF5000
|
heap
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
4AC0000
|
direct allocation
|
page read and write
|
||
FFF000
|
stack
|
page read and write
|
||
387F000
|
stack
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
44FF000
|
stack
|
page read and write
|
||
2ABF000
|
stack
|
page read and write
|
||
4AC0000
|
direct allocation
|
page read and write
|
||
1061000
|
heap
|
page read and write
|
||
6F5000
|
unkown
|
page execute and write copy
|
||
463F000
|
stack
|
page read and write
|
||
467E000
|
stack
|
page read and write
|
||
442000
|
unkown
|
page execute and write copy
|
||
3D7F000
|
stack
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
4AC0000
|
direct allocation
|
page read and write
|
||
6F4000
|
unkown
|
page execute and write copy
|
||
102E000
|
heap
|
page read and write
|
||
4AC0000
|
direct allocation
|
page read and write
|
||
477F000
|
stack
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
E8E000
|
stack
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
3B3E000
|
stack
|
page read and write
|
||
89E000
|
unkown
|
page execute and write copy
|
||
35FF000
|
stack
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
4C5C000
|
stack
|
page read and write
|
||
4FEE000
|
stack
|
page read and write
|
||
4D8A000
|
trusted library allocation
|
page execute and read and write
|
||
39BF000
|
stack
|
page read and write
|
||
6F4000
|
unkown
|
page execute and read and write
|
||
4C03000
|
trusted library allocation
|
page execute and read and write
|
||
3C3F000
|
stack
|
page read and write
|
There are 150 hidden memdumps, click here to show them.