Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
A28000
|
unkown
|
page execute and read and write
|
||
50D0000
|
direct allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
4F81000
|
heap
|
page read and write
|
||
896000
|
unkown
|
page execute and write copy
|
||
515B000
|
trusted library allocation
|
page execute and read and write
|
||
764E000
|
stack
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
B14000
|
unkown
|
page execute and read and write
|
||
A14000
|
unkown
|
page execute and read and write
|
||
1204000
|
heap
|
page read and write
|
||
46EF000
|
stack
|
page read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
131F000
|
heap
|
page read and write
|
||
A23000
|
unkown
|
page execute and write copy
|
||
546E000
|
stack
|
page read and write
|
||
A88000
|
unkown
|
page execute and write copy
|
||
A33000
|
unkown
|
page execute and write copy
|
||
A30000
|
unkown
|
page execute and read and write
|
||
151E000
|
stack
|
page read and write
|
||
4F70000
|
direct allocation
|
page read and write
|
||
882000
|
unkown
|
page execute and write copy
|
||
AA2000
|
unkown
|
page execute and write copy
|
||
AAB000
|
unkown
|
page execute and read and write
|
||
AB6000
|
unkown
|
page execute and write copy
|
||
4F70000
|
direct allocation
|
page read and write
|
||
45EE000
|
stack
|
page read and write
|
||
A7F000
|
unkown
|
page execute and read and write
|
||
886000
|
unkown
|
page write copy
|
||
6474000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
789E000
|
stack
|
page read and write
|
||
A34000
|
unkown
|
page execute and read and write
|
||
5150000
|
trusted library allocation
|
page read and write
|
||
B32000
|
unkown
|
page execute and write copy
|
||
B1D000
|
unkown
|
page execute and write copy
|
||
A6B000
|
unkown
|
page execute and write copy
|
||
5123000
|
trusted library allocation
|
page execute and read and write
|
||
11EE000
|
stack
|
page read and write
|
||
5471000
|
trusted library allocation
|
page read and write
|
||
5080000
|
trusted library allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
5157000
|
trusted library allocation
|
page execute and read and write
|
||
A93000
|
unkown
|
page execute and write copy
|
||
A91000
|
unkown
|
page execute and write copy
|
||
1180000
|
heap
|
page read and write
|
||
A13000
|
unkown
|
page execute and write copy
|
||
133C000
|
heap
|
page read and write
|
||
880000
|
unkown
|
page readonly
|
||
A32000
|
unkown
|
page execute and read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
B32000
|
unkown
|
page execute and read and write
|
||
40EE000
|
stack
|
page read and write
|
||
5124000
|
trusted library allocation
|
page read and write
|
||
49AE000
|
stack
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
AAA000
|
unkown
|
page execute and write copy
|
||
4F70000
|
direct allocation
|
page read and write
|
||
52FF000
|
stack
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
9FD000
|
unkown
|
page execute and read and write
|
||
4F70000
|
direct allocation
|
page read and write
|
||
4F70000
|
direct allocation
|
page read and write
|
||
3AAE000
|
stack
|
page read and write
|
||
A97000
|
unkown
|
page execute and read and write
|
||
356F000
|
stack
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
760D000
|
stack
|
page read and write
|
||
514A000
|
trusted library allocation
|
page execute and read and write
|
||
1204000
|
heap
|
page read and write
|
||
886000
|
unkown
|
page write copy
|
||
4F70000
|
direct allocation
|
page read and write
|
||
4F70000
|
direct allocation
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
12EA000
|
heap
|
page read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
50D0000
|
direct allocation
|
page read and write
|
||
B24000
|
unkown
|
page execute and write copy
|
||
436E000
|
stack
|
page read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
B13000
|
unkown
|
page execute and write copy
|
||
4F81000
|
heap
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
4BEF000
|
stack
|
page read and write
|
||
B34000
|
unkown
|
page execute and write copy
|
||
30AF000
|
stack
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
AA1000
|
unkown
|
page execute and read and write
|
||
4F50000
|
direct allocation
|
page read and write
|
||
5130000
|
trusted library allocation
|
page read and write
|
||
422D000
|
stack
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
4F70000
|
direct allocation
|
page read and write
|
||
533C000
|
stack
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
4F80000
|
heap
|
page read and write
|
||
4F81000
|
heap
|
page read and write
|
||
392F000
|
stack
|
page read and write
|
||
51F0000
|
heap
|
page read and write
|
||
51EE000
|
stack
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
78DE000
|
stack
|
page read and write
|
||
779E000
|
stack
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
4AAF000
|
stack
|
page read and write
|
||
A31000
|
unkown
|
page execute and write copy
|
||
A2F000
|
unkown
|
page execute and write copy
|
||
3E2F000
|
stack
|
page read and write
|
||
50D0000
|
direct allocation
|
page read and write
|
||
5180000
|
trusted library allocation
|
page execute and read and write
|
||
12EE000
|
heap
|
page read and write
|
||
14DF000
|
stack
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
5360000
|
heap
|
page execute and read and write
|
||
AAD000
|
unkown
|
page execute and read and write
|
||
2F90000
|
heap
|
page read and write
|
||
88A000
|
unkown
|
page execute and read and write
|
||
103C000
|
stack
|
page read and write
|
||
A1E000
|
unkown
|
page execute and read and write
|
||
51A0000
|
heap
|
page read and write
|
||
346E000
|
stack
|
page read and write
|
||
AA5000
|
unkown
|
page execute and read and write
|
||
AA0000
|
unkown
|
page execute and write copy
|
||
1204000
|
heap
|
page read and write
|
||
88A000
|
unkown
|
page execute and write copy
|
||
AAC000
|
unkown
|
page execute and write copy
|
||
A89000
|
unkown
|
page execute and read and write
|
||
31AF000
|
stack
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
132F000
|
heap
|
page read and write
|
||
396E000
|
stack
|
page read and write
|
||
5140000
|
trusted library allocation
|
page read and write
|
||
AA9000
|
unkown
|
page execute and read and write
|
||
35AE000
|
stack
|
page read and write
|
||
131D000
|
heap
|
page read and write
|
||
50C0000
|
trusted library allocation
|
page read and write
|
||
4AEE000
|
stack
|
page read and write
|
||
496F000
|
stack
|
page read and write
|
||
A00000
|
unkown
|
page execute and write copy
|
||
5340000
|
trusted library allocation
|
page read and write
|
||
4F70000
|
direct allocation
|
page read and write
|
||
3BEE000
|
stack
|
page read and write
|
||
775F000
|
stack
|
page read and write
|
||
45AF000
|
stack
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
432E000
|
stack
|
page read and write
|
||
4F70000
|
direct allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
A10000
|
unkown
|
page execute and read and write
|
||
382E000
|
stack
|
page read and write
|
||
161F000
|
stack
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
A92000
|
unkown
|
page execute and read and write
|
||
A6E000
|
unkown
|
page execute and read and write
|
||
A7C000
|
unkown
|
page execute and write copy
|
||
882000
|
unkown
|
page execute and read and write
|
||
5080000
|
heap
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
2F4C000
|
stack
|
page read and write
|
||
ABF000
|
unkown
|
page execute and read and write
|
||
AA6000
|
unkown
|
page execute and write copy
|
||
1204000
|
heap
|
page read and write
|
||
2FA7000
|
heap
|
page read and write
|
||
512D000
|
trusted library allocation
|
page execute and read and write
|
||
40AF000
|
stack
|
page read and write
|
||
4F70000
|
direct allocation
|
page read and write
|
||
486E000
|
stack
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
36AF000
|
stack
|
page read and write
|
||
A5D000
|
unkown
|
page execute and read and write
|
||
AB4000
|
unkown
|
page execute and write copy
|
||
4F70000
|
direct allocation
|
page read and write
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
880000
|
unkown
|
page read and write
|
||
B34000
|
unkown
|
page execute and write copy
|
||
4F70000
|
direct allocation
|
page read and write
|
||
3CEF000
|
stack
|
page read and write
|
||
6495000
|
trusted library allocation
|
page read and write
|
||
7650000
|
heap
|
page execute and read and write
|
||
A4C000
|
unkown
|
page execute and write copy
|
||
A1D000
|
unkown
|
page execute and write copy
|
||
AB5000
|
unkown
|
page execute and read and write
|
||
1170000
|
heap
|
page read and write
|
||
4F81000
|
heap
|
page read and write
|
||
1139000
|
stack
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
5134000
|
trusted library allocation
|
page read and write
|
||
510C000
|
stack
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
6471000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
B24000
|
unkown
|
page execute and write copy
|
||
41EF000
|
stack
|
page read and write
|
||
44AE000
|
stack
|
page read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
4F70000
|
direct allocation
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
482F000
|
stack
|
page read and write
|
||
4F81000
|
heap
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
37EF000
|
stack
|
page read and write
|
||
79DE000
|
stack
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
There are 199 hidden memdumps, click here to show them.