Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
344E000
|
stack
|
page read and write
|
||
4BA0000
|
direct allocation
|
page read and write
|
||
4BF4000
|
trusted library allocation
|
page read and write
|
||
AD2000
|
unkown
|
page execute and write copy
|
||
4A40000
|
direct allocation
|
page read and write
|
||
368F000
|
stack
|
page read and write
|
||
749E000
|
stack
|
page read and write
|
||
B12000
|
unkown
|
page execute and read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
A7F000
|
unkown
|
page execute and write copy
|
||
340F000
|
stack
|
page read and write
|
||
380E000
|
stack
|
page read and write
|
||
5F05000
|
trusted library allocation
|
page read and write
|
||
434E000
|
stack
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
4C20000
|
trusted library allocation
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
E5E000
|
heap
|
page read and write
|
||
9D4000
|
unkown
|
page execute and write copy
|
||
A94000
|
unkown
|
page execute and read and write
|
||
AA1000
|
unkown
|
page execute and read and write
|
||
4DBE000
|
stack
|
page read and write
|
||
A95000
|
unkown
|
page execute and write copy
|
||
D64000
|
heap
|
page read and write
|
||
A46000
|
unkown
|
page execute and write copy
|
||
83C000
|
stack
|
page read and write
|
||
739E000
|
stack
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
37CF000
|
stack
|
page read and write
|
||
299E000
|
stack
|
page read and write
|
||
A34000
|
unkown
|
page execute and write copy
|
||
70FE000
|
stack
|
page read and write
|
||
3F8E000
|
stack
|
page read and write
|
||
10FF000
|
stack
|
page read and write
|
||
3B8F000
|
stack
|
page read and write
|
||
41CF000
|
stack
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
C19000
|
stack
|
page read and write
|
||
9F4000
|
unkown
|
page execute and write copy
|
||
354F000
|
stack
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
408F000
|
stack
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
A84000
|
unkown
|
page execute and write copy
|
||
D64000
|
heap
|
page read and write
|
||
318F000
|
stack
|
page read and write
|
||
86A000
|
unkown
|
page execute and write copy
|
||
B12000
|
unkown
|
page execute and write copy
|
||
B03000
|
unkown
|
page execute and write copy
|
||
4A40000
|
direct allocation
|
page read and write
|
||
A25000
|
unkown
|
page execute and write copy
|
||
420E000
|
stack
|
page read and write
|
||
32CF000
|
stack
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
E0E000
|
heap
|
page read and write
|
||
AFB000
|
unkown
|
page execute and write copy
|
||
A33000
|
unkown
|
page execute and read and write
|
||
D64000
|
heap
|
page read and write
|
||
6FBC000
|
stack
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
4ED0000
|
heap
|
page execute and read and write
|
||
4A51000
|
heap
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
4BF3000
|
trusted library allocation
|
page execute and read and write
|
||
A39000
|
unkown
|
page execute and read and write
|
||
70C0000
|
trusted library allocation
|
page read and write
|
||
DEE000
|
stack
|
page read and write
|
||
A8D000
|
unkown
|
page execute and write copy
|
||
4A51000
|
heap
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
717E000
|
stack
|
page read and write
|
||
9F4000
|
unkown
|
page execute and read and write
|
||
4C2B000
|
trusted library allocation
|
page execute and read and write
|
||
D64000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
860000
|
unkown
|
page read and write
|
||
3E4E000
|
stack
|
page read and write
|
||
29C0000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
A83000
|
unkown
|
page execute and read and write
|
||
7190000
|
heap
|
page execute and read and write
|
||
4A51000
|
heap
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
866000
|
unkown
|
page write copy
|
||
D64000
|
heap
|
page read and write
|
||
A98000
|
unkown
|
page execute and read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
4C50000
|
trusted library allocation
|
page execute and read and write
|
||
4C1A000
|
trusted library allocation
|
page execute and read and write
|
||
4C70000
|
heap
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
AC1000
|
unkown
|
page execute and read and write
|
||
A74000
|
unkown
|
page execute and write copy
|
||
458F000
|
stack
|
page read and write
|
||
3A8E000
|
stack
|
page read and write
|
||
86A000
|
unkown
|
page execute and read and write
|
||
3BCE000
|
stack
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
4B50000
|
trusted library allocation
|
page read and write
|
||
4EE1000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
heap
|
page read and write
|
||
5EE4000
|
trusted library allocation
|
page read and write
|
||
3D0D000
|
stack
|
page read and write
|
||
430F000
|
stack
|
page read and write
|
||
3CCF000
|
stack
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
29C7000
|
heap
|
page read and write
|
||
4A20000
|
direct allocation
|
page read and write
|
||
70BD000
|
stack
|
page read and write
|
||
4C10000
|
trusted library allocation
|
page read and write
|
||
4A50000
|
heap
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
A44000
|
unkown
|
page execute and write copy
|
||
4B90000
|
trusted library allocation
|
page read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
28DE000
|
stack
|
page read and write
|
||
3F4F000
|
stack
|
page read and write
|
||
862000
|
unkown
|
page execute and write copy
|
||
E0A000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
4BFD000
|
trusted library allocation
|
page execute and read and write
|
||
A6C000
|
unkown
|
page execute and write copy
|
||
A8E000
|
unkown
|
page execute and read and write
|
||
B14000
|
unkown
|
page execute and write copy
|
||
4C60000
|
trusted library allocation
|
page read and write
|
||
E42000
|
heap
|
page read and write
|
||
4BA0000
|
direct allocation
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
A60000
|
unkown
|
page execute and read and write
|
||
3A4F000
|
stack
|
page read and write
|
||
A76000
|
unkown
|
page execute and read and write
|
||
A85000
|
unkown
|
page execute and read and write
|
||
295E000
|
stack
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
860000
|
unkown
|
page readonly
|
||
4C40000
|
trusted library allocation
|
page read and write
|
||
A45000
|
unkown
|
page execute and read and write
|
||
4BA0000
|
direct allocation
|
page read and write
|
||
45CE000
|
stack
|
page read and write
|
||
9D2000
|
unkown
|
page execute and read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
B14000
|
unkown
|
page execute and write copy
|
||
D64000
|
heap
|
page read and write
|
||
A6B000
|
unkown
|
page execute and read and write
|
||
29A0000
|
heap
|
page read and write
|
||
713E000
|
stack
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
444F000
|
stack
|
page read and write
|
||
A69000
|
unkown
|
page execute and write copy
|
||
330E000
|
stack
|
page read and write
|
||
A73000
|
unkown
|
page execute and read and write
|
||
D64000
|
heap
|
page read and write
|
||
46CF000
|
stack
|
page read and write
|
||
390F000
|
stack
|
page read and write
|
||
A90000
|
unkown
|
page execute and write copy
|
||
40CE000
|
stack
|
page read and write
|
||
4B50000
|
heap
|
page read and write
|
||
A59000
|
unkown
|
page execute and write copy
|
||
862000
|
unkown
|
page execute and read and write
|
||
AC0000
|
unkown
|
page execute and write copy
|
||
4A40000
|
direct allocation
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
AD3000
|
unkown
|
page execute and read and write
|
||
4BDB000
|
stack
|
page read and write
|
||
AA0000
|
unkown
|
page execute and write copy
|
||
D64000
|
heap
|
page read and write
|
||
4ECF000
|
stack
|
page read and write
|
||
36CE000
|
stack
|
page read and write
|
||
A4A000
|
unkown
|
page execute and read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
2CCF000
|
stack
|
page read and write
|
||
E49000
|
heap
|
page read and write
|
||
9E9000
|
unkown
|
page execute and read and write
|
||
31CE000
|
stack
|
page read and write
|
||
2DCF000
|
stack
|
page read and write
|
||
B03000
|
unkown
|
page execute and write copy
|
||
729E000
|
stack
|
page read and write
|
||
4C00000
|
trusted library allocation
|
page read and write
|
||
866000
|
unkown
|
page write copy
|
||
291B000
|
stack
|
page read and write
|
||
394E000
|
stack
|
page read and write
|
||
5EE1000
|
trusted library allocation
|
page read and write
|
||
876000
|
unkown
|
page execute and write copy
|
||
4C27000
|
trusted library allocation
|
page execute and read and write
|
There are 194 hidden memdumps, click here to show them.