Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
48E0000
|
trusted library allocation
|
page read and write
|
||
48A0000
|
heap
|
page read and write
|
||
AD0000
|
unkown
|
page read and write
|
||
4790000
|
direct allocation
|
page read and write
|
||
CA3000
|
unkown
|
page execute and read and write
|
||
F5F000
|
heap
|
page read and write
|
||
4790000
|
direct allocation
|
page read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
CDC000
|
unkown
|
page execute and write copy
|
||
300F000
|
stack
|
page read and write
|
||
85E000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
AD2000
|
unkown
|
page execute and read and write
|
||
340E000
|
stack
|
page read and write
|
||
378F000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
4770000
|
direct allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
42CF000
|
stack
|
page read and write
|
||
4A70000
|
direct allocation
|
page execute and read and write
|
||
38CF000
|
stack
|
page read and write
|
||
6FD0000
|
heap
|
page execute and read and write
|
||
2A0E000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
D02000
|
unkown
|
page execute and write copy
|
||
96F000
|
stack
|
page read and write
|
||
70DE000
|
stack
|
page read and write
|
||
37CE000
|
stack
|
page read and write
|
||
4B00000
|
trusted library allocation
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
4A4D000
|
trusted library allocation
|
page execute and read and write
|
||
4A54000
|
trusted library allocation
|
page read and write
|
||
390E000
|
stack
|
page read and write
|
||
4790000
|
direct allocation
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
CB6000
|
unkown
|
page execute and read and write
|
||
4A43000
|
trusted library allocation
|
page execute and read and write
|
||
4790000
|
direct allocation
|
page read and write
|
||
ADA000
|
unkown
|
page execute and write copy
|
||
2B0F000
|
stack
|
page read and write
|
||
6F5F000
|
stack
|
page read and write
|
||
ACE000
|
stack
|
page read and write
|
||
CA4000
|
unkown
|
page execute and write copy
|
||
3A4E000
|
stack
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
430E000
|
stack
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
711E000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
6F9E000
|
stack
|
page read and write
|
||
D01000
|
unkown
|
page execute and read and write
|
||
D66000
|
unkown
|
page execute and read and write
|
||
864000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
276C000
|
stack
|
page read and write
|
||
4B20000
|
heap
|
page execute and read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
F7C000
|
heap
|
page read and write
|
||
4790000
|
direct allocation
|
page read and write
|
||
2C4F000
|
stack
|
page read and write
|
||
CB9000
|
unkown
|
page execute and read and write
|
||
C82000
|
unkown
|
page execute and write copy
|
||
4790000
|
direct allocation
|
page read and write
|
||
3DCF000
|
stack
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page execute and read and write
|
||
CE7000
|
unkown
|
page execute and read and write
|
||
F2E000
|
heap
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
CF0000
|
unkown
|
page execute and read and write
|
||
C69000
|
unkown
|
page execute and read and write
|
||
4790000
|
direct allocation
|
page read and write
|
||
C97000
|
unkown
|
page execute and write copy
|
||
3E0000
|
heap
|
page read and write
|
||
AD0000
|
unkown
|
page readonly
|
||
ADA000
|
unkown
|
page execute and read and write
|
||
864000
|
heap
|
page read and write
|
||
C43000
|
unkown
|
page execute and write copy
|
||
314F000
|
stack
|
page read and write
|
||
47B0000
|
heap
|
page read and write
|
||
6F9000
|
stack
|
page read and write
|
||
28CF000
|
stack
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
C9F000
|
unkown
|
page execute and write copy
|
||
CB7000
|
unkown
|
page execute and write copy
|
||
864000
|
heap
|
page read and write
|
||
492C000
|
stack
|
page read and write
|
||
36C000
|
stack
|
page read and write
|
||
4790000
|
direct allocation
|
page read and write
|
||
C86000
|
unkown
|
page execute and read and write
|
||
27AE000
|
stack
|
page read and write
|
||
41CE000
|
stack
|
page read and write
|
||
AD2000
|
unkown
|
page execute and write copy
|
||
CE4000
|
unkown
|
page execute and write copy
|
||
33CF000
|
stack
|
page read and write
|
||
3CCE000
|
stack
|
page read and write
|
||
3B4F000
|
stack
|
page read and write
|
||
F67000
|
heap
|
page read and write
|
||
D05000
|
unkown
|
page execute and read and write
|
||
864000
|
heap
|
page read and write
|
||
FAF000
|
heap
|
page read and write
|
||
F5D000
|
heap
|
page read and write
|
||
4CE1000
|
trusted library allocation
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
27C7000
|
heap
|
page read and write
|
||
D7E000
|
unkown
|
page execute and write copy
|
||
81E000
|
stack
|
page read and write
|
||
C98000
|
unkown
|
page execute and read and write
|
||
C5B000
|
unkown
|
page execute and read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
48A0000
|
trusted library allocation
|
page read and write
|
||
C5E000
|
unkown
|
page execute and read and write
|
||
3C8F000
|
stack
|
page read and write
|
||
404F000
|
stack
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
CEF000
|
unkown
|
page execute and write copy
|
||
CAB000
|
unkown
|
page execute and read and write
|
||
CE3000
|
unkown
|
page execute and read and write
|
||
4A2F000
|
stack
|
page read and write
|
||
C85000
|
unkown
|
page execute and write copy
|
||
D7C000
|
unkown
|
page execute and read and write
|
||
A6F000
|
stack
|
page read and write
|
||
AD6000
|
unkown
|
page write copy
|
||
C69000
|
unkown
|
page execute and write copy
|
||
4AA0000
|
trusted library allocation
|
page read and write
|
||
D7C000
|
unkown
|
page execute and write copy
|
||
D06000
|
unkown
|
page execute and write copy
|
||
AE6000
|
unkown
|
page execute and write copy
|
||
C73000
|
unkown
|
page execute and read and write
|
||
4BD0000
|
heap
|
page read and write
|
||
4790000
|
direct allocation
|
page read and write
|
||
440F000
|
stack
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
4790000
|
direct allocation
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
C5C000
|
unkown
|
page execute and write copy
|
||
C88000
|
unkown
|
page execute and read and write
|
||
4A70000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
direct allocation
|
page execute and read and write
|
||
47A1000
|
heap
|
page read and write
|
||
408E000
|
stack
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
4A6A000
|
trusted library allocation
|
page execute and read and write
|
||
318E000
|
stack
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
4A50000
|
trusted library allocation
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
D0D000
|
unkown
|
page execute and read and write
|
||
29CF000
|
stack
|
page read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
D67000
|
unkown
|
page execute and write copy
|
||
CCD000
|
unkown
|
page execute and read and write
|
||
4790000
|
direct allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
F6C000
|
heap
|
page read and write
|
||
4AEE000
|
stack
|
page read and write
|
||
6D1C000
|
stack
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
4790000
|
direct allocation
|
page read and write
|
||
721E000
|
stack
|
page read and write
|
||
C83000
|
unkown
|
page execute and read and write
|
||
4790000
|
direct allocation
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
6E5E000
|
stack
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
47A0000
|
heap
|
page read and write
|
||
D64000
|
unkown
|
page execute and write copy
|
||
3F0F000
|
stack
|
page read and write
|
||
418F000
|
stack
|
page read and write
|
||
4A60000
|
trusted library allocation
|
page read and write
|
||
4CDF000
|
stack
|
page read and write
|
||
C71000
|
unkown
|
page execute and write copy
|
||
D7E000
|
unkown
|
page execute and write copy
|
||
4790000
|
direct allocation
|
page read and write
|
||
4A44000
|
trusted library allocation
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
272F000
|
stack
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
3F4E000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
47A1000
|
heap
|
page read and write
|
||
AD6000
|
unkown
|
page write copy
|
||
2ECF000
|
stack
|
page read and write
|
||
F2A000
|
heap
|
page read and write
|
||
5CE1000
|
trusted library allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
CC9000
|
unkown
|
page execute and write copy
|
||
C87000
|
unkown
|
page execute and write copy
|
||
CB5000
|
unkown
|
page execute and write copy
|
||
4A7B000
|
trusted library allocation
|
page execute and read and write
|
||
3A0F000
|
stack
|
page read and write
|
||
D6E000
|
unkown
|
page execute and write copy
|
||
CFC000
|
unkown
|
page execute and write copy
|
||
6E1D000
|
stack
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
4A90000
|
heap
|
page read and write
|
||
D6E000
|
unkown
|
page execute and write copy
|
||
4A77000
|
trusted library allocation
|
page execute and read and write
|
||
2D8F000
|
stack
|
page read and write
|
||
C40000
|
unkown
|
page execute and read and write
|
||
47A1000
|
heap
|
page read and write
|
||
5D05000
|
trusted library allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
There are 200 hidden memdumps, click here to show them.