Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C4E000
|
heap
|
page read and write
|
||
103B000
|
unkown
|
page execute and write copy
|
||
B2E000
|
stack
|
page read and write
|
||
4920000
|
direct allocation
|
page read and write
|
||
FA5000
|
unkown
|
page execute and write copy
|
||
E46000
|
unkown
|
page execute and write copy
|
||
4920000
|
direct allocation
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
FC5000
|
unkown
|
page execute and write copy
|
||
1003000
|
unkown
|
page execute and read and write
|
||
4AD0000
|
direct allocation
|
page execute and read and write
|
||
344F000
|
stack
|
page read and write
|
||
2A07000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
3F8F000
|
stack
|
page read and write
|
||
FCE000
|
unkown
|
page execute and read and write
|
||
3ACE000
|
stack
|
page read and write
|
||
E32000
|
unkown
|
page execute and write copy
|
||
4920000
|
direct allocation
|
page read and write
|
||
1050000
|
unkown
|
page execute and read and write
|
||
394F000
|
stack
|
page read and write
|
||
1011000
|
unkown
|
page execute and write copy
|
||
7160000
|
heap
|
page execute and read and write
|
||
1016000
|
unkown
|
page execute and write copy
|
||
4920000
|
direct allocation
|
page read and write
|
||
4920000
|
direct allocation
|
page read and write
|
||
4C30000
|
trusted library allocation
|
page read and write
|
||
FB5000
|
unkown
|
page execute and read and write
|
||
334E000
|
stack
|
page read and write
|
||
448F000
|
stack
|
page read and write
|
||
40CF000
|
stack
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
4920000
|
direct allocation
|
page read and write
|
||
CD1000
|
heap
|
page read and write
|
||
4930000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
4920000
|
direct allocation
|
page read and write
|
||
C82000
|
heap
|
page read and write
|
||
1023000
|
unkown
|
page execute and write copy
|
||
4BEF000
|
stack
|
page read and write
|
||
10D6000
|
unkown
|
page execute and write copy
|
||
8F9000
|
stack
|
page read and write
|
||
10D8000
|
unkown
|
page execute and write copy
|
||
1033000
|
unkown
|
page execute and write copy
|
||
103E000
|
unkown
|
page execute and read and write
|
||
358F000
|
stack
|
page read and write
|
||
5E45000
|
trusted library allocation
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
105D000
|
unkown
|
page execute and read and write
|
||
FDA000
|
unkown
|
page execute and write copy
|
||
713E000
|
stack
|
page read and write
|
||
2D0F000
|
stack
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
1013000
|
unkown
|
page execute and write copy
|
||
FF2000
|
unkown
|
page execute and write copy
|
||
1066000
|
unkown
|
page execute and read and write
|
||
AE4000
|
heap
|
page read and write
|
||
2B0F000
|
stack
|
page read and write
|
||
4A30000
|
trusted library allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
420F000
|
stack
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
73AE000
|
stack
|
page read and write
|
||
4920000
|
direct allocation
|
page read and write
|
||
E45000
|
unkown
|
page execute and read and write
|
||
44CE000
|
stack
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
1015000
|
unkown
|
page execute and read and write
|
||
AE4000
|
heap
|
page read and write
|
||
E30000
|
unkown
|
page readonly
|
||
AE4000
|
heap
|
page read and write
|
||
E30000
|
unkown
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
1025000
|
unkown
|
page execute and read and write
|
||
570000
|
heap
|
page read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
3A8F000
|
stack
|
page read and write
|
||
1051000
|
unkown
|
page execute and write copy
|
||
4931000
|
heap
|
page read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
E36000
|
unkown
|
page write copy
|
||
4C80000
|
trusted library allocation
|
page execute and read and write
|
||
ACE000
|
stack
|
page read and write
|
||
C4A000
|
heap
|
page read and write
|
||
10BF000
|
unkown
|
page execute and read and write
|
||
AE4000
|
heap
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
3FCE000
|
stack
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
heap
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
4920000
|
direct allocation
|
page read and write
|
||
4AD3000
|
trusted library allocation
|
page execute and read and write
|
||
3E8E000
|
stack
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
AE4000
|
heap
|
page read and write
|
||
1054000
|
unkown
|
page execute and read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
438E000
|
stack
|
page read and write
|
||
4920000
|
direct allocation
|
page read and write
|
||
70FE000
|
stack
|
page read and write
|
||
4920000
|
direct allocation
|
page read and write
|
||
10C6000
|
unkown
|
page execute and write copy
|
||
10BD000
|
unkown
|
page execute and write copy
|
||
1012000
|
unkown
|
page execute and read and write
|
||
4C1B000
|
trusted library allocation
|
page execute and read and write
|
||
10C0000
|
unkown
|
page execute and write copy
|
||
4920000
|
direct allocation
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
10D8000
|
unkown
|
page execute and write copy
|
||
10C6000
|
unkown
|
page execute and write copy
|
||
AE4000
|
heap
|
page read and write
|
||
384E000
|
stack
|
page read and write
|
||
434F000
|
stack
|
page read and write
|
||
2E0F000
|
stack
|
page read and write
|
||
FD7000
|
unkown
|
page execute and write copy
|
||
C2F000
|
stack
|
page read and write
|
||
4CDC000
|
stack
|
page read and write
|
||
4A70000
|
trusted library allocation
|
page read and write
|
||
424E000
|
stack
|
page read and write
|
||
36CF000
|
stack
|
page read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
E36000
|
unkown
|
page write copy
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
5E24000
|
trusted library allocation
|
page read and write
|
||
4C90000
|
heap
|
page execute and read and write
|
||
4920000
|
direct allocation
|
page read and write
|
||
105B000
|
unkown
|
page execute and write copy
|
||
C40000
|
heap
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
35CE000
|
stack
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
50C000
|
stack
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
E44000
|
unkown
|
page execute and write copy
|
||
31CF000
|
stack
|
page read and write
|
||
4BF4000
|
trusted library allocation
|
page read and write
|
||
297F000
|
stack
|
page read and write
|
||
45CF000
|
stack
|
page read and write
|
||
6FFE000
|
stack
|
page read and write
|
||
E3A000
|
unkown
|
page execute and write copy
|
||
4C00000
|
trusted library allocation
|
page read and write
|
||
4C0A000
|
trusted library allocation
|
page execute and read and write
|
||
380F000
|
stack
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
FC3000
|
unkown
|
page execute and write copy
|
||
4940000
|
heap
|
page read and write
|
||
4ADD000
|
trusted library allocation
|
page execute and read and write
|
||
320E000
|
stack
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
DBB000
|
stack
|
page read and write
|
||
10D6000
|
unkown
|
page execute and read and write
|
||
3D0F000
|
stack
|
page read and write
|
||
72AE000
|
stack
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
4C17000
|
trusted library allocation
|
page execute and read and write
|
||
4E21000
|
trusted library allocation
|
page read and write
|
||
410E000
|
stack
|
page read and write
|
||
6FBD000
|
stack
|
page read and write
|
||
308F000
|
stack
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
FC3000
|
unkown
|
page execute and read and write
|
||
C96000
|
heap
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
4ABC000
|
stack
|
page read and write
|
||
E3A000
|
unkown
|
page execute and read and write
|
||
FDC000
|
unkown
|
page execute and read and write
|
||
398E000
|
stack
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
726E000
|
stack
|
page read and write
|
||
1064000
|
unkown
|
page execute and write copy
|
||
29BE000
|
stack
|
page read and write
|
||
3C0E000
|
stack
|
page read and write
|
||
FA3000
|
unkown
|
page execute and read and write
|
||
FD8000
|
unkown
|
page execute and read and write
|
||
4C10000
|
trusted library allocation
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
5E21000
|
trusted library allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
4AD4000
|
trusted library allocation
|
page read and write
|
||
4E1E000
|
stack
|
page read and write
|
||
FCB000
|
unkown
|
page execute and write copy
|
||
CD3000
|
heap
|
page read and write
|
||
1017000
|
unkown
|
page execute and read and write
|
||
4931000
|
heap
|
page read and write
|
||
3D4E000
|
stack
|
page read and write
|
||
104E000
|
unkown
|
page execute and write copy
|
||
AE4000
|
heap
|
page read and write
|
||
103A000
|
unkown
|
page execute and read and write
|
||
AE4000
|
heap
|
page read and write
|
||
C8D000
|
heap
|
page read and write
|
||
E32000
|
unkown
|
page execute and read and write
|
||
3E4F000
|
stack
|
page read and write
|
||
29FE000
|
stack
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
E20000
|
direct allocation
|
page read and write
|
||
4A30000
|
heap
|
page read and write
|
||
2C0F000
|
stack
|
page read and write
|
||
3BCF000
|
stack
|
page read and write
|
||
FCA000
|
unkown
|
page execute and read and write
|
||
4920000
|
direct allocation
|
page read and write
|
There are 198 hidden memdumps, click here to show them.