Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4C11000
|
heap
|
page read and write
|
||
7280000
|
trusted library allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1023000
|
heap
|
page read and write
|
||
605000
|
unkown
|
page execute and read and write
|
||
4C20000
|
heap
|
page read and write
|
||
633000
|
unkown
|
page execute and write copy
|
||
5F3000
|
unkown
|
page execute and write copy
|
||
596000
|
unkown
|
page execute and write copy
|
||
3DA000
|
unkown
|
page execute and read and write
|
||
581000
|
unkown
|
page execute and write copy
|
||
4ED0000
|
trusted library allocation
|
page read and write
|
||
4F60000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
4D7D000
|
trusted library allocation
|
page execute and read and write
|
||
4FB0000
|
heap
|
page execute and read and write
|
||
5D7000
|
unkown
|
page execute and write copy
|
||
FFE000
|
stack
|
page read and write
|
||
675000
|
unkown
|
page execute and write copy
|
||
4C00000
|
direct allocation
|
page read and write
|
||
4C00000
|
direct allocation
|
page read and write
|
||
A9C000
|
stack
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
4D50000
|
trusted library allocation
|
page read and write
|
||
563000
|
unkown
|
page execute and read and write
|
||
E44000
|
heap
|
page read and write
|
||
60C1000
|
trusted library allocation
|
page read and write
|
||
4C00000
|
direct allocation
|
page read and write
|
||
4BE0000
|
direct allocation
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
387E000
|
stack
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
45FF000
|
stack
|
page read and write
|
||
56C000
|
unkown
|
page execute and write copy
|
||
7410000
|
heap
|
page execute and read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
67D000
|
unkown
|
page execute and write copy
|
||
60C4000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
626000
|
unkown
|
page execute and write copy
|
||
11FF000
|
stack
|
page read and write
|
||
68C000
|
unkown
|
page execute and write copy
|
||
2F7F000
|
stack
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
105D000
|
heap
|
page read and write
|
||
582000
|
unkown
|
page execute and read and write
|
||
5E3000
|
unkown
|
page execute and write copy
|
||
3E6000
|
unkown
|
page execute and write copy
|
||
72BE000
|
stack
|
page read and write
|
||
4F5E000
|
stack
|
page read and write
|
||
4D60000
|
direct allocation
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
4DCB000
|
stack
|
page read and write
|
||
4C00000
|
direct allocation
|
page read and write
|
||
4C00000
|
direct allocation
|
page read and write
|
||
30BF000
|
stack
|
page read and write
|
||
600000
|
unkown
|
page execute and write copy
|
||
B99000
|
stack
|
page read and write
|
||
635000
|
unkown
|
page execute and read and write
|
||
4C00000
|
direct allocation
|
page read and write
|
||
4C00000
|
direct allocation
|
page read and write
|
||
477E000
|
stack
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
3C3E000
|
stack
|
page read and write
|
||
2C20000
|
heap
|
page read and write
|
||
541000
|
unkown
|
page execute and write copy
|
||
62A000
|
unkown
|
page execute and read and write
|
||
67D000
|
unkown
|
page execute and write copy
|
||
12FF000
|
stack
|
page read and write
|
||
5BB000
|
unkown
|
page execute and read and write
|
||
4FAC000
|
stack
|
page read and write
|
||
4EFB000
|
trusted library allocation
|
page execute and read and write
|
||
4D73000
|
trusted library allocation
|
page execute and read and write
|
||
3FBE000
|
stack
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
2E7E000
|
stack
|
page read and write
|
||
615000
|
unkown
|
page execute and read and write
|
||
4D80000
|
heap
|
page read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
3D6000
|
unkown
|
page write copy
|
||
3BFF000
|
stack
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
100E000
|
heap
|
page read and write
|
||
725D000
|
stack
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page read and write
|
||
60A000
|
unkown
|
page execute and read and write
|
||
487F000
|
stack
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
594000
|
unkown
|
page execute and read and write
|
||
31FF000
|
stack
|
page read and write
|
||
103F000
|
heap
|
page read and write
|
||
4D60000
|
direct allocation
|
page read and write
|
||
73FE000
|
stack
|
page read and write
|
||
673000
|
unkown
|
page execute and write copy
|
||
F9E000
|
stack
|
page read and write
|
||
333F000
|
stack
|
page read and write
|
||
3DA000
|
unkown
|
page execute and write copy
|
||
751E000
|
stack
|
page read and write
|
||
2BDB000
|
stack
|
page read and write
|
||
592000
|
unkown
|
page execute and write copy
|
||
100A000
|
heap
|
page read and write
|
||
60E5000
|
trusted library allocation
|
page read and write
|
||
68A000
|
unkown
|
page execute and write copy
|
||
44BF000
|
stack
|
page read and write
|
||
50BE000
|
stack
|
page read and write
|
||
56D000
|
unkown
|
page execute and read and write
|
||
E44000
|
heap
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
4EF7000
|
trusted library allocation
|
page execute and read and write
|
||
4C00000
|
direct allocation
|
page read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
7270000
|
trusted library allocation
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
73BF000
|
stack
|
page read and write
|
||
5E9000
|
unkown
|
page execute and read and write
|
||
7260000
|
trusted library allocation
|
page execute and read and write
|
||
3D2000
|
unkown
|
page execute and read and write
|
||
4C00000
|
direct allocation
|
page read and write
|
||
40FF000
|
stack
|
page read and write
|
||
4C00000
|
direct allocation
|
page read and write
|
||
755E000
|
stack
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
397F000
|
stack
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
563000
|
unkown
|
page execute and write copy
|
||
2B9F000
|
stack
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
674000
|
unkown
|
page execute and read and write
|
||
4D74000
|
trusted library allocation
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
5B8000
|
unkown
|
page execute and write copy
|
||
4C00000
|
direct allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
68C000
|
unkown
|
page execute and write copy
|
||
5E2000
|
unkown
|
page execute and read and write
|
||
E44000
|
heap
|
page read and write
|
||
3D6000
|
unkown
|
page write copy
|
||
3D3F000
|
stack
|
page read and write
|
||
4EF0000
|
direct allocation
|
page execute and read and write
|
||
4C00000
|
direct allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
F5E000
|
stack
|
page read and write
|
||
68A000
|
unkown
|
page execute and read and write
|
||
4D60000
|
direct allocation
|
page read and write
|
||
558000
|
unkown
|
page execute and read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
2C1E000
|
stack
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
423F000
|
stack
|
page read and write
|
||
2D3F000
|
stack
|
page read and write
|
||
473F000
|
stack
|
page read and write
|
||
39BE000
|
stack
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
53F000
|
unkown
|
page execute and read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
1048000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
50C1000
|
trusted library allocation
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
2C37000
|
heap
|
page read and write
|
||
606000
|
unkown
|
page execute and write copy
|
||
4C11000
|
heap
|
page read and write
|
||
610000
|
unkown
|
page execute and write copy
|
||
4ED4000
|
trusted library allocation
|
page read and write
|
||
765E000
|
stack
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
427E000
|
stack
|
page read and write
|
||
5F8000
|
unkown
|
page execute and read and write
|
||
44FE000
|
stack
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
4EEA000
|
trusted library allocation
|
page execute and read and write
|
||
3EBD000
|
stack
|
page read and write
|
||
3D2000
|
unkown
|
page execute and write copy
|
||
373E000
|
stack
|
page read and write
|
||
5A9000
|
unkown
|
page execute and read and write
|
||
4D10000
|
heap
|
page read and write
|
||
463E000
|
stack
|
page read and write
|
||
4ECF000
|
stack
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
There are 190 hidden memdumps, click here to show them.