Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3B3E000
|
stack
|
page read and write
|
||
156E000
|
stack
|
page read and write
|
||
105B000
|
unkown
|
page execute and read and write
|
||
FCE000
|
unkown
|
page execute and read and write
|
||
5151000
|
heap
|
page read and write
|
||
5160000
|
heap
|
page read and write
|
||
5140000
|
direct allocation
|
page read and write
|
||
115C000
|
heap
|
page read and write
|
||
3EFE000
|
stack
|
page read and write
|
||
4A3E000
|
stack
|
page read and write
|
||
5140000
|
direct allocation
|
page read and write
|
||
66A1000
|
trusted library allocation
|
page read and write
|
||
10DE000
|
unkown
|
page execute and write copy
|
||
5140000
|
direct allocation
|
page read and write
|
||
413F000
|
stack
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
5290000
|
trusted library allocation
|
page read and write
|
||
5151000
|
heap
|
page read and write
|
||
3EBF000
|
stack
|
page read and write
|
||
77DD000
|
stack
|
page read and write
|
||
FDF000
|
unkown
|
page execute and read and write
|
||
3DBE000
|
stack
|
page read and write
|
||
53DE000
|
stack
|
page read and write
|
||
FC1000
|
unkown
|
page execute and read and write
|
||
5590000
|
heap
|
page execute and read and write
|
||
4B7E000
|
stack
|
page read and write
|
||
5151000
|
heap
|
page read and write
|
||
3AFF000
|
stack
|
page read and write
|
||
10C5000
|
unkown
|
page execute and write copy
|
||
FB7000
|
unkown
|
page execute and read and write
|
||
CFC000
|
stack
|
page read and write
|
||
7BDE000
|
stack
|
page read and write
|
||
DF9000
|
stack
|
page read and write
|
||
377E000
|
stack
|
page read and write
|
||
5400000
|
trusted library allocation
|
page read and write
|
||
5100000
|
direct allocation
|
page read and write
|
||
5140000
|
direct allocation
|
page read and write
|
||
5430000
|
trusted library allocation
|
page read and write
|
||
5151000
|
heap
|
page read and write
|
||
781E000
|
stack
|
page read and write
|
||
5294000
|
trusted library allocation
|
page read and write
|
||
E32000
|
unkown
|
page execute and read and write
|
||
5151000
|
heap
|
page read and write
|
||
403E000
|
stack
|
page read and write
|
||
791E000
|
stack
|
page read and write
|
||
34BF000
|
stack
|
page read and write
|
||
5140000
|
direct allocation
|
page read and write
|
||
5140000
|
direct allocation
|
page read and write
|
||
43FE000
|
stack
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
1050000
|
unkown
|
page execute and write copy
|
||
4B3F000
|
stack
|
page read and write
|
||
1051000
|
unkown
|
page execute and read and write
|
||
5270000
|
trusted library allocation
|
page read and write
|
||
547E000
|
stack
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
F9E000
|
unkown
|
page execute and write copy
|
||
110A000
|
heap
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
1064000
|
unkown
|
page execute and read and write
|
||
417E000
|
stack
|
page read and write
|
||
E30000
|
unkown
|
page readonly
|
||
307E000
|
stack
|
page read and write
|
||
103F000
|
unkown
|
page execute and write copy
|
||
39FE000
|
stack
|
page read and write
|
||
E36000
|
unkown
|
page write copy
|
||
5120000
|
heap
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
5140000
|
direct allocation
|
page read and write
|
||
453E000
|
stack
|
page read and write
|
||
1041000
|
unkown
|
page execute and read and write
|
||
FCB000
|
unkown
|
page execute and write copy
|
||
102A000
|
unkown
|
page execute and write copy
|
||
E3A000
|
unkown
|
page execute and read and write
|
||
48FE000
|
stack
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
2FFB000
|
stack
|
page read and write
|
||
5151000
|
heap
|
page read and write
|
||
E3A000
|
unkown
|
page execute and write copy
|
||
38BE000
|
stack
|
page read and write
|
||
3D7F000
|
stack
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
5151000
|
heap
|
page read and write
|
||
17CF000
|
stack
|
page read and write
|
||
1052000
|
unkown
|
page execute and write copy
|
||
528D000
|
trusted library allocation
|
page execute and read and write
|
||
5140000
|
direct allocation
|
page read and write
|
||
30B7000
|
heap
|
page read and write
|
||
10C7000
|
unkown
|
page execute and read and write
|
||
48BF000
|
stack
|
page read and write
|
||
799E000
|
stack
|
page read and write
|
||
5151000
|
heap
|
page read and write
|
||
53FA000
|
trusted library allocation
|
page execute and read and write
|
||
540B000
|
trusted library allocation
|
page execute and read and write
|
||
1065000
|
unkown
|
page execute and write copy
|
||
1036000
|
unkown
|
page execute and write copy
|
||
10DE000
|
unkown
|
page execute and read and write
|
||
5140000
|
direct allocation
|
page read and write
|
||
3C3F000
|
stack
|
page read and write
|
||
1057000
|
unkown
|
page execute and write copy
|
||
10C8000
|
unkown
|
page execute and write copy
|
||
463E000
|
stack
|
page read and write
|
||
5151000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page execute and write copy
|
||
1016000
|
unkown
|
page execute and read and write
|
||
4DBF000
|
stack
|
page read and write
|
||
113F000
|
heap
|
page read and write
|
||
53F0000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
direct allocation
|
page read and write
|
||
387F000
|
stack
|
page read and write
|
||
E36000
|
unkown
|
page write copy
|
||
5140000
|
direct allocation
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
16CE000
|
stack
|
page read and write
|
||
1027000
|
unkown
|
page execute and write copy
|
||
5407000
|
trusted library allocation
|
page execute and read and write
|
||
569E000
|
stack
|
page read and write
|
||
5480000
|
trusted library allocation
|
page execute and read and write
|
||
10E0000
|
unkown
|
page execute and write copy
|
||
E46000
|
unkown
|
page execute and write copy
|
||
32BF000
|
stack
|
page read and write
|
||
1191000
|
heap
|
page read and write
|
||
5283000
|
trusted library allocation
|
page execute and read and write
|
||
E30000
|
unkown
|
page read and write
|
||
1038000
|
unkown
|
page execute and read and write
|
||
7ADE000
|
stack
|
page read and write
|
||
5151000
|
heap
|
page read and write
|
||
113D000
|
heap
|
page read and write
|
||
5140000
|
direct allocation
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
47BE000
|
stack
|
page read and write
|
||
FF3000
|
unkown
|
page execute and write copy
|
||
10D0000
|
unkown
|
page execute and write copy
|
||
1100000
|
heap
|
page read and write
|
||
1148000
|
heap
|
page read and write
|
||
477F000
|
stack
|
page read and write
|
||
1029000
|
unkown
|
page execute and read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
5140000
|
direct allocation
|
page read and write
|
||
43BF000
|
stack
|
page read and write
|
||
35FF000
|
stack
|
page read and write
|
||
5151000
|
heap
|
page read and write
|
||
5284000
|
trusted library allocation
|
page read and write
|
||
5151000
|
heap
|
page read and write
|
||
3FFF000
|
stack
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
66C5000
|
trusted library allocation
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
5420000
|
heap
|
page read and write
|
||
5151000
|
heap
|
page read and write
|
||
52A0000
|
direct allocation
|
page read and write
|
||
3C7E000
|
stack
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
795E000
|
stack
|
page read and write
|
||
106F000
|
unkown
|
page execute and read and write
|
||
34FE000
|
stack
|
page read and write
|
||
F9C000
|
unkown
|
page execute and read and write
|
||
1005000
|
unkown
|
page execute and read and write
|
||
1580000
|
heap
|
page read and write
|
||
5151000
|
heap
|
page read and write
|
||
1056000
|
unkown
|
page execute and read and write
|
||
4C7F000
|
stack
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
76DC000
|
stack
|
page read and write
|
||
1585000
|
heap
|
page read and write
|
||
5151000
|
heap
|
page read and write
|
||
44FF000
|
stack
|
page read and write
|
||
10D0000
|
unkown
|
page execute and write copy
|
||
79D0000
|
heap
|
page execute and read and write
|
||
4CBE000
|
stack
|
page read and write
|
||
5250000
|
trusted library allocation
|
page read and write
|
||
39BF000
|
stack
|
page read and write
|
||
54B0000
|
heap
|
page read and write
|
||
E32000
|
unkown
|
page execute and write copy
|
||
30B0000
|
heap
|
page read and write
|
||
52A0000
|
direct allocation
|
page read and write
|
||
102E000
|
unkown
|
page execute and read and write
|
||
5150000
|
heap
|
page read and write
|
||
467E000
|
stack
|
page read and write
|
||
1013000
|
unkown
|
page execute and write copy
|
||
FDE000
|
unkown
|
page execute and write copy
|
||
5140000
|
direct allocation
|
page read and write
|
||
56A1000
|
trusted library allocation
|
page read and write
|
||
52DC000
|
stack
|
page read and write
|
||
5151000
|
heap
|
page read and write
|
||
5140000
|
direct allocation
|
page read and write
|
||
168E000
|
stack
|
page read and write
|
||
1063000
|
unkown
|
page execute and write copy
|
||
49FF000
|
stack
|
page read and write
|
||
110E000
|
heap
|
page read and write
|
||
FC1000
|
unkown
|
page execute and write copy
|
||
66A4000
|
trusted library allocation
|
page read and write
|
There are 184 hidden memdumps, click here to show them.