Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4D21000
|
heap
|
page read and write
|
||
4E54000
|
trusted library allocation
|
page read and write
|
||
A83000
|
unkown
|
page execute and write copy
|
||
36BF000
|
stack
|
page read and write
|
||
3A7F000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
A49000
|
unkown
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
B32000
|
unkown
|
page execute and read and write
|
||
B9C000
|
stack
|
page read and write
|
||
A9B000
|
unkown
|
page execute and write copy
|
||
10B0000
|
heap
|
page read and write
|
||
A14000
|
unkown
|
page execute and read and write
|
||
46FF000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
487E000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4CF0000
|
heap
|
page read and write
|
||
497F000
|
stack
|
page read and write
|
||
A90000
|
unkown
|
page execute and write copy
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
A9D000
|
unkown
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
AAB000
|
unkown
|
page execute and read and write
|
||
A30000
|
unkown
|
page execute and write copy
|
||
6325000
|
trusted library allocation
|
page read and write
|
||
4ECA000
|
trusted library allocation
|
page execute and read and write
|
||
88A000
|
unkown
|
page execute and write copy
|
||
B32000
|
unkown
|
page execute and write copy
|
||
AA6000
|
unkown
|
page execute and read and write
|
||
77FE000
|
stack
|
page read and write
|
||
B23000
|
unkown
|
page execute and write copy
|
||
4D10000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
114F000
|
heap
|
page read and write
|
||
A54000
|
unkown
|
page execute and write copy
|
||
4D21000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1107000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
423E000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5160000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
10CA000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
886000
|
unkown
|
page write copy
|
||
45BF000
|
stack
|
page read and write
|
||
AC5000
|
unkown
|
page execute and read and write
|
||
EF9000
|
stack
|
page read and write
|
||
ABB000
|
unkown
|
page execute and write copy
|
||
B1D000
|
unkown
|
page execute and write copy
|
||
44BE000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
501F000
|
stack
|
page read and write
|
||
52DE000
|
stack
|
page read and write
|
||
5301000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
2BDB000
|
stack
|
page read and write
|
||
A82000
|
unkown
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
A71000
|
unkown
|
page execute and read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
753E000
|
stack
|
page read and write
|
||
AB3000
|
unkown
|
page execute and read and write
|
||
6304000
|
trusted library allocation
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
AA7000
|
unkown
|
page execute and write copy
|
||
4D21000
|
heap
|
page read and write
|
||
40BE000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
A6C000
|
unkown
|
page execute and write copy
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
73FD000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1025000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
9F2000
|
unkown
|
page execute and read and write
|
||
4ED0000
|
trusted library allocation
|
page read and write
|
||
524C000
|
stack
|
page read and write
|
||
A7F000
|
unkown
|
page execute and write copy
|
||
3BFE000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
447F000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
2C77000
|
heap
|
page read and write
|
||
3E7E000
|
stack
|
page read and write
|
||
896000
|
unkown
|
page execute and write copy
|
||
4D21000
|
heap
|
page read and write
|
||
473E000
|
stack
|
page read and write
|
||
13BF000
|
stack
|
page read and write
|
||
3F7F000
|
stack
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
529E000
|
stack
|
page read and write
|
||
3ABE000
|
stack
|
page read and write
|
||
AA4000
|
unkown
|
page execute and write copy
|
||
2C5E000
|
stack
|
page read and write
|
||
4ED7000
|
trusted library allocation
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
A6D000
|
unkown
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
483F000
|
stack
|
page read and write
|
||
437E000
|
stack
|
page read and write
|
||
882000
|
unkown
|
page execute and write copy
|
||
40FE000
|
stack
|
page read and write
|
||
4E53000
|
trusted library allocation
|
page execute and read and write
|
||
52F0000
|
heap
|
page execute and read and write
|
||
2D7F000
|
stack
|
page read and write
|
||
A09000
|
unkown
|
page execute and read and write
|
||
A31000
|
unkown
|
page execute and read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
A6E000
|
unkown
|
page execute and write copy
|
||
4D10000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
3BBF000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
45FE000
|
stack
|
page read and write
|
||
A14000
|
unkown
|
page execute and write copy
|
||
4D21000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
882000
|
unkown
|
page execute and read and write
|
||
10CE000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
111B000
|
heap
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
9F4000
|
unkown
|
page execute and write copy
|
||
4EAB000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
A2C000
|
unkown
|
page execute and write copy
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
B23000
|
unkown
|
page execute and write copy
|
||
4D21000
|
heap
|
page read and write
|
||
5250000
|
trusted library allocation
|
page read and write
|
||
2C1E000
|
stack
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
31FE000
|
stack
|
page read and write
|
||
505E000
|
stack
|
page read and write
|
||
6301000
|
trusted library allocation
|
page read and write
|
||
4E64000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4E5D000
|
trusted library allocation
|
page execute and read and write
|
||
A50000
|
unkown
|
page execute and write copy
|
||
75F0000
|
heap
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
A5C000
|
unkown
|
page execute and read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
A48000
|
unkown
|
page execute and write copy
|
||
4E40000
|
trusted library allocation
|
page read and write
|
||
4EDB000
|
trusted library allocation
|
page execute and read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
A53000
|
unkown
|
page execute and read and write
|
||
A9A000
|
unkown
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
880000
|
unkown
|
page read and write
|
||
4EF0000
|
direct allocation
|
page execute and read and write
|
||
76FE000
|
stack
|
page read and write
|
||
5260000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
88A000
|
unkown
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
880000
|
unkown
|
page readonly
|
||
41FF000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
886000
|
unkown
|
page write copy
|
||
35BE000
|
stack
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
433F000
|
stack
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
10FC000
|
heap
|
page read and write
|
||
AB2000
|
unkown
|
page execute and write copy
|
||
4D21000
|
heap
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
10AE000
|
stack
|
page read and write
|
||
10FE000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
3FBE000
|
stack
|
page read and write
|
||
ABC000
|
unkown
|
page execute and read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
A88000
|
unkown
|
page execute and read and write
|
||
3E3F000
|
stack
|
page read and write
|
||
393F000
|
stack
|
page read and write
|
||
AC3000
|
unkown
|
page execute and write copy
|
||
A2E000
|
unkown
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
12BE000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
106E000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
3CFF000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page execute and read and write
|
||
74FE000
|
stack
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
There are 261 hidden memdumps, click here to show them.