Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
F3F000
|
heap
|
page read and write
|
||
D6F000
|
unkown
|
page execute and read and write
|
||
751E000
|
stack
|
page read and write
|
||
4AEF000
|
stack
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
2D6E000
|
stack
|
page read and write
|
||
150F000
|
stack
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
E6E000
|
unkown
|
page execute and write copy
|
||
336E000
|
stack
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
4FF0000
|
direct allocation
|
page execute and read and write
|
||
E1D000
|
unkown
|
page execute and write copy
|
||
53A1000
|
trusted library allocation
|
page read and write
|
||
E42000
|
unkown
|
page execute and read and write
|
||
DEE000
|
unkown
|
page execute and read and write
|
||
DDA000
|
unkown
|
page execute and write copy
|
||
BC2000
|
unkown
|
page execute and write copy
|
||
DB4000
|
unkown
|
page execute and read and write
|
||
D92000
|
unkown
|
page execute and read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
E1C000
|
unkown
|
page execute and read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
755E000
|
stack
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
4FC4000
|
trusted library allocation
|
page read and write
|
||
D74000
|
unkown
|
page execute and read and write
|
||
E1A000
|
unkown
|
page execute and write copy
|
||
412E000
|
stack
|
page read and write
|
||
DA1000
|
unkown
|
page execute and read and write
|
||
ECE000
|
stack
|
page read and write
|
||
D75000
|
unkown
|
page execute and write copy
|
||
DF3000
|
unkown
|
page execute and read and write
|
||
DB7000
|
unkown
|
page execute and read and write
|
||
78DE000
|
stack
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
4FEA000
|
trusted library allocation
|
page execute and read and write
|
||
B74000
|
heap
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
DE3000
|
unkown
|
page execute and write copy
|
||
F49000
|
heap
|
page read and write
|
||
472F000
|
stack
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
4FE0000
|
trusted library allocation
|
page read and write
|
||
DFD000
|
unkown
|
page execute and write copy
|
||
5020000
|
trusted library allocation
|
page execute and read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
D4F000
|
unkown
|
page execute and read and write
|
||
140E000
|
stack
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
4F70000
|
direct allocation
|
page read and write
|
||
D63000
|
unkown
|
page execute and write copy
|
||
BD6000
|
unkown
|
page execute and write copy
|
||
3E6F000
|
stack
|
page read and write
|
||
E29000
|
unkown
|
page execute and write copy
|
||
4FAC000
|
stack
|
page read and write
|
||
45EF000
|
stack
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
D50000
|
unkown
|
page execute and write copy
|
||
372E000
|
stack
|
page read and write
|
||
4FCD000
|
trusted library allocation
|
page execute and read and write
|
||
BC0000
|
unkown
|
page read and write
|
||
D62000
|
unkown
|
page execute and read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
F5E000
|
heap
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
F0E000
|
heap
|
page read and write
|
||
2DE7000
|
heap
|
page read and write
|
||
F88000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
5140000
|
trusted library allocation
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
528C000
|
stack
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
DEC000
|
unkown
|
page execute and write copy
|
||
4E31000
|
heap
|
page read and write
|
||
BC0000
|
unkown
|
page readonly
|
||
DB2000
|
unkown
|
page execute and write copy
|
||
E80000
|
unkown
|
page execute and write copy
|
||
4FFB000
|
trusted library allocation
|
page execute and read and write
|
||
B74000
|
heap
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
F8C000
|
heap
|
page read and write
|
||
74DE000
|
stack
|
page read and write
|
||
476E000
|
stack
|
page read and write
|
||
4FC3000
|
trusted library allocation
|
page execute and read and write
|
||
77DE000
|
stack
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
DE5000
|
unkown
|
page execute and read and write
|
||
B74000
|
heap
|
page read and write
|
||
DB5000
|
unkown
|
page execute and write copy
|
||
E04000
|
unkown
|
page execute and read and write
|
||
D9A000
|
unkown
|
page execute and write copy
|
||
D39000
|
unkown
|
page execute and read and write
|
||
382F000
|
stack
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
DCA000
|
unkown
|
page execute and write copy
|
||
4E31000
|
heap
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
DA2000
|
unkown
|
page execute and write copy
|
||
E80000
|
unkown
|
page execute and write copy
|
||
51AE000
|
stack
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
E7E000
|
unkown
|
page execute and write copy
|
||
E68000
|
unkown
|
page execute and write copy
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
63A4000
|
trusted library allocation
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
BCA000
|
unkown
|
page execute and write copy
|
||
B74000
|
heap
|
page read and write
|
||
D5B000
|
unkown
|
page execute and write copy
|
||
5290000
|
heap
|
page execute and read and write
|
||
AD9000
|
stack
|
page read and write
|
||
D5B000
|
unkown
|
page execute and read and write
|
||
E41000
|
unkown
|
page execute and write copy
|
||
749D000
|
stack
|
page read and write
|
||
4F70000
|
direct allocation
|
page read and write
|
||
BC2000
|
unkown
|
page execute and read and write
|
||
DCF000
|
unkown
|
page execute and read and write
|
||
49EE000
|
stack
|
page read and write
|
||
48AE000
|
stack
|
page read and write
|
||
9DC000
|
stack
|
page read and write
|
||
BD4000
|
unkown
|
page execute and write copy
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
396F000
|
stack
|
page read and write
|
||
4FF7000
|
trusted library allocation
|
page execute and read and write
|
||
4E31000
|
heap
|
page read and write
|
||
44AF000
|
stack
|
page read and write
|
||
BC6000
|
unkown
|
page write copy
|
||
E0B000
|
unkown
|
page execute and write copy
|
||
2D2B000
|
stack
|
page read and write
|
||
5030000
|
heap
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
49AF000
|
stack
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
D6E000
|
unkown
|
page execute and write copy
|
||
DE2000
|
unkown
|
page execute and read and write
|
||
D65000
|
unkown
|
page execute and read and write
|
||
BB0000
|
heap
|
page read and write
|
||
E67000
|
unkown
|
page execute and read and write
|
||
DEF000
|
unkown
|
page execute and write copy
|
||
5160000
|
heap
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
486F000
|
stack
|
page read and write
|
||
63A1000
|
trusted library allocation
|
page read and write
|
||
D8D000
|
unkown
|
page execute and write copy
|
||
4F30000
|
heap
|
page read and write
|
||
4FD4000
|
trusted library allocation
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
E64000
|
unkown
|
page execute and write copy
|
||
E7E000
|
unkown
|
page execute and read and write
|
||
D53000
|
unkown
|
page execute and read and write
|
||
539E000
|
stack
|
page read and write
|
||
DA7000
|
unkown
|
page execute and read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
4F70000
|
direct allocation
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
E0D000
|
unkown
|
page execute and read and write
|
||
B74000
|
heap
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
75D0000
|
heap
|
page execute and read and write
|
||
F41000
|
heap
|
page read and write
|
||
5150000
|
trusted library allocation
|
page read and write
|
||
76DE000
|
stack
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
BC6000
|
unkown
|
page write copy
|
||
E2A000
|
unkown
|
page execute and read and write
|
||
D91000
|
unkown
|
page execute and write copy
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
B74000
|
heap
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
2CEE000
|
stack
|
page read and write
|
||
D5F000
|
unkown
|
page execute and write copy
|
||
D90000
|
unkown
|
page execute and read and write
|
||
D3C000
|
unkown
|
page execute and write copy
|
||
E1E000
|
unkown
|
page execute and read and write
|
||
44EE000
|
stack
|
page read and write
|
||
E6E000
|
unkown
|
page execute and write copy
|
||
D70000
|
unkown
|
page execute and write copy
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
BCA000
|
unkown
|
page execute and read and write
|
||
4E31000
|
heap
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
63C5000
|
trusted library allocation
|
page read and write
|
||
D76000
|
unkown
|
page execute and read and write
|
||
B74000
|
heap
|
page read and write
|
||
BD5000
|
unkown
|
page execute and read and write
|
||
422E000
|
stack
|
page read and write
|
||
2FEF000
|
stack
|
page read and write
|
There are 214 hidden memdumps, click here to show them.