IOC Report
checksums.txt

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\notepad.exe
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\checksums.txt

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWindowsOnlyEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fPasteOriginalEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fReverse
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWrapAround
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fMatchCase

Memdumps

Base Address
Regiontype
Protect
Malicious
19552550000
heap
page read and write
345AA7F000
stack
page read and write
19553FC0000
trusted library allocation
page read and write
19553FF3000
heap
page read and write
19552589000
heap
page read and write
19553EE0000
heap
page read and write
195540C0000
heap
page read and write
19552520000
heap
page read and write
345A588000
stack
page read and write
195525CC000
heap
page read and write
19552589000
heap
page read and write
19552586000
heap
page read and write
195540C5000
heap
page read and write
19553FF0000
heap
page read and write
19552558000
heap
page read and write
19554000000
heap
page read and write
345A97E000
stack
page read and write
1955258A000
heap
page read and write
195540CC000
heap
page read and write
19552530000
heap
page read and write
19552580000
heap
page read and write
19554500000
heap
page read and write
19556010000
trusted library allocation
page read and write
There are 13 hidden memdumps, click here to show them.