IOC Report
STAT.73141122.20240702_181955.26454351.txt

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\notepad.exe
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\STAT.73141122.20240702_181955.26454351.txt

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWindowsOnlyEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fPasteOriginalEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fReverse
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWrapAround
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fMatchCase

Memdumps

Base Address
Regiontype
Protect
Malicious
1D49D238000
heap
page read and write
1D49D26D000
heap
page read and write
1D49D240000
heap
page read and write
1D49D2B6000
heap
page read and write
1D49EC75000
heap
page read and write
1D49D266000
heap
page read and write
1D49D269000
heap
page read and write
1D4A0C60000
trusted library allocation
page read and write
1D49EE00000
heap
page read and write
1D49D330000
heap
page read and write
1D49D287000
heap
page read and write
1D49EC7C000
heap
page read and write
1D49D230000
heap
page read and write
5486FFF000
stack
page read and write
1D49D260000
heap
page read and write
1D49D140000
heap
page read and write
1D49D269000
heap
page read and write
1D49EBE0000
trusted library allocation
page read and write
1D49D26E000
heap
page read and write
1D49EC70000
heap
page read and write
1D49EB00000
heap
page read and write
5486EFD000
stack
page read and write
1D4A1460000
heap
page read and write
1D49EE03000
heap
page read and write
5486B78000
stack
page read and write
1D49EC00000
heap
page read and write
There are 16 hidden memdumps, click here to show them.