IOC Report
sdhjfwisfbvsi.eps

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1A14C060000
heap
page read and write
1A14A078000
heap
page read and write
1A14BFBF000
heap
page read and write
1A14C0F1000
heap
page read and write
1A14C0A9000
heap
page read and write
1A14BF8B000
heap
page read and write
1A14C15C000
heap
page read and write
1A14C130000
heap
page read and write
5755BFE000
stack
page read and write
1A14BFAA000
heap
page read and write
1A14BF60000
heap
page read and write
1A14A0A3000
heap
page read and write
1A14BF9B000
heap
page read and write
1A14E7F1000
heap
page read and write
1A14A0A2000
heap
page read and write
1A14A039000
heap
page read and write
1A14BF93000
heap
page read and write
1A14C12B000
heap
page read and write
1A14C072000
heap
page read and write
1A14BF74000
heap
page read and write
1A14C0A9000
heap
page read and write
1A14C12C000
heap
page read and write
1A14BFAE000
heap
page read and write
1A14C0B1000
heap
page read and write
1A14A08A000
heap
page read and write
1A14BFA5000
heap
page read and write
1A14A0A1000
heap
page read and write
1A14BFBC000
heap
page read and write
1A14BFA5000
heap
page read and write
1A14BF8B000
heap
page read and write
575587E000
stack
page read and write
1A14BF8F000
heap
page read and write
1A14C131000
heap
page read and write
1A14C09A000
heap
page read and write
1A14A0E0000
heap
page read and write
1A14C0B1000
heap
page read and write
1A14E7EB000
heap
page read and write
1A14B8C0000
heap
page read and write
1A14A081000
heap
page read and write
1A14A07A000
heap
page read and write
1A14BFAE000
heap
page read and write
1A14E7B7000
heap
page read and write
1A14BF9E000
heap
page read and write
1A149FE0000
heap
page read and write
1A14BF7C000
heap
page read and write
1A14BFAA000
heap
page read and write
1A14BF9E000
heap
page read and write
1A14C12B000
heap
page read and write
1A14A08A000
heap
page read and write
1A14C12B000
heap
page read and write
1A14BFA5000
heap
page read and write
1A14C150000
heap
page read and write
1A14BFAA000
heap
page read and write
1A14C150000
heap
page read and write
1A14C11B000
heap
page read and write
1A14BF89000
heap
page read and write
1A14BFAE000
heap
page read and write
1A14C092000
heap
page read and write
1A14BF90000
heap
page read and write
5755AFB000
stack
page read and write
1A14A090000
heap
page read and write
1A14BF9E000
heap
page read and write
1A14C0B1000
heap
page read and write
1A14C109000
heap
page read and write
1A14A0A0000
heap
page read and write
1A14A072000
heap
page read and write
1A14BF9E000
heap
page read and write
1A14A08A000
heap
page read and write
1A14C09A000
heap
page read and write
1A14A08A000
heap
page read and write
1A14C0EE000
heap
page read and write
1A14A088000
heap
page read and write
1A14C136000
heap
page read and write
1A14BFAA000
heap
page read and write
1A14BF9E000
heap
page read and write
1A14C10B000
heap
page read and write
1A14BFAE000
heap
page read and write
1A14C0A1000
heap
page read and write
1A14C0E7000
heap
page read and write
1A14BF8F000
heap
page read and write
1A14C11B000
heap
page read and write
1A14C11D000
heap
page read and write
1A14C096000
heap
page read and write
1A14BFB3000
heap
page read and write
1A14A09E000
heap
page read and write
1A14BF93000
heap
page read and write
1A14BFAE000
heap
page read and write
1A14C086000
heap
page read and write
1A14E7B0000
heap
page read and write
1A14BFA5000
heap
page read and write
1A14C11B000
heap
page read and write
1A14BF7C000
heap
page read and write
1A14C12B000
heap
page read and write
1A14A0CE000
heap
page read and write
1A14BF99000
heap
page read and write
1A14C133000
heap
page read and write
1A14C109000
heap
page read and write
1A14BF70000
heap
page read and write
1A14BFAA000
heap
page read and write
1A14C094000
heap
page read and write
1A14C102000
heap
page read and write
1A14BFAA000
heap
page read and write
1A14BF99000
heap
page read and write
1A14BF93000
heap
page read and write
1A14C102000
heap
page read and write
1A14BF9E000
heap
page read and write
1A14BFA2000
heap
page read and write
1A14C0A1000
heap
page read and write
1A14C102000
heap
page read and write
1A14C092000
heap
page read and write
1A14BF90000
heap
page read and write
1A14BFAE000
heap
page read and write
1A14E7C0000
heap
page read and write
1A14C0FB000
heap
page read and write
1A14BFB3000
heap
page read and write
1A14C098000
heap
page read and write
1A14E7EC000
heap
page read and write
1A14C086000
heap
page read and write
1A14C09A000
heap
page read and write
1A14BFAE000
heap
page read and write
1A14C109000
heap
page read and write
1A14BA60000
heap
page read and write
1A14C072000
heap
page read and write
1A150AB0000
heap
page readonly
1A14BF99000
heap
page read and write
1A14C0FB000
heap
page read and write
575577E000
stack
page read and write
1A14BF8F000
heap
page read and write
1A14E1B0000
trusted library allocation
page read and write
1A14BF70000
heap
page read and write
1A14BFAA000
heap
page read and write
1A14BFAA000
heap
page read and write
1A14BFB3000
heap
page read and write
1A14BF8A000
heap
page read and write
1A14BF99000
heap
page read and write
1A14C0B1000
heap
page read and write
1A14C11B000
heap
page read and write
1A14A0B9000
heap
page read and write
1A14BF9E000
heap
page read and write
1A14A0AD000
heap
page read and write
1A14A081000
heap
page read and write
1A14A085000
heap
page read and write
1A14E7F9000
heap
page read and write
1A14C0A1000
heap
page read and write
57558FB000
stack
page read and write
1A14C0A9000
heap
page read and write
1A14A090000
heap
page read and write
1A14BF99000
heap
page read and write
1A14A078000
heap
page read and write
1A14C102000
heap
page read and write
1A14E7BB000
heap
page read and write
1A14A0A1000
heap
page read and write
575539E000
stack
page read and write
1A14C0A1000
heap
page read and write
1A14C07F000
heap
page read and write
1A14A0AF000
heap
page read and write
1A14A03E000
heap
page read and write
1A14BFA5000
heap
page read and write
1A14C098000
heap
page read and write
1A14A0B3000
heap
page read and write
1A14BA65000
heap
page read and write
1A14BFAB000
heap
page read and write
1A14A08E000
heap
page read and write
57556FE000
stack
page read and write
1A14BFB3000
heap
page read and write
1A14A0AF000
heap
page read and write
1A14A083000
heap
page read and write
1A14C090000
heap
page read and write
1A14BFAA000
heap
page read and write
1A14BF7A000
heap
page read and write
1A14C11D000
heap
page read and write
1A14A0A1000
heap
page read and write
1A14BF86000
heap
page read and write
1A14E7C6000
heap
page read and write
1A14BF99000
heap
page read and write
1A14BFAE000
heap
page read and write
1A14E7DA000
heap
page read and write
1A14A080000
heap
page read and write
1A14BFAE000
heap
page read and write
1A14EBD0000
trusted library allocation
page read and write
1A14BF9E000
heap
page read and write
1A14BF9E000
heap
page read and write
1A14C086000
heap
page read and write
1A14C120000
heap
page read and write
57557FB000
stack
page read and write
1A14BF9E000
heap
page read and write
1A14A072000
heap
page read and write
1A14C120000
heap
page read and write
1A14A0AE000
heap
page read and write
1A14BF8F000
heap
page read and write
1A14C0E9000
heap
page read and write
1A14C098000
heap
page read and write
1A14C0E5000
heap
page read and write
1A14C11D000
heap
page read and write
1A14A090000
heap
page read and write
1A14BFBB000
heap
page read and write
1A14E7B3000
heap
page read and write
1A14BFAA000
heap
page read and write
1A14BFA5000
heap
page read and write
1A14BF9E000
heap
page read and write
1A14BFAA000
heap
page read and write
1A14C12B000
heap
page read and write
1A14C086000
heap
page read and write
1A14C137000
heap
page read and write
1A14C102000
heap
page read and write
1A14C0FB000
heap
page read and write
1A14BF7C000
heap
page read and write
1A14C11B000
heap
page read and write
1A14BF95000
heap
page read and write
1A14BF8F000
heap
page read and write
1A14BF9A000
heap
page read and write
1A14BF94000
heap
page read and write
1A14BF93000
heap
page read and write
1A14C15D000
heap
page read and write
1A14BF7C000
heap
page read and write
1A14C150000
heap
page read and write
1A14BFA1000
heap
page read and write
1A14A03D000
heap
page read and write
1A14BF9E000
heap
page read and write
1A14C092000
heap
page read and write
1A14A081000
heap
page read and write
1A14A09A000
heap
page read and write
1A14B8E0000
heap
page read and write
1A14C109000
heap
page read and write
1A14BFAE000
heap
page read and write
1A14A0D6000
heap
page read and write
1A14BF78000
heap
page read and write
1A14A071000
heap
page read and write
1A14BFA5000
heap
page read and write
1A14BFB3000
heap
page read and write
1A14A0BB000
heap
page read and write
1A14BFA5000
heap
page read and write
1A14C12B000
heap
page read and write
1A14C11C000
heap
page read and write
1A14BF76000
heap
page read and write
1A14E7FB000
heap
page read and write
1A14A0B2000
heap
page read and write
1A14BFA5000
heap
page read and write
1A14C0FB000
heap
page read and write
1A14BFA5000
heap
page read and write
1A14BFAC000
heap
page read and write
1A14C094000
heap
page read and write
1A14C090000
heap
page read and write
1A14C094000
heap
page read and write
1A14A078000
heap
page read and write
1A14C109000
heap
page read and write
1A14BF93000
heap
page read and write
1A14A097000
heap
page read and write
1A14BF99000
heap
page read and write
1A14E7EB000
heap
page read and write
1A14C0A1000
heap
page read and write
1A14A086000
heap
page read and write
1A14C102000
heap
page read and write
1A14A090000
heap
page read and write
1A14BF83000
heap
page read and write
1A14C090000
heap
page read and write
1A14A078000
heap
page read and write
1A14BFA5000
heap
page read and write
1A14E7F3000
heap
page read and write
1A149F00000
heap
page read and write
1A14BFAB000
heap
page read and write
1A14C096000
heap
page read and write
1A14C11B000
heap
page read and write
1A14BFAE000
heap
page read and write
1A14C0FB000
heap
page read and write
1A14C0A1000
heap
page read and write
1A14C12B000
heap
page read and write
1A14BFB3000
heap
page read and write
1A14BFAA000
heap
page read and write
1A14BFB3000
heap
page read and write
1A14BFAA000
heap
page read and write
1A14C096000
heap
page read and write
1A14A094000
heap
page read and write
1A14BF99000
heap
page read and write
1A14C0A1000
heap
page read and write
1A14BFAE000
heap
page read and write
575567E000
stack
page read and write
1A14C11D000
heap
page read and write
7DF400FE1000
trusted library allocation
page execute read
1A14BFAE000
heap
page read and write
1A14C150000
heap
page read and write
1A14A090000
heap
page read and write
1A14C0EC000
heap
page read and write
1A14C150000
heap
page read and write
1A14BFA5000
heap
page read and write
1A14C11D000
heap
page read and write
1A14BFAE000
heap
page read and write
1A14BFAA000
heap
page read and write
1A14BFAE000
heap
page read and write
1A14EDC0000
heap
page read and write
1A14C0E3000
heap
page read and write
1A14C133000
heap
page read and write
1A14C12D000
heap
page read and write
1A14BFB7000
heap
page read and write
1A14BFAA000
heap
page read and write
1A14E7F1000
heap
page read and write
1A14A06D000
heap
page read and write
5755317000
stack
page read and write
1A14BFAA000
heap
page read and write
1A14BF84000
heap
page read and write
1A14BF96000
heap
page read and write
1A14BFA6000
heap
page read and write
1A14A0B8000
heap
page read and write
1A14C07A000
heap
page read and write
1A14A08F000
heap
page read and write
There are 295 hidden memdumps, click here to show them.