IOC Report
bygJVbkRM5

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\notepad.exe
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\bygJVbkRM5.txt

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWindowsOnlyEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fPasteOriginalEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fReverse
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWrapAround
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fMatchCase

Memdumps

Base Address
Regiontype
Protect
Malicious
24FB5823000
heap
page read and write
24FB7580000
trusted library allocation
page read and write
CEF02FE000
stack
page read and write
24FB3BF0000
heap
page read and write
24FB3CB0000
heap
page read and write
24FB3D34000
heap
page read and write
24FB3CEB000
heap
page read and write
24FB5680000
heap
page read and write
24FB3D05000
heap
page read and write
24FB5820000
heap
page read and write
24FB3D29000
heap
page read and write
24FB3CE1000
heap
page read and write
24FB3D44000
heap
page read and write
CEF01FD000
stack
page read and write
24FB3BB0000
heap
page read and write
24FB56AC000
heap
page read and write
24FB3D34000
heap
page read and write
CEF0078000
stack
page read and write
24FB5570000
trusted library allocation
page read and write
24FB56A0000
heap
page read and write
24FB3CB8000
heap
page read and write
24FB3AD0000
heap
page read and write
24FB56A5000
heap
page read and write
24FB3D1E000
heap
page read and write
24FB7D80000
heap
page read and write
24FB3D2D000
heap
page read and write
There are 16 hidden memdumps, click here to show them.