IOC Report
text_0.txt

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\notepad.exe
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\text_0.txt

Memdumps

Base Address
Regiontype
Protect
Malicious
1F92FEDB000
heap
page read and write
1F92FE80000
heap
page read and write
1F92FE30000
heap
page read and write
AF21D7F000
stack
page read and write
1F92FDF0000
heap
page read and write
1F92FEDC000
heap
page read and write
1F92FF1D000
heap
page read and write
AF21C7E000
stack
page read and write
1F92FDE0000
heap
page read and write
1F934050000
heap
page read and write
1F9319F0000
heap
page read and write
1F92FEA0000
heap
page read and write
1F92FEA8000
heap
page read and write
1F92FED4000
heap
page read and write
1F933850000
trusted library allocation
page read and write
1F931890000
trusted library allocation
page read and write
1F92FE83000
heap
page read and write
1F9319F5000
heap
page read and write
AF218D8000
stack
page read and write
1F92FED2000
heap
page read and write
1F9319A0000
heap
page read and write
1F9319FC000
heap
page read and write
There are 12 hidden memdumps, click here to show them.