IOC Report
License premium.txt

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\notepad.exe
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\License premium.txt

URLs

Name
IP
Malicious
http://www.freepik.com/terms_of_use
unknown
https://profile.freepik.com/my_downloads
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWindowsOnlyEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fPasteOriginalEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fReverse
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWrapAround
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fMatchCase

Memdumps

Base Address
Regiontype
Protect
Malicious
2922DF4D000
heap
page read and write
2922DF20000
heap
page read and write
2922F990000
heap
page read and write
2922F960000
trusted library allocation
page read and write
2922DF69000
heap
page read and write
2922F880000
heap
page read and write
2922FA10000
heap
page read and write
29231AB0000
trusted library allocation
page read and write
2922F973000
heap
page read and write
F87CA78000
stack
page read and write
2922DF10000
heap
page read and write
2922DF8C000
heap
page read and write
2922FA1C000
heap
page read and write
2922DEC0000
heap
page read and write
2922DED0000
heap
page read and write
F87CCFE000
stack
page read and write
2922DF18000
heap
page read and write
29230200000
heap
page read and write
2922DF40000
heap
page read and write
2922FA15000
heap
page read and write
F87CBFD000
stack
page read and write
2922F970000
heap
page read and write
There are 12 hidden memdumps, click here to show them.