IOC Report
MicrosoftDefenderATPOnboardingLinuxServer.py

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2CB54A7E000
heap
page read and write
2CB56A8F000
heap
page read and write
2CB54A79000
heap
page read and write
2CB569E3000
heap
page read and write
2CB54980000
heap
page read and write
2CB56A85000
heap
page read and write
2CB56A90000
heap
page read and write
2CB56A9E000
heap
page read and write
2CB54910000
heap
page read and write
2CB56A95000
heap
page read and write
2CB56A3B000
heap
page read and write
2CB56A8F000
heap
page read and write
2CB56AA9000
heap
page read and write
2CB56AAB000
heap
page read and write
2CB56A9A000
heap
page read and write
2CB54A2D000
heap
page read and write
2CB54A79000
heap
page read and write
2CB56345000
heap
page read and write
2CB56A3D000
heap
page read and write
2CB54A1D000
heap
page read and write
2CB54A75000
heap
page read and write
2CB56ABF000
heap
page read and write
2CB56ABB000
heap
page read and write
2CB569ED000
heap
page read and write
2CB56AB0000
heap
page read and write
2CB56A74000
heap
page read and write
2CB54A2B000
heap
page read and write
2CB56A9A000
heap
page read and write
2CB56AB3000
heap
page read and write
2CB54A2B000
heap
page read and write
2CB54A49000
heap
page read and write
2CB56A92000
heap
page read and write
2CB569BE000
heap
page read and write
2CB56AA4000
heap
page read and write
2CB569B7000
heap
page read and write
2CB56A46000
heap
page read and write
2CB56A7B000
heap
page read and write
2CB56A8C000
heap
page read and write
2CB590A0000
heap
page read and write
2CB569C0000
heap
page read and write
2CB54A2A000
heap
page read and write
2CB56960000
heap
page read and write
2CB54A7B000
heap
page read and write
D34EA7E000
stack
page read and write
2CB56A9E000
heap
page read and write
2CB56A9E000
heap
page read and write
2CB54A79000
heap
page read and write
2CB569D0000
heap
page read and write
2CB56A82000
heap
page read and write
2CB56AA1000
heap
page read and write
2CB590CD000
heap
page read and write
2CB56A46000
heap
page read and write
2CB569D4000
heap
page read and write
2CB56A84000
heap
page read and write
2CB56A96000
heap
page read and write
2CB56A9A000
heap
page read and write
2CB590F1000
heap
page read and write
2CB56A9B000
heap
page read and write
2CB54A29000
heap
page read and write
2CB56A89000
heap
page read and write
2CB56A2D000
heap
page read and write
2CB56AA5000
heap
page read and write
2CB54A0C000
heap
page read and write
2CB54A53000
heap
page read and write
2CB56A9E000
heap
page read and write
2CB56AA6000
heap
page read and write
2CB569D2000
heap
page read and write
D34EF7D000
stack
page read and write
2CB56A2F000
heap
page read and write
2CB56A31000
heap
page read and write
2CB56A9E000
heap
page read and write
D34E787000
stack
page read and write
2CB569D2000
heap
page read and write
2CB590CC000
heap
page read and write
2CB54A19000
heap
page read and write
2CB56A5D000
heap
page read and write
2CB569A9000
heap
page read and write
2CB54A69000
heap
page read and write
2CB569D2000
heap
page read and write
2CB569DB000
heap
page read and write
2CB569ED000
heap
page read and write
2CB56AA9000
heap
page read and write
D34EAFE000
stack
page read and write
2CB56A9E000
heap
page read and write
2CB569C8000
heap
page read and write
2CB56A5D000
heap
page read and write
2CB56AA9000
heap
page read and write
2CB5634A000
heap
page read and write
2CB569C0000
heap
page read and write
2CB56AA9000
heap
page read and write
2CB569D4000
heap
page read and write
2CB54A09000
heap
page read and write
2CB569ED000
heap
page read and write
2CB56AAB000
heap
page read and write
2CB56A95000
heap
page read and write
2CB54A7D000
heap
page read and write
2CB569ED000
heap
page read and write
2CB56A46000
heap
page read and write
2CB56AAE000
heap
page read and write
2CB56A95000
heap
page read and write
2CB54A7E000
heap
page read and write
2CB56A46000
heap
page read and write
2CB56AAE000
heap
page read and write
2CB56A52000
heap
page read and write
2CB56A2D000
heap
page read and write
2CB56A2D000
heap
page read and write
D34EB7F000
stack
page read and write
2CB56A5D000
heap
page read and write
2CB54920000
heap
page read and write
D34EBFC000
stack
page read and write
2CB590AF000
heap
page read and write
2CB569E3000
heap
page read and write
2CB56A37000
heap
page read and write
2CB56AA9000
heap
page read and write
2CB54A79000
heap
page read and write
2CB54A39000
heap
page read and write
2CB569D0000
heap
page read and write
2CB5B470000
heap
page readonly
2CB54A7A000
heap
page read and write
2CB590E0000
heap
page read and write
2CB56A5D000
heap
page read and write
2CB56AA4000
heap
page read and write
2CB590FA000
heap
page read and write
2CB56AAE000
heap
page read and write
2CB569DB000
heap
page read and write
2CB56AB3000
heap
page read and write
2CB54A3A000
heap
page read and write
2CB56AA9000
heap
page read and write
2CB56A71000
heap
page read and write
2CB56AA4000
heap
page read and write
2CB54A3E000
heap
page read and write
2CB56A49000
heap
page read and write
2CB56AA5000
heap
page read and write
2CB56AA9000
heap
page read and write
2CB56AA9000
heap
page read and write
2CB56A95000
heap
page read and write
2CB569E3000
heap
page read and write
2CB56AB3000
heap
page read and write
2CB56520000
heap
page read and write
D34ECFE000
stack
page read and write
2CB569E5000
heap
page read and write
2CB569A3000
heap
page read and write
2CB54A58000
heap
page read and write
2CB56A52000
heap
page read and write
2CB54A2D000
heap
page read and write
2CB56A8F000
heap
page read and write
2CB590EA000
heap
page read and write
2CB56A75000
heap
page read and write
2CB569E3000
heap
page read and write
2CB54A4B000
heap
page read and write
2CB54A29000
heap
page read and write
2CB56A9E000
heap
page read and write
2CB54A11000
heap
page read and write
2CB56A85000
heap
page read and write
2CB56AA5000
heap
page read and write
2CB56A9E000
heap
page read and write
2CB56A88000
heap
page read and write
2CB590FC000
heap
page read and write
2CB56A92000
heap
page read and write
2CB56A95000
heap
page read and write
2CB569BE000
heap
page read and write
2CB56A7B000
heap
page read and write
2CB56A8F000
heap
page read and write
2CB56AB6000
heap
page read and write
D34EC7E000
stack
page read and write
2CB54A49000
heap
page read and write
2CB56A8B000
heap
page read and write
2CB56A95000
heap
page read and write
2CB54A5A000
heap
page read and write
2CB56A85000
heap
page read and write
2CB569DB000
heap
page read and write
2CB56ABA000
heap
page read and write
2CB56A22000
heap
page read and write
2CB54A2B000
heap
page read and write
7DF4B50D1000
trusted library allocation
page execute read
2CB590E7000
heap
page read and write
2CB56A3D000
heap
page read and write
2CB56A34000
heap
page read and write
2CB56A95000
heap
page read and write
2CB569ED000
heap
page read and write
2CB54A19000
heap
page read and write
2CB56AA9000
heap
page read and write
2CB56A8A000
heap
page read and write
2CB56AAF000
heap
page read and write
2CB56A60000
heap
page read and write
2CB56A33000
heap
page read and write
2CB56A8F000
heap
page read and write
2CB569D0000
heap
page read and write
2CB56AB3000
heap
page read and write
2CB549F2000
heap
page read and write
2CB569E5000
heap
page read and write
2CB54A2C000
heap
page read and write
2CB54A7E000
heap
page read and write
2CB590A2000
heap
page read and write
2CB54A11000
heap
page read and write
2CB569E5000
heap
page read and write
D34ED7B000
stack
page read and write
2CB54A09000
heap
page read and write
2CB56A9E000
heap
page read and write
2CB569B5000
heap
page read and write
2CB56A70000
heap
page read and write
2CB56A9A000
heap
page read and write
2CB54A19000
heap
page read and write
2CB54A28000
heap
page read and write
2CB58BB0000
trusted library allocation
page read and write
2CB56A43000
heap
page read and write
2CB569C8000
heap
page read and write
2CB56A8F000
heap
page read and write
2CB56A50000
heap
page read and write
2CB56A9A000
heap
page read and write
2CB590EF000
heap
page read and write
2CB56A7B000
heap
page read and write
2CB56A95000
heap
page read and write
2CB54A47000
heap
page read and write
2CB59590000
trusted library allocation
page read and write
2CB56AA4000
heap
page read and write
2CB54A3A000
heap
page read and write
2CB56A2D000
heap
page read and write
2CB56A90000
heap
page read and write
2CB56A43000
heap
page read and write
2CB56AB3000
heap
page read and write
2CB56A92000
heap
page read and write
2CB56AA4000
heap
page read and write
2CB54A39000
heap
page read and write
2CB569D4000
heap
page read and write
2CB590EC000
heap
page read and write
2CB56ABF000
heap
page read and write
2CB56A01000
heap
page read and write
2CB56AAE000
heap
page read and write
2CB56A04000
heap
page read and write
2CB54A3D000
heap
page read and write
2CB56A91000
heap
page read and write
2CB569B2000
heap
page read and write
2CB5634B000
heap
page read and write
2CB54A1E000
heap
page read and write
2CB54A2E000
heap
page read and write
2CB56340000
heap
page read and write
2CB569DB000
heap
page read and write
2CB569C8000
heap
page read and write
2CB569A2000
heap
page read and write
2CB569AD000
heap
page read and write
D34EFFB000
stack
page read and write
2CB56A46000
heap
page read and write
2CB590D5000
heap
page read and write
2CB56A9A000
heap
page read and write
2CB56AA5000
heap
page read and write
2CB54A43000
heap
page read and write
2CB54A58000
heap
page read and write
2CB56AAE000
heap
page read and write
2CB56AA9000
heap
page read and write
2CB56AA9000
heap
page read and write
2CB54A3F000
heap
page read and write
2CB54960000
heap
page read and write
2CB56AB3000
heap
page read and write
2CB56AA4000
heap
page read and write
2CB56AA9000
heap
page read and write
2CB54A4E000
heap
page read and write
2CB54A57000
heap
page read and write
2CB56A78000
heap
page read and write
2CB590C0000
heap
page read and write
2CB56A30000
heap
page read and write
2CB56A8F000
heap
page read and write
2CB596F0000
heap
page read and write
2CB56A97000
heap
page read and write
2CB56AAF000
heap
page read and write
2CB56A2D000
heap
page read and write
2CB56A5D000
heap
page read and write
There are 257 hidden memdumps, click here to show them.