IOC Report
text_0.txt

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\notepad.exe
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\text_0.txt

Memdumps

Base Address
Regiontype
Protect
Malicious
2121AC6C000
heap
page read and write
21219200000
heap
page read and write
82D5078000
stack
page read and write
212191F8000
heap
page read and write
212191C8000
heap
page read and write
2121923D000
heap
page read and write
2121AB40000
heap
page read and write
2121AE03000
heap
page read and write
21219180000
heap
page read and write
2121CC60000
trusted library allocation
page read and write
2121D460000
heap
page read and write
2121AC65000
heap
page read and write
212191FB000
heap
page read and write
212191D0000
heap
page read and write
212191FF000
heap
page read and write
2121AC40000
heap
page read and write
212191FB000
heap
page read and write
2121AC20000
trusted library allocation
page read and write
2121AE00000
heap
page read and write
82D52FF000
stack
page read and write
212191F2000
heap
page read and write
21219190000
heap
page read and write
212191C0000
heap
page read and write
82D51FE000
stack
page read and write
2121AC60000
heap
page read and write
There are 15 hidden memdumps, click here to show them.