IOC Report
hdI44WsQzp

loading gif

Files

File Path
Type
Category
Malicious
hdI44WsQzp
ASCII text, with CRLF line terminators
initial sample
C:\Users\user\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock
ASCII text, with no line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\Taskmgr.exe
"C:\Windows\system32\taskmgr.exe" /4
malicious
C:\Windows\System32\Taskmgr.exe
"C:\Windows\system32\taskmgr.exe" /4
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\TaskManager
UseStatusSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\TaskManager
Preferences

Memdumps

Base Address
Regiontype
Protect
Malicious
1441078000
stack
page read and write
1B5DA0CD000
heap
page read and write
1B5DAF67000
heap
page read and write
1B5DA02D000
heap
page read and write
1B5DAB9E000
heap
page read and write
1B5DAAB8000
heap
page read and write
1B5DADDD000
heap
page read and write
1B5DA090000
heap
page read and write
1B5DB4AE000
heap
page read and write
1B5D5FEB000
heap
page read and write
1B5DAB61000
heap
page read and write
1B5DAA8D000
heap
page read and write
1440C7E000
stack
page read and write
1B5DAAA1000
heap
page read and write
1B5DB4DD000
heap
page read and write
1B5DADD1000
heap
page read and write
1B5DB4B8000
heap
page read and write
1B5DA6F9000
heap
page read and write
1B5DAB57000
heap
page read and write
1B5DB50B000
heap
page read and write
1440DFB000
stack
page read and write
1B5DB48B000
heap
page read and write
1B5DB4BB000
heap
page read and write
1B5DA60B000
heap
page read and write
1B5DAF84000
heap
page read and write
1B5DAD9C000
heap
page read and write
14409FD000
stack
page read and write
1B5DA72A000
heap
page read and write
1B5DAAAF000
heap
page read and write
144137F000
stack
page read and write
1B5DAEBF000
heap
page read and write
1B5DA6AA000
heap
page read and write
1B5DAA7B000
heap
page read and write
1B5DB4A5000
heap
page read and write
1B5D5F63000
heap
page read and write
1B5DA430000
trusted library section
page read and write
1B5DAAA5000
heap
page read and write
1B5DA662000
heap
page read and write
1B5DA61E000
heap
page read and write
1B5DA65E000
heap
page read and write
1B5DA663000
heap
page read and write
1B5D9530000
trusted library allocation
page read and write
1B5DAB11000
heap
page read and write
1B5DAA8C000
heap
page read and write
1B5DADF8000
heap
page read and write
1B5DA72C000
heap
page read and write
1B5DA60B000
heap
page read and write
1B5DA590000
heap
page read and write
1B5DB58C000
heap
page read and write
1B5DAA63000
heap
page read and write
1B5DA56F000
heap
page read and write
1B5DA988000
heap
page read and write
1B5DAF19000
heap
page read and write
1B5DADE4000
heap
page read and write
1B5DB4E7000
heap
page read and write
1B5DA730000
heap
page read and write
1B5DAA91000
heap
page read and write
1B5DB4EA000
heap
page read and write
1B5D5FA6000
heap
page read and write
1B5DA6C2000
heap
page read and write
1B5DB4CE000
heap
page read and write
1B5DAAC8000
heap
page read and write
1440CFE000
stack
page read and write
1B5DAAA1000
heap
page read and write
1B5DAD88000
heap
page read and write
1B5DA663000
heap
page read and write
1B5DACC7000
heap
page read and write
1B5DA627000
heap
page read and write
1B5DA665000
heap
page read and write
1B5DAABF000
heap
page read and write
1B5DAB57000
heap
page read and write
1B5DABA0000
heap
page read and write
1B5DAAB0000
heap
page read and write
1B5DA617000
heap
page read and write
1B5DAA4B000
heap
page read and write
1B5DA0AB000
heap
page read and write
1B5DAD64000
heap
page read and write
1B5D5FE4000
heap
page read and write
1B5DAA76000
heap
page read and write
1B5DA692000
heap
page read and write
1B5D5FF1000
heap
page read and write
1B5DA62A000
heap
page read and write
1B5DAA76000
heap
page read and write
1B5DAB40000
heap
page read and write
1B5DA6C5000
heap
page read and write
1B5DAF47000
heap
page read and write
1B5DAABF000
heap
page read and write
14411FB000
stack
page read and write
1B5DAA47000
heap
page read and write
1B5DAAA7000
heap
page read and write
1B5DAA5D000
heap
page read and write
1440EFE000
stack
page read and write
1B5DA470000
trusted library allocation
page read and write
1440F7D000
stack
page read and write
1B5DAA5E000
heap
page read and write
14410FE000
stack
page read and write
1B5DA690000
heap
page read and write
1B5DA6DB000
heap
page read and write
1B5DADD1000
heap
page read and write
1B5DA679000
heap
page read and write
1B5DB4E0000
heap
page read and write
1B5DAB57000
heap
page read and write
1B5DA0BA000
heap
page read and write
1B5DAB5C000
heap
page read and write
1B5DA602000
heap
page read and write
1B5DA671000
heap
page read and write
1B5DA736000
heap
page read and write
1B5DAA7E000
heap
page read and write
1B5DA6F8000
heap
page read and write
1B5D5ECB000
heap
page read and write
1B5DA5B0000
heap
page read and write
1B5DABF7000
heap
page read and write
1B5DAB0E000
heap
page read and write
144117B000
stack
page read and write
144157F000
stack
page read and write
1B5DAFA7000
heap
page read and write
1B5DAF48000
heap
page read and write
1B5DACE4000
heap
page read and write
14412FF000
stack
page read and write
1B5D5FBB000
heap
page read and write
1B5DA68C000
heap
page read and write
1B5DA629000
heap
page read and write
1B5DA66B000
heap
page read and write
1B5DA66B000
heap
page read and write
1B5DA6D6000
heap
page read and write
1B5D5EC5000
heap
page read and write
1B5D5FC4000
heap
page read and write
1B5DA6D4000
heap
page read and write
1B5DAA65000
heap
page read and write
1B5DAAC9000
heap
page read and write
1B5DAA8C000
heap
page read and write
1B5DA734000
heap
page read and write
1B5DA604000
heap
page read and write
1B5D5FFC000
heap
page read and write
1B5DAC70000
heap
page read and write
1B5DAB54000
heap
page read and write
1B5DAA5D000
heap
page read and write
1B5DAF73000
heap
page read and write
1B5DAB34000
heap
page read and write
1B5D5DB0000
heap
page read and write
1B5D7910000
heap
page read and write
1B5DA60B000
heap
page read and write
1B5DAEF2000
heap
page read and write
1B5DAC31000
heap
page read and write
1B5DA021000
heap
page read and write
1B5DA689000
heap
page read and write
1B5DAA57000
heap
page read and write
1B5DAA8C000
heap
page read and write
1B5D7A66000
heap
page read and write
1B5DB4DB000
heap
page read and write
1B5DB4CA000
heap
page read and write
1B5DA617000
heap
page read and write
1B5DAAA7000
heap
page read and write
1B5DA654000
heap
page read and write
1B5DB587000
heap
page read and write
1B5DA609000
heap
page read and write
1440D7E000
stack
page read and write
1B5DA5CA000
heap
page read and write
1B5DB4C8000
heap
page read and write
144127F000
stack
page read and write
1B5D5F60000
heap
page read and write
1B5DA994000
heap
page read and write
1B5D5FE6000
heap
page read and write
1B5DB4E2000
heap
page read and write
1B5DA0D4000
heap
page read and write
1B5D5FC7000
heap
page read and write
1B5DB53F000
heap
page read and write
1440FF8000
stack
page read and write
1B5D5FFE000
heap
page read and write
1B5DA602000
heap
page read and write
1B5D5F70000
heap
page read and write
1B5DAA9C000
heap
page read and write
1B5DB544000
heap
page read and write
1B5DAB5F000
heap
page read and write
1B5DAC71000
heap
page read and write
1B5DAABC000
heap
page read and write
1B5DA651000
heap
page read and write
1B5DA73E000
heap
page read and write
1B5D5ED0000
heap
page read and write
1B5DA608000
heap
page read and write
1B5D5EC0000
heap
page read and write
1B5DA667000
heap
page read and write
1B5DA540000
heap
page read and write
1B5DB4B6000
heap
page read and write
1B5DA0D0000
heap
page read and write
1B5DA6CD000
heap
page read and write
1B5DA5FE000
heap
page read and write
1B5DAB49000
heap
page read and write
1B5DB4D9000
heap
page read and write
1B5DAA89000
heap
page read and write
1B5DAF14000
heap
page read and write
1B5DA6C5000
heap
page read and write
1B5D5FEF000
heap
page read and write
1B5DA627000
heap
page read and write
1B5DA680000
heap
page read and write
1B5DA6E5000
heap
page read and write
1B5DB4EC000
heap
page read and write
144097A000
stack
page read and write
1B5DAF67000
heap
page read and write
1B5DAC35000
heap
page read and write
1B5DB478000
heap
page read and write
1B5DB4F9000
heap
page read and write
1B5DAA7E000
heap
page read and write
1B5DAAB3000
heap
page read and write
1B5DA554000
heap
page read and write
1B5DAB5B000
heap
page read and write
1B5D603B000
heap
page read and write
1B5DA65A000
heap
page read and write
1B5D5FAC000
heap
page read and write
1B5D5E90000
heap
page read and write
1B5DAF16000
heap
page read and write
1B5DA56B000
heap
page read and write
1B5D6056000
heap
page read and write
1B5DA61F000
heap
page read and write
14414F8000
stack
page read and write
1B5DA05D000
heap
page read and write
14413FE000
stack
page read and write
1B5DA045000
heap
page read and write
1B5D6040000
heap
page read and write
1B5DAA66000
heap
page read and write
1B5D7C24000
heap
page read and write
1B5DB4B2000
heap
page read and write
1B5DAFED000
heap
page read and write
1B5DB574000
heap
page read and write
1B5D6064000
heap
page read and write
1B5DA69F000
heap
page read and write
1B5DA673000
heap
page read and write
1B5DB4D5000
heap
page read and write
1B5DAF78000
heap
page read and write
1B5DA5F1000
heap
page read and write
1B5D6005000
heap
page read and write
1B5D9FE0000
heap
page read and write
1B5DAF93000
heap
page read and write
1B5DAB86000
heap
page read and write
1B5DAF3E000
heap
page read and write
1B5DB533000
heap
page read and write
1B5DAAAF000
heap
page read and write
1B5DAA47000
heap
page read and write
1B5DA870000
heap
page read and write
1B5DAB36000
heap
page read and write
1B5D9D30000
heap
page read and write
1B5DAF78000
heap
page read and write
1440E79000
stack
page read and write
1B5D5FE8000
heap
page read and write
1B5DA0B7000
heap
page read and write
There are 235 hidden memdumps, click here to show them.