IOC Report
Headers.txt

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\notepad.exe
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\Headers.txt

URLs

Name
IP
Malicious
https://policy.hubspot.com/abuse-complaints)
unknown
https://info.nhanow.com/hs/subscription-preferences/v2/unsubscribe-all?data=W2nXS-N30h-H8W34gPnK3LG4
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWindowsOnlyEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fPasteOriginalEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fReverse
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWrapAround
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fMatchCase

Memdumps

Base Address
Regiontype
Protect
Malicious
1DD6B1E0000
heap
page read and write
1DD6B25F000
heap
page read and write
1DD6B265000
heap
page read and write
1DD6B251000
heap
page read and write
81A2478000
stack
page read and write
1DD6B25B000
heap
page read and write
1DD6B228000
heap
page read and write
1DD6B267000
heap
page read and write
1DD6B1FF000
heap
page read and write
1DD6B209000
heap
page read and write
1DD6B26B000
heap
page read and write
1DD6B1D0000
heap
page read and write
1DD6B262000
heap
page read and write
1DD6CC53000
heap
page read and write
1DD6F2B0000
heap
page read and write
1DD6CB50000
heap
page read and write
1DD6CAF0000
trusted library allocation
page read and write
1DD6B26B000
heap
page read and write
1DD6B262000
heap
page read and write
1DD6B25F000
heap
page read and write
1DD6B262000
heap
page read and write
1DD6B260000
heap
page read and write
1DD6B26B000
heap
page read and write
1DD6B264000
heap
page read and write
1DD6B268000
heap
page read and write
1DD6B266000
heap
page read and write
1DD6CB55000
heap
page read and write
1DD6B210000
heap
page read and write
1DD6B25E000
heap
page read and write
1DD6B264000
heap
page read and write
1DD6B269000
heap
page read and write
1DD6CC50000
heap
page read and write
1DD6B25E000
heap
page read and write
81A26FE000
stack
page read and write
1DD6B225000
heap
page read and write
1DD6B266000
heap
page read and write
1DD6B261000
heap
page read and write
1DD6B22C000
heap
page read and write
81A25FE000
stack
page read and write
1DD6CB5C000
heap
page read and write
1DD6B246000
heap
page read and write
1DD6B25E000
heap
page read and write
1DD6B1D8000
heap
page read and write
1DD6B130000
heap
page read and write
1DD6B269000
heap
page read and write
1DD6B264000
heap
page read and write
1DD6B260000
heap
page read and write
1DD6B261000
heap
page read and write
1DD6B269000
heap
page read and write
1DD6B25F000
heap
page read and write
1DD6EAB0000
trusted library allocation
page read and write
1DD6B251000
heap
page read and write
1DD6B263000
heap
page read and write
1DD6B25F000
heap
page read and write
1DD6B25C000
heap
page read and write
1DD6B265000
heap
page read and write
1DD6B050000
heap
page read and write
1DD6B26D000
heap
page read and write
1DD6B170000
heap
page read and write
1DD6CB10000
heap
page read and write
1DD6B260000
heap
page read and write
There are 51 hidden memdumps, click here to show them.