IOC Report
manifest.json

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\notepad.exe
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\manifest.ini

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWindowsOnlyEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fPasteOriginalEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fReverse
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWrapAround
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fMatchCase

Memdumps

Base Address
Regiontype
Protect
Malicious
1C11E980000
heap
page read and write
1C11E7E6000
heap
page read and write
1C120B00000
heap
page read and write
326E3FE000
stack
page read and write
1C120240000
trusted library allocation
page read and write
1C11E7C9000
heap
page read and write
1C11E80B000
heap
page read and write
1C11E798000
heap
page read and write
326E279000
stack
page read and write
1C11E7C9000
heap
page read and write
1C12027C000
heap
page read and write
1C120160000
heap
page read and write
1C120370000
heap
page read and write
1C11E7C0000
heap
page read and write
1C120270000
heap
page read and write
1C11E8A0000
heap
page read and write
1C120403000
heap
page read and write
326E4FE000
stack
page read and write
1C120275000
heap
page read and write
1C1223B0000
trusted library allocation
page read and write
1C11E790000
heap
page read and write
1C120400000
heap
page read and write
1C11E7CA000
heap
page read and write
1C11E7C6000
heap
page read and write
There are 14 hidden memdumps, click here to show them.