IOC Report
config

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1B25F740000
heap
page read and write
1B2616AF000
heap
page read and write
7DF4ACD21000
trusted library allocation
page execute read
A3E56FE000
stack
page read and write
1B26155E000
heap
page read and write
1B261521000
heap
page read and write
1B261638000
heap
page read and write
1B25F4C0000
heap
page read and write
1B261636000
heap
page read and write
1B261649000
heap
page read and write
1B26169C000
heap
page read and write
1B26153F000
heap
page read and write
1B261630000
heap
page read and write
1B261539000
heap
page read and write
1B261657000
heap
page read and write
A3E567F000
stack
page read and write
1B263760000
trusted library allocation
page read and write
1B261544000
heap
page read and write
1B26154D000
heap
page read and write
1B261548000
heap
page read and write
1B261556000
heap
page read and write
1B26155A000
heap
page read and write
1B25F767000
heap
page read and write
1B2616F0000
heap
page read and write
A3E59FB000
stack
page read and write
1B26169C000
heap
page read and write
1B26155E000
heap
page read and write
1B25F720000
heap
page read and write
1B25F71A000
heap
page read and write
1B2616B6000
heap
page read and write
1B26169F000
heap
page read and write
1B261556000
heap
page read and write
1B263E7C000
heap
page read and write
1B261556000
heap
page read and write
1B266070000
heap
page readonly
1B26152B000
heap
page read and write
1B26155A000
heap
page read and write
1B261562000
heap
page read and write
1B261641000
heap
page read and write
1B2616F0000
heap
page read and write
1B26162E000
heap
page read and write
A3E57FB000
stack
page read and write
1B26169C000
heap
page read and write
1B25F725000
heap
page read and write
1B25F724000
heap
page read and write
1B261552000
heap
page read and write
1B261610000
heap
page read and write
1B2616CC000
heap
page read and write
1B261529000
heap
page read and write
1B261535000
heap
page read and write
1B25F737000
heap
page read and write
1B261622000
heap
page read and write
1B261552000
heap
page read and write
1B25F747000
heap
page read and write
1B2616F0000
heap
page read and write
1B26154E000
heap
page read and write
1B26153A000
heap
page read and write
1B2616F0000
heap
page read and write
1B263E80000
heap
page read and write
1B26169F000
heap
page read and write
1B2610D5000
heap
page read and write
1B25F713000
heap
page read and write
1B261632000
heap
page read and write
1B261658000
heap
page read and write
1B261544000
heap
page read and write
1B26154D000
heap
page read and write
1B2616F0000
heap
page read and write
1B25F5E0000
heap
page read and write
1B261562000
heap
page read and write
1B2616B6000
heap
page read and write
1B25F753000
heap
page read and write
1B2616AC000
heap
page read and write
1B261532000
heap
page read and write
1B261649000
heap
page read and write
1B25F742000
heap
page read and write
1B25F736000
heap
page read and write
1B261567000
heap
page read and write
1B261527000
heap
page read and write
1B26155B000
heap
page read and write
1B2616CC000
heap
page read and write
1B261651000
heap
page read and write
1B261556000
heap
page read and write
1B261510000
heap
page read and write
1B26161A000
heap
page read and write
1B25F743000
heap
page read and write
1B26155B000
heap
page read and write
1B25F72F000
heap
page read and write
1B26153B000
heap
page read and write
1B2616AF000
heap
page read and write
1B2616B6000
heap
page read and write
1B2616AC000
heap
page read and write
1B26168A000
heap
page read and write
1B261541000
heap
page read and write
1B25F730000
heap
page read and write
1B25F706000
heap
page read and write
1B26155A000
heap
page read and write
1B25F750000
heap
page read and write
1B261538000
heap
page read and write
1B26154E000
heap
page read and write
1B25F763000
heap
page read and write
1B26169F000
heap
page read and write
1B26153B000
heap
page read and write
1B263E83000
heap
page read and write
1B25F72A000
heap
page read and write
1B26155A000
heap
page read and write
1B263E70000
heap
page read and write
1B263E79000
heap
page read and write
1B2616AF000
heap
page read and write
1B261636000
heap
page read and write
1B261556000
heap
page read and write
1B261641000
heap
page read and write
1B26154A000
heap
page read and write
A3E52F7000
stack
page read and write
1B25F738000
heap
page read and write
1B261540000
heap
page read and write
1B25F713000
heap
page read and write
1B26155E000
heap
page read and write
1B26153F000
heap
page read and write
1B26169C000
heap
page read and write
1B261556000
heap
page read and write
1B25F743000
heap
page read and write
1B261562000
heap
page read and write
1B261651000
heap
page read and write
1B261638000
heap
page read and write
1B2616DA000
heap
page read and write
1B26169F000
heap
page read and write
1B2610D0000
heap
page read and write
1B261627000
heap
page read and write
1B261537000
heap
page read and write
1B25F713000
heap
page read and write
1B261533000
heap
page read and write
1B25F77C000
heap
page read and write
1B261651000
heap
page read and write
1B261544000
heap
page read and write
1B261634000
heap
page read and write
1B2616CC000
heap
page read and write
1B263E95000
heap
page read and write
1B261641000
heap
page read and write
1B2616AC000
heap
page read and write
1B263EA4000
heap
page read and write
1B261562000
heap
page read and write
A3E537E000
stack
page read and write
1B261649000
heap
page read and write
1B25F72B000
heap
page read and write
1B2616D8000
heap
page read and write
1B25F724000
heap
page read and write
1B261689000
heap
page read and write
1B25F749000
heap
page read and write
1B261541000
heap
page read and write
1B26155F000
heap
page read and write
1B2616F0000
heap
page read and write
1B2616B6000
heap
page read and write
1B263E74000
heap
page read and write
1B26155E000
heap
page read and write
1B261641000
heap
page read and write
1B261651000
heap
page read and write
1B26154D000
heap
page read and write
1B25F680000
heap
page read and write
1B25F5A0000
heap
page read and write
1B25F72C000
heap
page read and write
1B26154E000
heap
page read and write
1B2616AF000
heap
page read and write
1B25F706000
heap
page read and write
1B2616AC000
heap
page read and write
1B2616D2000
heap
page read and write
1B26155A000
heap
page read and write
1B25F73F000
heap
page read and write
1B26163A000
heap
page read and write
1B2616DA000
heap
page read and write
1B25F640000
heap
page read and write
1B261562000
heap
page read and write
1B261562000
heap
page read and write
A3E53FE000
stack
page read and write
1B25F6EE000
heap
page read and write
1B264190000
trusted library allocation
page read and write
1B25F725000
heap
page read and write
1B261544000
heap
page read and write
1B261552000
heap
page read and write
1B261630000
heap
page read and write
1B26156B000
heap
page read and write
1B261525000
heap
page read and write
1B26154E000
heap
page read and write
1B26163A000
heap
page read and write
1B264240000
heap
page read and write
1B25F77D000
heap
page read and write
1B2616D1000
heap
page read and write
1B25F744000
heap
page read and write
1B263E9A000
heap
page read and write
1B25F74D000
heap
page read and write
1B261520000
heap
page read and write
1B25F736000
heap
page read and write
1B261540000
heap
page read and write
1B26153F000
heap
page read and write
1B261632000
heap
page read and write
1B25F709000
heap
page read and write
1B261545000
heap
page read and write
1B2616D7000
heap
page read and write
1B261552000
heap
page read and write
1B26155A000
heap
page read and write
1B25F72D000
heap
page read and write
1B26155E000
heap
page read and write
1B25F722000
heap
page read and write
1B26153F000
heap
page read and write
1B25F73D000
heap
page read and write
1B2616CC000
heap
page read and write
1B261552000
heap
page read and write
1B261562000
heap
page read and write
1B26162E000
heap
page read and write
1B26155E000
heap
page read and write
1B25F719000
heap
page read and write
A3E577C000
stack
page read and write
There are 201 hidden memdumps, click here to show them.