IOC Report
6I9m6C6vte.unknown

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
235C6727000
heap
page read and write
235C658A000
heap
page read and write
235C8FA4000
heap
page read and write
B01417E000
stack
page read and write
235C4605000
heap
page read and write
235C657F000
heap
page read and write
235C66D5000
heap
page read and write
235C66B0000
heap
page read and write
235C6708000
heap
page read and write
235C45F9000
heap
page read and write
235C4621000
heap
page read and write
235C460F000
heap
page read and write
235C8FA5000
heap
page read and write
235C45F6000
heap
page read and write
235C657F000
heap
page read and write
B0141FE000
stack
page read and write
235C6556000
heap
page read and write
235C658B000
heap
page read and write
235C4638000
heap
page read and write
235C671F000
heap
page read and write
235C66F5000
heap
page read and write
235C45FD000
heap
page read and write
235C6575000
heap
page read and write
235C657F000
heap
page read and write
235C4617000
heap
page read and write
235C4627000
heap
page read and write
235C6661000
heap
page read and write
235C66AF000
heap
page read and write
235C655C000
heap
page read and write
235C656F000
heap
page read and write
235C6665000
heap
page read and write
235C657A000
heap
page read and write
235C4500000
heap
page read and write
235C6708000
heap
page read and write
235C4560000
heap
page read and write
235C655C000
heap
page read and write
235C66ED000
heap
page read and write
235C6575000
heap
page read and write
235C665E000
heap
page read and write
235C6678000
heap
page read and write
235C6670000
heap
page read and write
235C6681000
heap
page read and write
235C4659000
heap
page read and write
235C4632000
heap
page read and write
235C8FD5000
heap
page read and write
235C657A000
heap
page read and write
235C658A000
heap
page read and write
235C6657000
heap
page read and write
235C6593000
heap
page read and write
235C6570000
heap
page read and write
235C6585000
heap
page read and write
235C6585000
heap
page read and write
235C66ED000
heap
page read and write
235C6663000
heap
page read and write
235C66F5000
heap
page read and write
235C658A000
heap
page read and write
235C6571000
heap
page read and write
235C6678000
heap
page read and write
235C6585000
heap
page read and write
235C4621000
heap
page read and write
235C658A000
heap
page read and write
235C8FBF000
heap
page read and write
235C4632000
heap
page read and write
235C668A000
heap
page read and write
235C461A000
heap
page read and write
235C66B6000
heap
page read and write
235C667B000
heap
page read and write
235C657F000
heap
page read and write
235C6665000
heap
page read and write
235C6649000
heap
page read and write
235C658E000
heap
page read and write
235C4626000
heap
page read and write
235C45F7000
heap
page read and write
235C4540000
heap
page read and write
235C658E000
heap
page read and write
235C45CD000
heap
page read and write
235C665E000
heap
page read and write
235C60F0000
heap
page read and write
235C4623000
heap
page read and write
235C461D000
heap
page read and write
235C66ED000
heap
page read and write
235C4603000
heap
page read and write
235C6550000
heap
page read and write
235C6567000
heap
page read and write
235C670D000
heap
page read and write
235C658E000
heap
page read and write
235C656A000
heap
page read and write
235C6585000
heap
page read and write
235C5F80000
heap
page read and write
235C6681000
heap
page read and write
235C6585000
heap
page read and write
235C6678000
heap
page read and write
B0145FB000
stack
page read and write
235C8F90000
heap
page read and write
235C44F0000
heap
page read and write
235C655C000
heap
page read and write
235C6640000
heap
page read and write
235C6593000
heap
page read and write
235C4635000
heap
page read and write
235C5F8D000
heap
page read and write
235C670D000
heap
page read and write
235C4632000
heap
page read and write
235C657F000
heap
page read and write
235C8FD1000
heap
page read and write
235C66F5000
heap
page read and write
235C4609000
heap
page read and write
235C6558000
heap
page read and write
235C659A000
heap
page read and write
235C6727000
heap
page read and write
235C66C3000
heap
page read and write
235CB090000
heap
page readonly
235C6577000
heap
page read and write
235C6586000
heap
page read and write
235C670D000
heap
page read and write
235C465E000
heap
page read and write
235C66BC000
heap
page read and write
235C6670000
heap
page read and write
235C45FE000
heap
page read and write
235C656B000
heap
page read and write
235C659A000
heap
page read and write
235C656F000
heap
page read and write
235C657A000
heap
page read and write
235C658A000
heap
page read and write
235C4604000
heap
page read and write
235C656F000
heap
page read and write
B014077000
stack
page read and write
235C6663000
heap
page read and write
235C659A000
heap
page read and write
235C45E5000
heap
page read and write
235C6704000
heap
page read and write
235C6704000
heap
page read and write
235C8FA9000
heap
page read and write
235C45EC000
heap
page read and write
235C66BD000
heap
page read and write
235C8FD7000
heap
page read and write
B0140FE000
stack
page read and write
235C45F9000
heap
page read and write
235C6681000
heap
page read and write
235C8EB0000
trusted library allocation
page read and write
235C66F5000
heap
page read and write
235C6575000
heap
page read and write
235C670D000
heap
page read and write
B01437D000
stack
page read and write
235C8FD5000
heap
page read and write
235C8FB0000
heap
page read and write
235C8F94000
heap
page read and write
235C4608000
heap
page read and write
235C6540000
heap
page read and write
7DF4076C1000
trusted library allocation
page execute read
235C658E000
heap
page read and write
235C6593000
heap
page read and write
235C66D0000
heap
page read and write
235C9360000
heap
page read and write
235C8FDF000
heap
page read and write
235C66C3000
heap
page read and write
235C4622000
heap
page read and write
235C5F85000
heap
page read and write
235C658E000
heap
page read and write
235C671F000
heap
page read and write
235C8FDC000
heap
page read and write
235C66C5000
heap
page read and write
235C461B000
heap
page read and write
235C671F000
heap
page read and write
235C667B000
heap
page read and write
235C8F9E000
heap
page read and write
235C5F8E000
heap
page read and write
235C4571000
heap
page read and write
235C66ED000
heap
page read and write
235C66D6000
heap
page read and write
235C6654000
heap
page read and write
235C5F8E000
heap
page read and write
235C657F000
heap
page read and write
235C8FB0000
heap
page read and write
235C6669000
heap
page read and write
235C657F000
heap
page read and write
235C4621000
heap
page read and write
235C6708000
heap
page read and write
235C656B000
heap
page read and write
235C6670000
heap
page read and write
235C460A000
heap
page read and write
235C6681000
heap
page read and write
235C4621000
heap
page read and write
235C658E000
heap
page read and write
235C45A5000
heap
page read and write
235C6704000
heap
page read and write
235C45F6000
heap
page read and write
B0146FE000
stack
page read and write
235C655C000
heap
page read and write
235C8FA9000
heap
page read and write
235C66D0000
heap
page read and write
235C4630000
heap
page read and write
235C465E000
heap
page read and write
235C8FD1000
heap
page read and write
235C658A000
heap
page read and write
235C66B3000
heap
page read and write
235C6575000
heap
page read and write
235C4611000
heap
page read and write
235C8FD5000
heap
page read and write
235C4624000
heap
page read and write
235C461E000
heap
page read and write
235C667B000
heap
page read and write
235C6678000
heap
page read and write
B0143FB000
stack
page read and write
235C6585000
heap
page read and write
235C6727000
heap
page read and write
235C45F6000
heap
page read and write
B0142FB000
stack
page read and write
235C8790000
trusted library allocation
page read and write
235C659D000
heap
page read and write
235C6569000
heap
page read and write
235C45F8000
heap
page read and write
235C4601000
heap
page read and write
235C667B000
heap
page read and write
235C6665000
heap
page read and write
235C6572000
heap
page read and write
235C657F000
heap
page read and write
235C66D1000
heap
page read and write
235C657A000
heap
page read and write
235C8FD1000
heap
page read and write
235C45F9000
heap
page read and write
235C6681000
heap
page read and write
235C665F000
heap
page read and write
235C657A000
heap
page read and write
235C66C5000
heap
page read and write
235C6708000
heap
page read and write
235C4568000
heap
page read and write
235C6585000
heap
page read and write
235C6568000
heap
page read and write
235C6585000
heap
page read and write
235C658E000
heap
page read and write
235C658A000
heap
page read and write
235C6704000
heap
page read and write
235C658F000
heap
page read and write
235C66D6000
heap
page read and write
235C6568000
heap
page read and write
235C668B000
heap
page read and write
235C6670000
heap
page read and write
235C8FDB000
heap
page read and write
235C6727000
heap
page read and write
235C460A000
heap
page read and write
235C45F9000
heap
page read and write
235C6666000
heap
page read and write
B01427F000
stack
page read and write
235C6575000
heap
page read and write
235C4632000
heap
page read and write
235C462D000
heap
page read and write
235C6559000
heap
page read and write
235C671F000
heap
page read and write
235C656F000
heap
page read and write
235C659A000
heap
page read and write
235C4620000
heap
page read and write
235C6670000
heap
page read and write
235C6575000
heap
page read and write
235C6593000
heap
page read and write
235C6550000
heap
page read and write
235C8FBE000
heap
page read and write
235C6661000
heap
page read and write
235C464C000
heap
page read and write
235C4621000
heap
page read and write
235C8FD5000
heap
page read and write
235C658A000
heap
page read and write
235C656F000
heap
page read and write
There are 252 hidden memdumps, click here to show them.