IOC Report
Dear Customer.txt

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\notepad.exe
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\Dear Customer.txt

Memdumps

Base Address
Regiontype
Protect
Malicious
245FE130000
heap
page read and write
24581E70000
trusted library allocation
page read and write
245FE2CB000
heap
page read and write
245FFD10000
heap
page read and write
245FE2E7000
heap
page read and write
BEEAA7E000
stack
page read and write
245FE290000
heap
page read and write
245FE2C7000
heap
page read and write
245FFC53000
heap
page read and write
245FFC50000
heap
page read and write
BEEA688000
stack
page read and write
245FFBD0000
trusted library allocation
page read and write
24582670000
heap
page read and write
245FE210000
heap
page read and write
245FFD1C000
heap
page read and write
245FE298000
heap
page read and write
245FE2EF000
heap
page read and write
245FE250000
heap
page read and write
245FE30E000
heap
page read and write
245FFD15000
heap
page read and write
245FE2D3000
heap
page read and write
BEEAB7E000
stack
page read and write
245FFBF0000
heap
page read and write
245FE2C2000
heap
page read and write
There are 14 hidden memdumps, click here to show them.