IOC Report
text_0.txt

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\notepad.exe
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\text_0.txt

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWindowsOnlyEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fPasteOriginalEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fReverse
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWrapAround
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fMatchCase

Memdumps

Base Address
Regiontype
Protect
Malicious
1DE6B0D0000
heap
page read and write
1DE696F5000
heap
page read and write
1DE6D730000
heap
page read and write
2370CFE000
stack
page read and write
1DE6CF30000
trusted library allocation
page read and write
1DE695A0000
heap
page read and write
1DE6AF60000
trusted library allocation
page read and write
2370A78000
stack
page read and write
1DE6AF80000
heap
page read and write
1DE694C0000
heap
page read and write
2370BFE000
stack
page read and write
1DE69678000
heap
page read and write
1DE696ED000
heap
page read and write
1DE6B0DC000
heap
page read and write
1DE6AFC0000
heap
page read and write
1DE69670000
heap
page read and write
1DE696AD000
heap
page read and write
1DE6B0D5000
heap
page read and write
1DE6AFC3000
heap
page read and write
1DE696A0000
heap
page read and write
1DE696C5000
heap
page read and write
1DE695E0000
heap
page read and write
There are 12 hidden memdumps, click here to show them.