IOC Report
MUMPS_5.7.1.tar

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding

URLs

Name
IP
Malicious
https://www.intel.com/content/www/us/en/docs/onemkl/developer-reference-fortran/2023-0/gemmt.html
unknown
http://mumps-solver.org).
unknown
https://cecill.info/licences/Licence_CeCILL-C_V1-en.html)
unknown
http://brew.sh
unknown
http://gforge.inria.fr/projects/scotch/)
unknown
https://web.archive.org/web/20140426002151/http://www2.cs.uni-paderborn.de/cs/ag-monien/PERSONAL/SCH
unknown
http://mumps-solver.org
unknown
http://www.netlib.org/lapack/)
unknown
http://mumps-solver.org/
unknown
http://www2.cs.uni-paderborn.de/cs/ag-monien/PERSONAL/SCHLUNZ/vrp.html)
unknown
https://sxauroratsubasa.sakura.ne.jp/documents/sdk/SDK_NLC/UsersGuide/man/dgemmt.html
unknown
http://mumps-tech.com).
unknown
http://dx.doi.org/10.1051/0004-6361/201219605
unknown
There are 3 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1923EFC5000
heap
page read and write
19240FBD000
heap
page read and write
19240FB9000
heap
page read and write
1924112D000
heap
page read and write
19240FB9000
heap
page read and write
19240FA5000
heap
page read and write
192410BB000
heap
page read and write
19240FA5000
heap
page read and write
192410D2000
heap
page read and write
19240FBD000
heap
page read and write
19240FBD000
heap
page read and write
1923EFB9000
heap
page read and write
1924110C000
heap
page read and write
19240FC9000
heap
page read and write
19241129000
heap
page read and write
192410CF000
heap
page read and write
1924110C000
heap
page read and write
19240F92000
heap
page read and write
19240FB9000
heap
page read and write
19240FBD000
heap
page read and write
1923EFDE000
heap
page read and write
1923EFB8000
heap
page read and write
19240FAE000
heap
page read and write
1923EFB0000
heap
page read and write
19240FB4000
heap
page read and write
19241115000
heap
page read and write
19240F9A000
heap
page read and write
1923EFB0000
heap
page read and write
1924109E000
heap
page read and write
1923EFDF000
heap
page read and write
1924108D000
heap
page read and write
1923EFA9000
heap
page read and write
192410FE000
heap
page read and write
19240FC2000
heap
page read and write
19240FB4000
heap
page read and write
192410FE000
heap
page read and write
19241137000
heap
page read and write
19240F85000
heap
page read and write
19240FAB000
heap
page read and write
1923EFFA000
heap
page read and write
19240FB9000
heap
page read and write
19240F9F000
heap
page read and write
19241129000
heap
page read and write
1923EFFE000
heap
page read and write
19240FCE000
heap
page read and write
19241142000
heap
page read and write
1923EFAE000
heap
page read and write
19240F9F000
heap
page read and write
192410A0000
heap
page read and write
19240FB4000
heap
page read and write
192439CF000
heap
page read and write
19240F9F000
heap
page read and write
1924109C000
heap
page read and write
19241133000
heap
page read and write
192410FA000
heap
page read and write
19241133000
heap
page read and write
192408E0000
heap
page read and write
19241115000
heap
page read and write
19240FB9000
heap
page read and write
19240C10000
heap
page read and write
19241129000
heap
page read and write
1923EFAD000
heap
page read and write
192410FE000
heap
page read and write
19240FBD000
heap
page read and write
192410B2000
heap
page read and write
1923EFEA000
heap
page read and write
1923F020000
heap
page read and write
1923EFB8000
heap
page read and write
19241085000
heap
page read and write
192410A0000
heap
page read and write
1924110C000
heap
page read and write
19240FAA000
heap
page read and write
19241131000
heap
page read and write
1923EF72000
heap
page read and write
192410CD000
heap
page read and write
19240FB9000
heap
page read and write
19240FB9000
heap
page read and write
19240F8B000
heap
page read and write
19240F9B000
heap
page read and write
192439B0000
heap
page read and write
19240FAA000
heap
page read and write
19240FAE000
heap
page read and write
1923F000000
heap
page read and write
19240F97000
heap
page read and write
1923EF8E000
heap
page read and write
19240FA5000
heap
page read and write
1924110C000
heap
page read and write
19240FB9000
heap
page read and write
19240FB4000
heap
page read and write
19241129000
heap
page read and write
1923F015000
heap
page read and write
19241135000
heap
page read and write
19240FA5000
heap
page read and write
1923EFB8000
heap
page read and write
19243D70000
heap
page read and write
19240F70000
heap
page read and write
192410FB000
heap
page read and write
1924116C000
heap
page read and write
192410ED000
heap
page read and write
19240FBA000
heap
page read and write
19241115000
heap
page read and write
1923EFB0000
heap
page read and write
1923EF73000
heap
page read and write
19241115000
heap
page read and write
192410AB000
heap
page read and write
1924113B000
heap
page read and write
19241135000
heap
page read and write
19241115000
heap
page read and write
19240FA0000
heap
page read and write
192410B2000
heap
page read and write
19240FC2000
heap
page read and write
63D1C7D000
stack
page read and write
19241108000
heap
page read and write
1923EFB0000
heap
page read and write
192410A2000
heap
page read and write
192410AB000
heap
page read and write
19240FA5000
heap
page read and write
1924110C000
heap
page read and write
19240FB4000
heap
page read and write
19241108000
heap
page read and write
19241108000
heap
page read and write
1923EFDC000
heap
page read and write
19241109000
heap
page read and write
19241070000
heap
page read and write
19240FAE000
heap
page read and write
19240FC2000
heap
page read and write
192410A2000
heap
page read and write
19240FC5000
heap
page read and write
1924116C000
heap
page read and write
19241090000
heap
page read and write
19241135000
heap
page read and write
19240FB5000
heap
page read and write
1924107A000
heap
page read and write
63D1CFB000
stack
page read and write
19241135000
heap
page read and write
19240FB9000
heap
page read and write
19240FB9000
heap
page read and write
19240F80000
heap
page read and write
63D19FE000
stack
page read and write
192410F0000
heap
page read and write
19240FC2000
heap
page read and write
19240FAA000
heap
page read and write
19241139000
heap
page read and write
19240FB9000
heap
page read and write
19240FB4000
heap
page read and write
192439CC000
heap
page read and write
19240FAE000
heap
page read and write
1924109A000
heap
page read and write
1923EFB8000
heap
page read and write
1923EFB8000
heap
page read and write
19241138000
heap
page read and write
1924116C000
heap
page read and write
19245A80000
heap
page readonly
1923EFC4000
heap
page read and write
1923EF20000
heap
page read and write
1923EFBE000
heap
page read and write
19240FB4000
heap
page read and write
192439CA000
heap
page read and write
192439B7000
heap
page read and write
1923EFA2000
heap
page read and write
1923EFF2000
heap
page read and write
1924109A000
heap
page read and write
1924112D000
heap
page read and write
192410D7000
heap
page read and write
1924116C000
heap
page read and write
1924110C000
heap
page read and write
1923F010000
heap
page read and write
19241115000
heap
page read and write
19240FAA000
heap
page read and write
19241133000
heap
page read and write
19241130000
heap
page read and write
63D18FF000
stack
page read and write
19241167000
heap
page read and write
19240FB4000
heap
page read and write
19240FAA000
heap
page read and write
192410FB000
heap
page read and write
19240FB4000
heap
page read and write
19240FB1000
heap
page read and write
19241108000
heap
page read and write
19241129000
heap
page read and write
192410BD000
heap
page read and write
19240FA5000
heap
page read and write
19240FAE000
heap
page read and write
19240FA5000
heap
page read and write
19241108000
heap
page read and write
63D1A7B000
stack
page read and write
19240FB9000
heap
page read and write
19240FA5000
heap
page read and write
192410FE000
heap
page read and write
19240FC2000
heap
page read and write
192410CE000
heap
page read and write
1923EF8E000
heap
page read and write
63D197C000
stack
page read and write
1923EFF5000
heap
page read and write
192410B2000
heap
page read and write
19240FBE000
heap
page read and write
1924113F000
heap
page read and write
19240F93000
heap
page read and write
192410D8000
heap
page read and write
19240FB4000
heap
page read and write
192431C0000
trusted library allocation
page read and write
19240FBD000
heap
page read and write
63D159E000
stack
page read and write
1924109E000
heap
page read and write
19240A60000
heap
page read and write
1924110C000
heap
page read and write
19240A65000
heap
page read and write
19240FB4000
heap
page read and write
19240FAE000
heap
page read and write
19240FAE000
heap
page read and write
19240FBD000
heap
page read and write
19240FBA000
heap
page read and write
1923EFAE000
heap
page read and write
19240FAE000
heap
page read and write
19240FAA000
heap
page read and write
192410D2000
heap
page read and write
192410AB000
heap
page read and write
19241129000
heap
page read and write
19240FAE000
heap
page read and write
1923EFCA000
heap
page read and write
192410A4000
heap
page read and write
19241098000
heap
page read and write
19240FCA000
heap
page read and write
192410FB000
heap
page read and write
63D187E000
stack
page read and write
19240F9F000
heap
page read and write
19240FCE000
heap
page read and write
192410FB000
heap
page read and write
19241115000
heap
page read and write
1923F100000
heap
page read and write
19240FA5000
heap
page read and write
1924109C000
heap
page read and write
192410AB000
heap
page read and write
1923EFBA000
heap
page read and write
1923F018000
heap
page read and write
19240FB4000
heap
page read and write
7DF438901000
trusted library allocation
page execute read
19240FB9000
heap
page read and write
19241135000
heap
page read and write
19241108000
heap
page read and write
192439C0000
heap
page read and write
1923EFB8000
heap
page read and write
1923EFBD000
heap
page read and write
19240F81000
heap
page read and write
192410FE000
heap
page read and write
192410BB000
heap
page read and write
1923EFC2000
heap
page read and write
1923EFAE000
heap
page read and write
1923F018000
heap
page read and write
19241129000
heap
page read and write
19240F88000
heap
page read and write
19240F9B000
heap
page read and write
19240FBD000
heap
page read and write
19240FB9000
heap
page read and write
19241098000
heap
page read and write
1923EFDD000
heap
page read and write
192439A0000
trusted library allocation
page read and write
192410FB000
heap
page read and write
1923EFCA000
heap
page read and write
19240FC2000
heap
page read and write
1924116A000
heap
page read and write
19240FAE000
heap
page read and write
19240FAA000
heap
page read and write
19240FA0000
heap
page read and write
1923EFC9000
heap
page read and write
19241129000
heap
page read and write
19241094000
heap
page read and write
19241139000
heap
page read and write
1923EFE9000
heap
page read and write
192410A4000
heap
page read and write
19240FAE000
heap
page read and write
1924110C000
heap
page read and write
19240FBD000
heap
page read and write
19241139000
heap
page read and write
192439C9000
heap
page read and write
192410FB000
heap
page read and write
19241108000
heap
page read and write
192410FB000
heap
page read and write
1923EFC3000
heap
page read and write
192410BB000
heap
page read and write
19240F89000
heap
page read and write
19240FC2000
heap
page read and write
19241142000
heap
page read and write
19240FCE000
heap
page read and write
192439B3000
heap
page read and write
63D1517000
stack
page read and write
1924112A000
heap
page read and write
192410BB000
heap
page read and write
19240FAA000
heap
page read and write
192410FE000
heap
page read and write
19240F95000
heap
page read and write
19240FAE000
heap
page read and write
19240FC2000
heap
page read and write
1923EFA9000
heap
page read and write
19241139000
heap
page read and write
19240F98000
heap
page read and write
19241133000
heap
page read and write
19241115000
heap
page read and write
19240F8B000
heap
page read and write
19240FB9000
heap
page read and write
19240FBD000
heap
page read and write
1924116C000
heap
page read and write
19241133000
heap
page read and write
192410FE000
heap
page read and write
There are 294 hidden memdumps, click here to show them.