IOC Report
ReleaseNote.txt

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\notepad.exe
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\ReleaseNote.txt

URLs

Name
IP
Malicious
http://support.displaylink.com/
unknown
http://support.displaylink.com/knowledgebase/articles/630820
unknown
http://support.displaylink.com/knowledgebase/articles/607686
unknown
http://www.displaylink.com/downloads/corporate
unknown
http://support.displaylink.com
unknown
http://support.displaylink.com/knowledgebase/articles/524951
unknown
http://support.displaylink.com/knowledgebase
unknown
http://support.displaylink.com/knowledgebase/articles/615714
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
22C88B4C000
heap
page read and write
20B953B0000
heap
page read and write
1CE64C02000
heap
page read and write
237F3668000
heap
page read and write
2130605B000
heap
page read and write
2547E849000
heap
page read and write
22C882A3000
heap
page read and write
20B953C3000
heap
page read and write
2547E864000
heap
page read and write
1CE64D00000
heap
page read and write
2181BE7E000
heap
page read and write
24A3CC6B000
heap
page read and write
28CB5980000
heap
page read and write
28CB6558000
heap
page read and write
2547EE02000
trusted library allocation
page read and write
28CB5A7B000
heap
page read and write
28CBB2FE000
heap
page read and write
CB2D77C000
stack
page read and write
1CE64D13000
heap
page read and write
21306071000
heap
page read and write
24A3CC4F000
heap
page read and write
50B6F7D000
stack
page read and write
28CB6502000
heap
page read and write
1CE64C13000
heap
page read and write
B806CFB000
stack
page read and write
B806A7E000
stack
page read and write
28CB63A0000
trusted library section
page read and write
22C88FC0000
remote allocation
page read and write
1672DC29000
heap
page read and write
2181BD50000
trusted library allocation
page read and write
25E58674000
heap
page read and write
FA107F000
stack
page read and write
91C60FE000
stack
page read and write
50B6E77000
stack
page read and write
FA13FF000
stack
page read and write
28CB6518000
heap
page read and write
28CBB1C0000
trusted library allocation
page read and write
9EA767E000
stack
page read and write
25E58656000
heap
page read and write
2181BE53000
heap
page read and write
21306029000
heap
page read and write
28CB5A29000
heap
page read and write
1D6A4E4A000
heap
page read and write
24A3CC66000
heap
page read and write
28CB6500000
heap
page read and write
A27307C000
stack
page read and write
24A3CC75000
heap
page read and write
24A3CC54000
heap
page read and write
FA0FFE000
stack
page read and write
98F22FF000
stack
page read and write
20B952C0000
heap
page read and write
28CBB23E000
heap
page read and write
91C5C7A000
stack
page read and write
28CB5A96000
heap
page read and write
21306802000
trusted library allocation
page read and write
28CBB306000
heap
page read and write
28CB6B80000
trusted library allocation
page read and write
20B95180000
heap
page read and write
237F33F0000
heap
page read and write
1CE64C28000
heap
page read and write
28CBB400000
trusted library allocation
page read and write
1CE64B80000
trusted library allocation
page read and write
734057D000
stack
page read and write
21306013000
heap
page read and write
98F1EFF000
stack
page read and write
1D6A4E55000
heap
page read and write
1D6A4F02000
heap
page read and write
91C617F000
stack
page read and write
28CBB304000
heap
page read and write
20B953B6000
heap
page read and write
28CBB1A0000
trusted library allocation
page read and write
24A3CC69000
heap
page read and write
1D6A4E6C000
heap
page read and write
49D1A7E000
stack
page read and write
28CBB2E4000
heap
page read and write
24A3CC48000
heap
page read and write
28CBB4F0000
remote allocation
page read and write
24A3CC45000
heap
page read and write
2181BF00000
heap
page read and write
FA14FD000
stack
page read and write
1D6A4F00000
heap
page read and write
22C88B10000
heap
page read and write
1CE64B50000
heap
page read and write
1D6A4E3C000
heap
page read and write
24A3CC74000
heap
page read and write
1CE64AE0000
heap
page read and write
24A3CC30000
heap
page read and write
22C882AA000
heap
page read and write
91C5FFF000
stack
page read and write
50B6AFE000
stack
page read and write
22C882AF000
heap
page read and write
28CB5AA9000
heap
page read and write
91C677F000
stack
page read and write
A27357E000
stack
page read and write
28CB6C70000
trusted library section
page readonly
2547E7F0000
remote allocation
page read and write
22C89200000
unkown
page read and write
22C880C0000
heap
page read and write
2547E802000
heap
page read and write
2547E84A000
heap
page read and write
20B953CD000
heap
page read and write
98F26FE000
stack
page read and write
28CB5B02000
heap
page read and write
2181BE50000
heap
page read and write
B8067FC000
stack
page read and write
28CBB2F5000
heap
page read and write
91C56EB000
stack
page read and write
28CBB190000
trusted library allocation
page read and write
22C88120000
heap
page read and write
1CE64D02000
heap
page read and write
22C88FC0000
remote allocation
page read and write
CB2D67D000
stack
page read and write
1672DD02000
heap
page read and write
2547E740000
trusted library allocation
page read and write
28CB6A83000
trusted library allocation
page read and write
28CB6A61000
trusted library allocation
page read and write
28CB5A8D000
heap
page read and write
2547E620000
heap
page read and write
98F25FE000
stack
page read and write
20B953FA000
heap
page read and write
22C88313000
heap
page read and write
2181BF08000
heap
page read and write
237F3600000
heap
page read and write
22C88213000
heap
page read and write
9C2977E000
stack
page read and write
28CBB24B000
heap
page read and write
2181BBE0000
heap
page read and write
25E58670000
heap
page read and write
28CBB2FB000
heap
page read and write
C272077000
stack
page read and write
C271C7E000
stack
page read and write
1672DB00000
heap
page read and write
28CB5A57000
heap
page read and write
49D177B000
stack
page read and write
734027E000
stack
page read and write
91C5D7A000
stack
page read and write
28CBB302000
heap
page read and write
24A3CC00000
heap
page read and write
20B952E0000
heap
page read and write
28CBB424000
trusted library allocation
page read and write
C271CFF000
stack
page read and write
91C657B000
stack
page read and write
24A3CC43000
heap
page read and write
28CBB1C0000
trusted library allocation
page read and write
FA127E000
stack
page read and write
28CBB2DD000
heap
page read and write
21305E00000
heap
page read and write
2547E5B0000
heap
page read and write
28CB6415000
heap
page read and write
237F36CA000
heap
page read and write
91C5F7B000
stack
page read and write
C271F77000
stack
page read and write
1CE64C00000
heap
page read and write
2547E877000
heap
page read and write
2547E720000
trusted library allocation
page read and write
2181BE29000
heap
page read and write
22C882B2000
heap
page read and write
28CBB302000
heap
page read and write
20B98CF0000
trusted library allocation
page read and write
1672DC00000
heap
page read and write
28CB5A8F000
heap
page read and write
CB2D57F000
stack
page read and write
20B953B5000
heap
page read and write
733FFFC000
stack
page read and write
24A3CC47000
heap
page read and write
22C882F2000
heap
page read and write
22C882C9000
heap
page read and write
28CB5A00000
heap
page read and write
28CBB4B0000
trusted library allocation
page read and write
237F3702000
heap
page read and write
1672E602000
trusted library allocation
page read and write
28CBB20F000
heap
page read and write
24A3CC4C000
heap
page read and write
237F366A000
heap
page read and write
9EA7477000
stack
page read and write
2181BBF0000
heap
page read and write
25E58688000
heap
page read and write
CB2D37E000
stack
page read and write
24A3CC55000
heap
page read and write
49D147B000
stack
page read and write
20B953D4000
heap
page read and write
91C61FF000
stack
page read and write
24A3CC68000
heap
page read and write
237F3613000
heap
page read and write
CB2CDDB000
stack
page read and write
22C882E4000
heap
page read and write
24A3CC39000
heap
page read and write
20B953BB000
heap
page read and write
1D6A4CA0000
heap
page read and write
C27217F000
stack
page read and write
22C88BA1000
heap
page read and write
2181BF13000
heap
page read and write
9C296FE000
stack
page read and write
1672DC58000
heap
page read and write
20B953BF000
heap
page read and write
2547E900000
heap
page read and write
CB2D47F000
stack
page read and write
24A3CC31000
heap
page read and write
FA10FF000
stack
page read and write
1672DB90000
trusted library allocation
page read and write
25E58651000
heap
page read and write
98F1FFB000
stack
page read and write
9EA76FE000
stack
page read and write
28CB6402000
heap
page read and write
24A3CC80000
heap
page read and write
1D6A4E29000
heap
page read and write
50B6D7B000
stack
page read and write
22C88B6F000
heap
page read and write
28CB6400000
heap
page read and write
733FBDB000
stack
page read and write
49D197B000
stack
page read and write
25E58654000
heap
page read and write
C2723FE000
unkown
page read and write
25E5864B000
heap
page read and write
237F36B9000
heap
page read and write
25E58629000
heap
page read and write
28CBB1D0000
trusted library allocation
page read and write
2547E82A000
heap
page read and write
22C88B88000
heap
page read and write
24A3CC51000
heap
page read and write
28CBB263000
heap
page read and write
A272F7E000
stack
page read and write
28CB6559000
heap
page read and write
28CBB408000
trusted library allocation
page read and write
22C88FC0000
remote allocation
page read and write
20B9567E000
heap
page read and write
25E58613000
heap
page read and write
28CBB4F0000
remote allocation
page read and write
28CBB200000
heap
page read and write
2547E7B0000
trusted library allocation
page read and write
9C299FE000
stack
page read and write
21306000000
heap
page read and write
2547E813000
heap
page read and write
2181BE4A000
heap
page read and write
734077C000
stack
page read and write
24A3CA10000
heap
page read and write
1CE64AF0000
heap
page read and write
28CB59F0000
heap
page read and write
21306102000
heap
page read and write
21306002000
heap
page read and write
28CBB28D000
heap
page read and write
237F3671000
heap
page read and write
28CBB4C0000
trusted library allocation
page read and write
28CB6CA0000
trusted library section
page readonly
22C88200000
heap
page read and write
28CBB070000
trusted library allocation
page read and write
28CB5AFF000
heap
page read and write
B806E77000
stack
page read and write
1672DBC0000
remote allocation
page read and write
237F33E0000
heap
page read and write
2181BF02000
heap
page read and write
FA137D000
stack
page read and write
237F3E02000
heap
page read and write
28CBB1A0000
trusted library allocation
page read and write
1D6A4C90000
heap
page read and write
25E58600000
heap
page read and write
28CBB300000
heap
page read and write
28CB5B13000
heap
page read and write
22C882FA000
heap
page read and write
2181BC50000
heap
page read and write
28CB5A72000
heap
page read and write
24A3CC13000
heap
page read and write
A272E7B000
stack
page read and write
98F20FF000
stack
page read and write
25E58653000
heap
page read and write
20B95670000
heap
page read and write
91C6479000
stack
page read and write
25E5867F000
heap
page read and write
24A3CC4A000
heap
page read and write
24A3CC7D000
heap
page read and write
1D6A4E70000
heap
page read and write
20B96DE0000
heap
page read and write
1CE65602000
trusted library allocation
page read and write
9C29BFF000
stack
page read and write
20B95401000
heap
page read and write
237F3F33000
heap
page read and write
22C880B0000
heap
page read and write
20B96DE3000
heap
page read and write
24A3CC49000
heap
page read and write
28CB6513000
heap
page read and write
28CB6A80000
trusted library allocation
page read and write
2547E859000
heap
page read and write
24A3CD02000
heap
page read and write
22C88270000
heap
page read and write
1CE64C64000
heap
page read and write
25E58700000
heap
page read and write
28CB5A13000
heap
page read and write
91C627F000
stack
page read and write
1D6A55A0000
trusted library allocation
page read and write
22C88281000
heap
page read and write
24A3CC50000
heap
page read and write
2547E842000
heap
page read and write
28CB5B26000
heap
page read and write
237F3550000
trusted library allocation
page read and write
98F1D7B000
stack
page read and write
237F3629000
heap
page read and write
1672DBC0000
remote allocation
page read and write
24A3CC77000
heap
page read and write
24A3CC85000
heap
page read and write
2547E85A000
heap
page read and write
1D6A4E00000
heap
page read and write
9C2967B000
stack
page read and write
21305E60000
heap
page read and write
25E58708000
heap
page read and write
98F194B000
stack
page read and write
A273277000
stack
page read and write
22C882EF000
heap
page read and write
2547E5C0000
heap
page read and write
A27337F000
stack
page read and write
1D6A4D00000
heap
page read and write
28CBB190000
trusted library allocation
page read and write
73403FD000
stack
page read and write
2547E7F0000
remote allocation
page read and write
237F36C2000
heap
page read and write
98F21FD000
stack
page read and write
734017E000
stack
page read and write
98F23FF000
stack
page read and write
28CBB2F9000
heap
page read and write
22C88229000
heap
page read and write
28CB6A90000
trusted library allocation
page read and write
2181BE70000
heap
page read and write
2547E84A000
heap
page read and write
24A3CC42000
heap
page read and write
28CBB304000
heap
page read and write
FA15FD000
stack
page read and write
1672DC26000
heap
page read and write
1CE64C77000
heap
page read and write
C272278000
stack
page read and write
1D6A4F13000
heap
page read and write
91C5AF8000
stack
page read and write
2181BE3C000
heap
page read and write
20B953BB000
heap
page read and write
91C607E000
stack
page read and write
28CBB1D4000
trusted library allocation
page read and write
1CE64C5A000
heap
page read and write
28CBB460000
trusted library allocation
page read and write
237F3F00000
heap
page read and write
24A3CA70000
heap
page read and write
28CBB2AE000
heap
page read and write
2547E800000
heap
page read and write
24A3CC29000
heap
page read and write
28CB6518000
heap
page read and write
28CBB421000
trusted library allocation
page read and write
24A3D402000
trusted library allocation
page read and write
25E58DA0000
trusted library allocation
page read and write
20B95360000
heap
page read and write
2181C602000
trusted library allocation
page read and write
50B707E000
stack
page read and write
22C882F2000
heap
page read and write
73402FC000
stack
page read and write
9C29AFE000
stack
page read and write
24A3CC52000
heap
page read and write
237F3450000
heap
page read and write
2547E85A000
heap
page read and write
25E58713000
heap
page read and write
24A3CA00000
heap
page read and write
28CB6C90000
trusted library section
page readonly
98F24FF000
stack
page read and write
C271E7F000
stack
page read and write
734047C000
stack
page read and write
A27347D000
stack
page read and write
A272EFE000
stack
page read and write
FA117E000
stack
page read and write
21305F60000
trusted library allocation
page read and write
28CBB261000
heap
page read and write
2181BE4D000
heap
page read and write
28CB6C80000
trusted library section
page readonly
21306113000
heap
page read and write
25E58500000
heap
page read and write
1D6A4E02000
heap
page read and write
1D6A4E81000
heap
page read and write
25E58E02000
trusted library allocation
page read and write
CB2D97C000
stack
page read and write
28CB5AA1000
heap
page read and write
50B6A7C000
stack
page read and write
28CBB2A9000
heap
page read and write
25E58702000
heap
page read and write
2181BE00000
heap
page read and write
50B717F000
stack
page read and write
22C882DC000
heap
page read and write
1D6A5602000
trusted library allocation
page read and write
20B98540000
heap
page read and write
28CBB4D0000
trusted library allocation
page read and write
22C88B13000
heap
page read and write
25E584A0000
heap
page read and write
1CE64C40000
heap
page read and write
1672DC13000
heap
page read and write
2547E7F0000
remote allocation
page read and write
1D6A4E13000
heap
page read and write
2181BE88000
heap
page read and write
22C882C2000
heap
page read and write
20B95389000
heap
page read and write
2547E88B000
heap
page read and write
28CB5A77000
heap
page read and write
28CB5990000
heap
page read and write
C271DFC000
stack
page read and write
2547E913000
heap
page read and write
22C88B80000
heap
page read and write
24A3CB70000
trusted library allocation
page read and write
28CBB220000
heap
page read and write
20B95675000
heap
page read and write
B806F7F000
stack
page read and write
B806D7F000
stack
page read and write
91C637C000
stack
page read and write
28CBB4A0000
trusted library allocation
page read and write
734087F000
stack
page read and write
28CB6601000
trusted library allocation
page read and write
25E58649000
heap
page read and write
25E58490000
heap
page read and write
28CBB290000
heap
page read and write
22C88302000
heap
page read and write
24A3CC7C000
heap
page read and write
22C88A02000
heap
page read and write
22C8823C000
heap
page read and write
C27237A000
stack
page read and write
22C889C0000
trusted library allocation
page read and write
CB2D87E000
stack
page read and write
28CB6290000
trusted library allocation
page read and write
28CBB080000
trusted library allocation
page read and write
49D187B000
stack
page read and write
22C88B79000
heap
page read and write
24A3CC53000
heap
page read and write
1672DAF0000
heap
page read and write
237F3713000
heap
page read and write
28CB6C60000
trusted library section
page readonly
28CBB000000
trusted library allocation
page read and write
2547E918000
heap
page read and write
28CBB40E000
trusted library allocation
page read and write
24A3CC41000
heap
page read and write
24A3CC76000
heap
page read and write
1D6A4F08000
heap
page read and write
20B95399000
heap
page read and write
1672DC3D000
heap
page read and write
21305DF0000
heap
page read and write
FA0E7C000
stack
page read and write
2181BE13000
heap
page read and write
1D6A4E4F000
heap
page read and write
25E5864E000
heap
page read and write
2181BE8F000
heap
page read and write
A27317B000
stack
page read and write
9C298FE000
stack
page read and write
24A3CC79000
heap
page read and write
50B6B7E000
stack
page read and write
2547E902000
heap
page read and write
1CE64C79000
heap
page read and write
1D6A4E87000
heap
page read and write
28CB5A3D000
heap
page read and write
91C5E7F000
stack
page read and write
28CBB22D000
heap
page read and write
237F3651000
heap
page read and write
2130603D000
heap
page read and write
22C88288000
heap
page read and write
28CBB4F0000
remote allocation
page read and write
1672DB60000
heap
page read and write
CB2D1FE000
stack
page read and write
1672DBC0000
remote allocation
page read and write
20B95380000
heap
page read and write
28CB6CB0000
trusted library section
page readonly
21306057000
heap
page read and write
2547E770000
trusted library allocation
page read and write
22C88B80000
heap
page read and write
22C88B00000
heap
page read and write
C2719FC000
stack
page read and write
24A3CC3E000
heap
page read and write
B806AFE000
stack
page read and write
1D6A4E6C000
heap
page read and write
28CB7000000
trusted library allocation
page read and write
24A3CC46000
heap
page read and write
734067F000
stack
page read and write
24A3CC7B000
heap
page read and write
1672DC02000
heap
page read and write
B80707F000
stack
page read and write
25E5863C000
heap
page read and write
There are 463 hidden memdumps, click here to show them.