IOC Report
download

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\f0\52C64B7E
@C:\Program Files\Common Files\Microsoft Shared\Office16\oregres.dll,-205
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\f0\52C64B7E
@wmploc.dll,-102
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A19EC76000
stack
page read and write
1B3DC0D5000
heap
page read and write
A19EE7E000
stack
page read and write
1B3DC0CD000
heap
page read and write
1B3DC0F6000
heap
page read and write
1B3DDE02000
heap
page read and write
1B3DDDEA000
heap
page read and write
1B3DDE0B000
heap
page read and write
1B3DDDDF000
heap
page read and write
1B3DDF78000
heap
page read and write
1B3DDE06000
heap
page read and write
1B3DC0E4000
heap
page read and write
1B3DDF87000
heap
page read and write
1B3DDF92000
heap
page read and write
1B3DDFD5000
heap
page read and write
1B3DC0F1000
heap
page read and write
1B3DBE00000
heap
page read and write
1B3DDF9C000
heap
page read and write
1B3DDF92000
heap
page read and write
1B3DDF0B000
heap
page read and write
1B3DDE6B000
heap
page read and write
1B3DDF84000
heap
page read and write
1B3DDE0F000
heap
page read and write
1B3DC040000
heap
page read and write
1B3DDF03000
heap
page read and write
1B3DDE21000
heap
page read and write
1B3DDE21000
heap
page read and write
1B3DC0EB000
heap
page read and write
1B3DDE6B000
heap
page read and write
1B3E2A17000
heap
page read and write
1B3DC128000
heap
page read and write
1B3E2A1B000
heap
page read and write
1B3DDF27000
heap
page read and write
1B3DDF43000
heap
page read and write
1B3DDDF0000
heap
page read and write
1B3DDDF0000
heap
page read and write
1B3DDF84000
heap
page read and write
1B3DC128000
heap
page read and write
1B3DC104000
heap
page read and write
1B3DC0CC000
heap
page read and write
1B3DDDEA000
heap
page read and write
1B3DC0CA000
heap
page read and write
1B3DC0F7000
heap
page read and write
1B3DC129000
heap
page read and write
1B3DDA25000
heap
page read and write
1B3DC135000
heap
page read and write
1B3DC122000
heap
page read and write
1B3DDDF6000
heap
page read and write
1B3DDE06000
heap
page read and write
1B3DDF0B000
heap
page read and write
1B3E2A15000
heap
page read and write
1B3DC128000
heap
page read and write
1B3DDE6B000
heap
page read and write
1B3DC0D8000
heap
page read and write
1B3DDE6B000
heap
page read and write
1B3DDFC6000
heap
page read and write
1B3DC0D5000
heap
page read and write
1B3DDF70000
heap
page read and write
1B3DDE12000
heap
page read and write
1B3DDE6B000
heap
page read and write
A19F2FC000
stack
page read and write
1B3DDFA0000
heap
page read and write
A19EFFE000
stack
page read and write
1B3DDE10000
heap
page read and write
1B3DDFCB000
heap
page read and write
1B3DC0FE000
heap
page read and write
1B3DDE03000
heap
page read and write
1B3DDE17000
heap
page read and write
1B3DDF77000
heap
page read and write
1B3DDE6B000
heap
page read and write
1B3DDF5E000
heap
page read and write
1B3DC128000
heap
page read and write
1B3DDDFB000
heap
page read and write
1B3DDF1F000
heap
page read and write
1B3DDDD2000
heap
page read and write
1B3DC0F7000
heap
page read and write
1B3DDF5E000
heap
page read and write
1B3DDE06000
heap
page read and write
A19F37A000
stack
page read and write
1B3DDFC8000
heap
page read and write
1B3DDDFA000
heap
page read and write
1B3DDFA8000
heap
page read and write
1B3DDF27000
heap
page read and write
1B3DC104000
heap
page read and write
1B3DDF17000
heap
page read and write
1B3DDF84000
heap
page read and write
1B3DDE06000
heap
page read and write
A19EDFE000
stack
page read and write
1B3DDE6B000
heap
page read and write
1B3DDF2D000
heap
page read and write
1B3DDDE6000
heap
page read and write
A19EEFE000
stack
page read and write
1B3DDDC0000
heap
page read and write
1B3DC0FF000
heap
page read and write
1B3DDF9C000
heap
page read and write
1B3DC0F9000
heap
page read and write
A19F1FE000
stack
page read and write
1B3DDE10000
heap
page read and write
1B3DC134000
heap
page read and write
1B3DC100000
heap
page read and write
1B3DDDFB000
heap
page read and write
1B3DDE06000
heap
page read and write
1B3DC102000
heap
page read and write
1B3DDDED000
heap
page read and write
1B3E2A39000
heap
page read and write
7DF4B1931000
trusted library allocation
page execute read
1B3DDDD8000
heap
page read and write
1B3DDF9C000
heap
page read and write
1B3DDFA8000
heap
page read and write
1B3DDFC3000
heap
page read and write
1B3DC13A000
heap
page read and write
1B3DDF0D000
heap
page read and write
1B3DC0C8000
heap
page read and write
1B3DC0C1000
heap
page read and write
1B3DDE06000
heap
page read and write
1B3DDE15000
heap
page read and write
1B3DDFA0000
heap
page read and write
1B3DDE10000
heap
page read and write
1B3DDDD3000
heap
page read and write
1B3DDE01000
heap
page read and write
1B3DC0FE000
heap
page read and write
1B3DDE16000
heap
page read and write
1B3DC0C1000
heap
page read and write
1B3E2D00000
heap
page readonly
1B3DDDDA000
heap
page read and write
1B3DBF70000
heap
page read and write
1B3DC0DC000
heap
page read and write
1B3DDE1A000
heap
page read and write
1B3E0500000
heap
page read and write
1B3DC11B000
heap
page read and write
1B3E2A1B000
heap
page read and write
1B3DDF9C000
heap
page read and write
1B3DC0D9000
heap
page read and write
1B3DDDF2000
heap
page read and write
1B3DDF2D000
heap
page read and write
1B3DDE08000
heap
page read and write
1B3DBFE0000
heap
page read and write
1B3DC0D0000
heap
page read and write
1B3DDFC0000
heap
page read and write
1B3DDE1A000
heap
page read and write
1B3DDDD2000
heap
page read and write
1B3E2A3F000
heap
page read and write
1B3DDE07000
heap
page read and write
1B3DDF11000
heap
page read and write
1B3DDDFB000
heap
page read and write
1B3DDDE4000
heap
page read and write
1B3DDE0B000
heap
page read and write
1B3DC0C1000
heap
page read and write
1B3DDDD4000
heap
page read and write
1B3DDE06000
heap
page read and write
1B3DDF72000
heap
page read and write
1B3DC13E000
heap
page read and write
1B3DDE0B000
heap
page read and write
1B3DDF1F000
heap
page read and write
1B3DDDED000
heap
page read and write
1B3E2A3E000
heap
page read and write
1B3DDFCD000
heap
page read and write
1B3DC0C8000
heap
page read and write
1B3DDE6B000
heap
page read and write
1B3DDFA8000
heap
page read and write
1B3E1FF4000
trusted library allocation
page read and write
1B3DDF5E000
heap
page read and write
1B3DDDFA000
heap
page read and write
1B3DC116000
heap
page read and write
1B3E0020000
trusted library allocation
page read and write
1B3DC0F1000
heap
page read and write
1B3E2920000
trusted library allocation
page read and write
1B3E2CD0000
heap
page read and write
1B3DDF38000
heap
page read and write
1B3DDE01000
heap
page read and write
1B3DC13E000
heap
page read and write
1B3DBF40000
heap
page read and write
1B3DDE6B000
heap
page read and write
1B3DC128000
heap
page read and write
1B3DDE06000
heap
page read and write
A19EF7D000
stack
page read and write
1B3DDDFB000
heap
page read and write
1B3DDE06000
heap
page read and write
1B3DDF1F000
heap
page read and write
1B3DDE16000
heap
page read and write
1B3DDE1F000
heap
page read and write
1B3DDE15000
heap
page read and write
1B3DC13E000
heap
page read and write
1B3DBFE3000
heap
page read and write
1B3DC04F000
heap
page read and write
1B3DDF2D000
heap
page read and write
1B3DDE19000
heap
page read and write
1B3DDE02000
heap
page read and write
1B3DDE6B000
heap
page read and write
1B3DDFBB000
heap
page read and write
1B3DC0A2000
heap
page read and write
1B3DC0F9000
heap
page read and write
1B3DC0D5000
heap
page read and write
1B3DC11E000
heap
page read and write
1B3DDDED000
heap
page read and write
1B3DDE06000
heap
page read and write
1B3DDE06000
heap
page read and write
1B3DDE16000
heap
page read and write
1B3E2A20000
heap
page read and write
1B3DC0EE000
heap
page read and write
1B3DDF13000
heap
page read and write
1B3DC103000
heap
page read and write
1B3DDDFB000
heap
page read and write
1B3DDFC6000
heap
page read and write
1B3DDF92000
heap
page read and write
1B3DC12C000
heap
page read and write
1B3DDF78000
heap
page read and write
1B3DDE19000
heap
page read and write
1B3DDDE7000
heap
page read and write
1B3DC0D2000
heap
page read and write
1B3DDE6B000
heap
page read and write
1B3DDF87000
heap
page read and write
1B3DDDF9000
heap
page read and write
1B3DC100000
heap
page read and write
1B3DDE12000
heap
page read and write
1B3DDE15000
heap
page read and write
1B3DDE10000
heap
page read and write
1B3DDDF6000
heap
page read and write
1B3DDF29000
heap
page read and write
1B3DDDED000
heap
page read and write
1B3DC128000
heap
page read and write
1B3DDDF5000
heap
page read and write
1B3DDE6B000
heap
page read and write
1B3DDE06000
heap
page read and write
1B3DDDFB000
heap
page read and write
1B3DC0CE000
heap
page read and write
1B3DDF87000
heap
page read and write
1B3DDDDE000
heap
page read and write
1B3DDDED000
heap
page read and write
1B3DDE0D000
heap
page read and write
1B3DDE01000
heap
page read and write
1B3DDE01000
heap
page read and write
1B3DDDDE000
heap
page read and write
1B3DC0F8000
heap
page read and write
1B3DC135000
heap
page read and write
1B3DDE6B000
heap
page read and write
1B3DC128000
heap
page read and write
1B3DC13A000
heap
page read and write
1B3DC0FC000
heap
page read and write
1B3DC0EA000
heap
page read and write
1B3DDDED000
heap
page read and write
1B3DDF5E000
heap
page read and write
1B3DDE1F000
heap
page read and write
1B3DDE15000
heap
page read and write
1B3DDDFD000
heap
page read and write
1B3DDDE2000
heap
page read and write
1B3DC0F4000
heap
page read and write
1B3DDDF3000
heap
page read and write
A19F47C000
stack
page read and write
1B3DDEE0000
heap
page read and write
1B3DC0D4000
heap
page read and write
1B3E2A20000
heap
page read and write
1B3DC0F4000
heap
page read and write
1B3E2012000
trusted library allocation
page read and write
1B3DDF92000
heap
page read and write
1B3DC0D5000
heap
page read and write
1B3DDE02000
heap
page read and write
A19F07B000
stack
page read and write
1B3DDE15000
heap
page read and write
1B3DC0BD000
heap
page read and write
1B3DC0EA000
heap
page read and write
1B3DDE6B000
heap
page read and write
1B3DDE15000
heap
page read and write
1B3DC100000
heap
page read and write
1B3DDF84000
heap
page read and write
1B3DDE08000
heap
page read and write
1B3DDDF0000
heap
page read and write
1B3DDE06000
heap
page read and write
1B3DDE0B000
heap
page read and write
1B3DDE17000
heap
page read and write
1B3DDDF3000
heap
page read and write
1B3DDA20000
heap
page read and write
1B3DDF39000
heap
page read and write
1B3DDE06000
heap
page read and write
1B3E2A43000
heap
page read and write
1B3DDE0B000
heap
page read and write
1B3DDE06000
heap
page read and write
1B3DDE15000
heap
page read and write
1B3DDDFC000
heap
page read and write
1B3DDF87000
heap
page read and write
1B3DDFA0000
heap
page read and write
A19ED7E000
stack
page read and write
1B3DC0E3000
heap
page read and write
1B3DDF40000
heap
page read and write
1B3DDFA0000
heap
page read and write
1B3DDE02000
heap
page read and write
1B3DDF15000
heap
page read and write
1B3DDE6B000
heap
page read and write
1B3DC0F0000
heap
page read and write
1B3DC100000
heap
page read and write
1B3DDE6B000
heap
page read and write
1B3E2A10000
heap
page read and write
1B3DDFA8000
heap
page read and write
A19ECFE000
stack
page read and write
1B3DDE6B000
heap
page read and write
1B3DC0E8000
heap
page read and write
1B3DDF5E000
heap
page read and write
1B3DDE06000
heap
page read and write
1B3DC0F8000
heap
page read and write
1B3DDE06000
heap
page read and write
1B3DDFCA000
heap
page read and write
1B3DDE06000
heap
page read and write
1B3E2A26000
heap
page read and write
1B3DDDFD000
heap
page read and write
1B3E2A26000
heap
page read and write
1B3DDF2D000
heap
page read and write
1B3DC0C8000
heap
page read and write
1B3DC107000
heap
page read and write
1B3E2A39000
heap
page read and write
There are 299 hidden memdumps, click here to show them.