IOC Report
Payment Advice for Imax November 23, 2022, 1%3A46%3A16 PM.txt

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\notepad.exe
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\Payment Advice for Imax November 23, 2022, 1%3A46%3A16 PM.txt

Memdumps

Base Address
Regiontype
Protect
Malicious
25913A93000
heap
page read and write
1B33FE80000
heap
page read and write
1B34005A000
heap
page read and write
CD8B2FE000
stack
page read and write
22408602000
heap
page read and write
25913990000
trusted library allocation
page read and write
917B4FA000
stack
page read and write
2A491D00000
heap
page read and write
24156DCB000
heap
page read and write
24156C90000
heap
page read and write
22408630000
heap
page read and write
22408620000
heap
page read and write
1DF1F002000
heap
page read and write
1B340041000
heap
page read and write
25913A2F000
heap
page read and write
241587F0000
heap
page read and write
1B34007B000
heap
page read and write
220F06C0000
heap
page read and write
23461E50000
trusted library allocation
page read and write
22408590000
heap
page read and write
917BAFF000
stack
page read and write
220F0902000
heap
page read and write
24156D8C000
heap
page read and write
24156DC3000
heap
page read and write
917BCFF000
stack
page read and write
D160AFB000
stack
page read and write
23460318000
heap
page read and write
22408652000
heap
page read and write
25913A3D000
heap
page read and write
2A491C02000
heap
page read and write
2240863D000
heap
page read and write
1B340013000
heap
page read and write
C289DFE000
stack
page read and write
25913A91000
heap
page read and write
20B9C402000
heap
page read and write
23460300000
heap
page read and write
25914430000
heap
page read and write
AE671FE000
stack
page read and write
1DF1F066000
heap
page read and write
AE6757D000
stack
page read and write
24156D9B000
heap
page read and write
22408E02000
trusted library allocation
page read and write
22408629000
heap
page read and write
917B7FF000
stack
page read and write
2346025A000
heap
page read and write
C289CF9000
stack
page read and write
23462210000
remote allocation
page read and write
24156D45000
heap
page read and write
1DF1F05B000
heap
page read and write
23460313000
heap
page read and write
CCE6FF000
stack
page read and write
D16067B000
stack
page read and write
1B340024000
heap
page read and write
2A4914CC000
heap
page read and write
23460120000
heap
page read and write
20B9CA90000
remote allocation
page read and write
1B340046000
heap
page read and write
20B9C502000
heap
page read and write
CD8B07E000
stack
page read and write
2A491380000
heap
page read and write
1B340802000
trusted library allocation
page read and write
CD8AF79000
stack
page read and write
25914202000
heap
page read and write
AE6747E000
stack
page read and write
25913810000
heap
page read and write
CD8ADFE000
stack
page read and write
20B9C300000
heap
page read and write
EA431FE000
stack
page read and write
25913A6B000
heap
page read and write
24156D40000
heap
page read and write
23461BE0000
trusted library allocation
page read and write
C2897FB000
stack
page read and write
2A4914C9000
heap
page read and write
20B9C43D000
heap
page read and write
2A491444000
heap
page read and write
20B9C400000
heap
page read and write
220F0802000
heap
page read and write
25913A13000
heap
page read and write
20B9C290000
heap
page read and write
1B340058000
heap
page read and write
1B34005F000
heap
page read and write
D160A7C000
stack
page read and write
25913A78000
heap
page read and write
25913A6E000
heap
page read and write
EA436FE000
stack
page read and write
20B9C2A0000
heap
page read and write
2FF71FE000
stack
page read and write
1B34005D000
heap
page read and write
23461E10000
trusted library allocation
page read and write
25913A00000
heap
page read and write
220F0650000
heap
page read and write
25914343000
heap
page read and write
4792AFE000
stack
page read and write
D160DFE000
stack
page read and write
1B340059000
heap
page read and write
D1608FE000
stack
page read and write
25913A87000
heap
page read and write
23460259000
heap
page read and write
220F0870000
heap
page read and write
20B9CA90000
remote allocation
page read and write
25913A8A000
heap
page read and write
917BBFF000
stack
page read and write
CCE27E000
stack
page read and write
220F1002000
trusted library allocation
page read and write
1B34004F000
heap
page read and write
1B340062000
heap
page read and write
EA432FF000
stack
page read and write
2A4914BB000
heap
page read and write
1B34006C000
heap
page read and write
917B9FF000
stack
page read and write
23461BC0000
trusted library allocation
page read and write
1DF1F070000
heap
page read and write
20B9CA90000
remote allocation
page read and write
25914413000
heap
page read and write
1B340060000
heap
page read and write
D16047C000
stack
page read and write
1B340074000
heap
page read and write