IOC Report
25jan. Required documents.lnk

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c cd project && registry.exe registry.py & taskkill /F /IM cmd.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\taskkill.exe
taskkill /F /IM cmd.exe

Memdumps

Base Address
Regiontype
Protect
Malicious
261FA44C000
heap
page read and write
261FA47E000
heap
page read and write
261FA4D1000
heap
page read and write
261FA479000
heap
page read and write
261FA424000
heap
page read and write
261FAD98000
heap
page read and write
278A6580000
heap
page read and write
261FAD97000
heap
page read and write
261FA4AF000
heap
page read and write
261FA487000
heap
page read and write
261FA4A5000
heap
page read and write
261FA42A000
heap
page read and write
261FA454000
heap
page read and write
261FA481000
heap
page read and write
261FA4CB000
heap
page read and write
261FB0F4000
heap
page read and write
261FA4AA000
heap
page read and write
261FA474000
heap
page read and write
D421A7E000
stack
page read and write
261FA4AA000
heap
page read and write
261FA456000
heap
page read and write
261FA4DB000
heap
page read and write
261FA484000
heap
page read and write
261FA47E000
heap
page read and write
261FA474000
heap
page read and write
261FA456000
heap
page read and write
261FB0EB000
heap
page read and write
261FADAC000
heap
page read and write
261FA3FF000
heap
page read and write
261FA47E000
heap
page read and write
261FAF9E000
heap
page read and write
261FAF95000
heap
page read and write
261FA4D3000
heap
page read and write
261FA4AA000
heap
page read and write
266DB02A000
heap
page read and write
261FAF9A000
heap
page read and write
261FA491000
heap
page read and write
261FA4D1000
heap
page read and write
261FA3E0000
heap
page read and write
261FB0EE000
heap
page read and write
BC26DF8000
stack
page read and write
D4219FC000
stack
page read and write
261FB0E0000
heap
page read and write
278A6835000
heap
page read and write
261FA481000
heap
page read and write
261FA498000
heap
page read and write
261FADBB000
heap
page read and write
D42197F000
stack
page read and write
261FA4B7000
heap
page read and write
261FA4D8000
heap
page read and write
261FA3E8000
heap
page read and write
261FA4D5000
heap
page read and write
261FADA9000
heap
page read and write
261FA497000
heap
page read and write
261FA4DE000
heap
page read and write
261FA42C000
heap
page read and write
261FAD9D000
heap
page read and write
261FA4BA000
heap
page read and write
D42187E000
stack
page read and write
BC272FE000
stack
page read and write
266DB073000
heap
page read and write
261FA4AA000
heap
page read and write
266DB113000
heap
page read and write
261FAD97000
heap
page read and write
261FA4CD000
heap
page read and write
BC26C7E000
stack
page read and write
261FA471000
heap
page read and write
261FA459000
heap
page read and write
261FA4C5000
heap
page read and write
261FA4A4000
heap
page read and write
261FA4DB000
heap
page read and write
261FA4CD000
heap
page read and write
266DB800000
heap
page read and write
261FA4D8000
heap
page read and write
D421AFF000
stack
page read and write
261FA476000
heap
page read and write
261FA4DB000
heap
page read and write
261FA470000
heap
page read and write
261FADB8000
heap
page read and write
261FA476000
heap
page read and write
261FA489000
heap
page read and write
261FA4B2000
heap
page read and write
261FA4D8000
heap
page read and write
261FA447000
heap
page read and write
261FADA1000
heap
page read and write
261FAF90000
heap
page read and write
261FA487000
heap
page read and write
261FAF93000
heap
page read and write
261FB0E9000
heap
page read and write
261FA476000
heap
page read and write
261FADA3000
heap
page read and write
261FA4B2000
heap
page read and write
261FA48F000
heap
page read and write
278A6830000
heap
page read and write
261FA471000
heap
page read and write
261FA4DE000
heap
page read and write
261FA44D000
heap
page read and write
261FA471000
heap
page read and write
261FA695000
heap
page read and write
261FB0EC000
heap
page read and write
266DB044000
heap
page read and write
261FA4D1000
heap
page read and write
261FA4C9000
heap
page read and write
261FA471000
heap
page read and write
261FA4BE000
heap
page read and write
261FA330000
heap
page read and write
278A8140000
heap
page read and write
261FA465000
heap
page read and write
261FA42C000
heap
page read and write
261FA49F000
heap
page read and write
261FADAC000
heap
page read and write
261FA4D3000
heap
page read and write
261FA4B4000
heap
page read and write
261FA46A000
heap
page read and write
261FA49F000
heap
page read and write
261FA48F000
heap
page read and write
266DB066000
heap
page read and write
261FA453000
heap
page read and write
261FADB0000
heap
page read and write
266DAEB0000
heap
page read and write
261FA484000
heap
page read and write
261FA47E000
heap
page read and write
261FA4CD000
heap
page read and write
261FA4CB000
heap
page read and write
261FA2E0000
heap
page read and write
261FA4C0000
heap
page read and write
261FAD90000
heap
page read and write
261FA487000
heap
page read and write
261FA498000
heap
page read and write
261FA45D000
heap
page read and write
266DB102000
heap
page read and write
F60F89C000
stack
page read and write
261FAF92000
heap
page read and write
261FA413000
heap
page read and write
261FA439000
heap
page read and write
261FA4AB000
heap
page read and write
261FA4DB000
heap
page read and write
261FA497000
heap
page read and write
261FA498000
heap
page read and write
261FA690000
heap
page read and write
261FADA4000
heap
page read and write
261FA4C9000
heap
page read and write
261FAF97000
heap
page read and write
261FA43C000
heap
page read and write
261FA4AD000
heap
page read and write
261FA4DE000
heap
page read and write
261FA47E000
heap
page read and write
261FAF97000
heap
page read and write
261FA49F000
heap
page read and write
261FA459000
heap
page read and write
261FA4C6000
heap
page read and write
BC26FF7000
stack
page read and write
266DB013000
heap
page read and write
261FA4DE000
heap
page read and write
261FA48C000
heap
page read and write
261FA4DB000
heap
page read and write
266DB815000
heap
page read and write
266DB07B000
heap
page read and write
261FA4CB000
heap
page read and write
266DAEA0000
heap
page read and write
261FAD9E000
heap
page read and write
261FA481000
heap
page read and write
D4218FB000
stack
page read and write
261FA4BB000
heap
page read and write
278A65DB000
heap
page read and write
261FA490000
heap
page read and write
261FA48C000
heap
page read and write
266DB055000
heap
page read and write
BC26EFB000
stack
page read and write
BC271FE000
stack
page read and write
261FB0F1000
heap
page read and write
261FA4BA000
heap
page read and write
261FA4C3000
heap
page read and write
261FA481000
heap
page read and write
261FA4B2000
heap
page read and write
266DB100000
heap
page read and write
261FA420000
heap
page read and write
261FA49F000
heap
page read and write
261FADB1000
heap
page read and write
278A65D0000
heap
page read and write
261FAF94000
heap
page read and write
F60F99F000
stack
page read and write
261FA49A000
heap
page read and write
D4215FE000
stack
page read and write
261FA456000
heap
page read and write
261FB0E7000
heap
page read and write
261FA471000
heap
page read and write
D421577000
stack
page read and write
261FA473000
heap
page read and write
261FB0F6000
heap
page read and write
BC270FE000
stack
page read and write
261FAEB0000
heap
page read and write
261FA49F000
heap
page read and write
261FA418000
heap
page read and write
266DB670000
trusted library allocation
page read and write
261FA448000
heap
page read and write
261FAF9B000
heap
page read and write
278A6420000
heap
page read and write
261FA4BA000
heap
page read and write
261FA465000
heap
page read and write
261FA350000
heap
page read and write
261FA4CD000
heap
page read and write
261FA3FA000
heap
page read and write
261FA473000
heap
page read and write
261FA441000
heap
page read and write
261FA4D3000
heap
page read and write
261FA481000
heap
page read and write
261FA45E000
heap
page read and write
261FA4BC000
heap
page read and write
261FAF9A000
heap
page read and write
261FA401000
heap
page read and write
266DB000000
heap
page read and write
261FA4B4000
heap
page read and write
261FA4C9000
heap
page read and write
F60F91F000
stack
page read and write
266DB088000
heap
page read and write
BC26CFF000
stack
page read and write
266DB802000
heap
page read and write
261FA45F000
heap
page read and write
261FA4C6000
heap
page read and write
261FA4DE000
heap
page read and write
261FA4A5000
heap
page read and write
261FA4C3000
heap
page read and write
266DAF10000
heap
page read and write
261FAF9A000
heap
page read and write
261FA4B7000
heap
page read and write
261FA476000
heap
page read and write
278A6560000
heap
page read and write
261FA4B0000
heap
page read and write
261FA4C6000
heap
page read and write
BC269CB000
stack
page read and write
261FA48F000
heap
page read and write
261FA47D000
heap
page read and write
There are 223 hidden memdumps, click here to show them.