IOC Report
AO_RDS01_2024-04-18_16_39_30.221.zip

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

Memdumps

Base Address
Regiontype
Protect
Malicious
AE0CF6F000
stack
page read and write
AE0CEEC000
stack
page read and write
AE0CFEF000
stack
page read and write
1C5C8D80000
heap
page read and write
1C5C8840000
heap
page read and write
1C5C8860000
heap
page read and write
1C5C8747000
heap
page read and write
AE0D27E000
stack
page read and write
1C5C8740000
heap
page read and write
1C5C8640000
heap
page read and write
1C5C8865000
heap
page read and write
1C5C8720000
heap
page read and write
There are 2 hidden memdumps, click here to show them.