IOC Report
MDE_File_Sample_445c634e78ec63ccb3a39ee5f6e81a7b46f3a7e5.zip

loading gif

Files

File Path
Type
Category
Malicious
MDE_File_Sample_445c634e78ec63ccb3a39ee5f6e81a7b46f3a7e5.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
initial sample
C:\Users\user\AppData\Local\Temp\unarchiver.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\unarchiver.exe
"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Desktop\MDE_File_Sample_445c634e78ec63ccb3a39ee5f6e81a7b46f3a7e5.zip"
C:\Windows\SysWOW64\7za.exe
"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\zr5e5itz.egn" "C:\Users\user\Desktop\MDE_File_Sample_445c634e78ec63ccb3a39ee5f6e81a7b46f3a7e5.zip"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
30C000
stack
page read and write
7F8000
heap
page read and write
28DC000
trusted library allocation
page read and write
7C0000
heap
page read and write
2911000
trusted library allocation
page read and write
8EA000
heap
page read and write
293B000
trusted library allocation
page read and write
2870000
trusted library allocation
page read and write
2841000
trusted library allocation
page read and write
2924000
trusted library allocation
page read and write
86A000
trusted library allocation
page execute and read and write
491E000
stack
page read and write
94F000
heap
page read and write
946000
heap
page read and write
C1E000
stack
page read and write
380000
heap
page read and write
7BE000
stack
page read and write
2410000
trusted library allocation
page read and write
3F0000
heap
page execute and read and write
28D6000
trusted library allocation
page read and write
2820000
heap
page read and write
28B6000
trusted library allocation
page read and write
28EF000
trusted library allocation
page read and write
6F9000
stack
page read and write
28E4000
trusted library allocation
page read and write
4BFD000
stack
page read and write
8A7000
trusted library allocation
page execute and read and write
28F2000
trusted library allocation
page read and write
390000
heap
page read and write
292D000
trusted library allocation
page read and write
2875000
trusted library allocation
page read and write
2908000
trusted library allocation
page read and write
B6F000
stack
page read and write
892000
trusted library allocation
page execute and read and write
8EE000
heap
page read and write
28C0000
trusted library allocation
page read and write
2897000
trusted library allocation
page read and write
87C000
trusted library allocation
page execute and read and write
28D3000
trusted library allocation
page read and write
4A30000
trusted library allocation
page execute and read and write
9FE000
stack
page read and write
28C5000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
770000
heap
page read and write
395000
heap
page read and write
4A1F000
stack
page read and write
501F000
stack
page read and write
2938000
trusted library allocation
page read and write
C6F000
stack
page read and write
906000
heap
page read and write
2916000
trusted library allocation
page read and write
28F5000
trusted library allocation
page read and write
D30000
heap
page read and write
290E000
trusted library allocation
page read and write
951000
heap
page read and write
A00000
heap
page read and write
3841000
trusted library allocation
page read and write
28E7000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
370000
heap
page read and write
28CE000
trusted library allocation
page read and write
6FB000
stack
page read and write
91D000
heap
page read and write
28EA000
trusted library allocation
page read and write
290B000
trusted library allocation
page read and write
89A000
trusted library allocation
page execute and read and write
2932000
trusted library allocation
page read and write
D1E000
stack
page read and write
6F6000
stack
page read and write
87A000
trusted library allocation
page execute and read and write
288F000
trusted library allocation
page read and write
2903000
trusted library allocation
page read and write
7EFA0000
trusted library allocation
page execute and read and write
872000
trusted library allocation
page execute and read and write
2919000
trusted library allocation
page read and write
291C000
trusted library allocation
page read and write
63C000
stack
page read and write
73D000
stack
page read and write
3E0000
heap
page read and write
28AA000
trusted library allocation
page read and write
2927000
trusted library allocation
page read and write
4AFE000
stack
page read and write
4A20000
trusted library allocation
page read and write
291F000
trusted library allocation
page read and write
28FD000
trusted library allocation
page read and write
24A5000
heap
page read and write
2935000
trusted library allocation
page read and write
28A5000
trusted library allocation
page read and write
2943000
trusted library allocation
page read and write
850000
trusted library allocation
page read and write
8E0000
heap
page read and write
2894000
trusted library allocation
page read and write
7D0000
heap
page read and write
28CB000
trusted library allocation
page read and write
7F0000
heap
page read and write
28D9000
trusted library allocation
page read and write
28A2000
trusted library allocation
page read and write
28A8000
trusted library allocation
page read and write
292A000
trusted library allocation
page read and write
870000
trusted library allocation
page read and write
862000
trusted library allocation
page execute and read and write
28C8000
trusted library allocation
page read and write
28FA000
trusted library allocation
page read and write
28B9000
trusted library allocation
page read and write
24B0000
heap
page read and write
4F1E000
stack
page read and write
2946000
trusted library allocation
page read and write
2900000
trusted library allocation
page read and write
28B0000
trusted library allocation
page read and write
8B0000
heap
page read and write
8AB000
trusted library allocation
page execute and read and write
24A0000
heap
page read and write
There are 102 hidden memdumps, click here to show them.