IOC Report
MDE_File_Sample_bcdc0b75df7c481568c48ae5a8f1d75305b5fc22.zip

loading gif

Files

File Path
Type
Category
Malicious
MDE_File_Sample_bcdc0b75df7c481568c48ae5a8f1d75305b5fc22.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
initial sample
C:\Users\user\AppData\Local\Temp\unarchiver.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\unarchiver.exe
"C:\Windows\SysWow64\unarchiver.exe" "C:\Users\user\Desktop\MDE_File_Sample_bcdc0b75df7c481568c48ae5a8f1d75305b5fc22.zip"
C:\Windows\SysWOW64\7za.exe
"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\nea5db15.3oa" "C:\Users\user\Desktop\MDE_File_Sample_bcdc0b75df7c481568c48ae5a8f1d75305b5fc22.zip"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
126C000
stack
page read and write
166B000
heap
page read and write
CCF000
stack
page read and write
CF5000
heap
page read and write
2630000
heap
page read and write
3685000
trusted library allocation
page read and write
36A4000
trusted library allocation
page read and write
15D2000
trusted library allocation
page execute and read and write
36BD000
trusted library allocation
page read and write
15B0000
trusted library allocation
page read and write
3657000
trusted library allocation
page read and write
9EE000
stack
page read and write
3662000
trusted library allocation
page read and write
36AF000
trusted library allocation
page read and write
15DA000
trusted library allocation
page execute and read and write
1900000
trusted library allocation
page read and write
36A7000
trusted library allocation
page read and write
4601000
trusted library allocation
page read and write
364F000
trusted library allocation
page read and write
1631000
heap
page read and write
13D0000
heap
page read and write
19F0000
trusted library allocation
page read and write
18FA000
trusted library allocation
page execute and read and write
3670000
trusted library allocation
page read and write
1A00000
trusted library allocation
page execute and read and write
1678000
heap
page read and write
18F2000
trusted library allocation
page execute and read and write
19CE000
stack
page read and write
36E7000
trusted library allocation
page read and write
15FA000
heap
page read and write
36B5000
trusted library allocation
page read and write
1970000
heap
page read and write
5C7E000
stack
page read and write
36F8000
trusted library allocation
page read and write
A08000
heap
page read and write
3665000
trusted library allocation
page read and write
3700000
trusted library allocation
page read and write
15CA000
trusted library allocation
page execute and read and write
5BDE000
stack
page read and write
1647000
heap
page read and write
36EF000
trusted library allocation
page read and write
A00000
heap
page read and write
36F2000
trusted library allocation
page read and write
36A1000
trusted library allocation
page read and write
940000
heap
page read and write
3654000
trusted library allocation
page read and write
3703000
trusted library allocation
page read and write
36C0000
trusted library allocation
page read and write
369E000
trusted library allocation
page read and write
1366000
stack
page read and write
36B2000
trusted library allocation
page read and write
1673000
heap
page read and write
15D0000
trusted library allocation
page read and write
36D6000
trusted library allocation
page read and write
A0D000
heap
page read and write
36C3000
trusted library allocation
page read and write
368B000
trusted library allocation
page read and write
3601000
trusted library allocation
page read and write
163D000
heap
page read and write
950000
heap
page read and write
36E4000
trusted library allocation
page read and write
3696000
trusted library allocation
page read and write
1420000
heap
page read and write
CD0000
heap
page read and write
162D000
heap
page read and write
5ADE000
stack
page read and write
3693000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
194E000
stack
page read and write
960000
heap
page read and write
8FD000
stack
page read and write
1960000
heap
page execute and read and write
36FD000
trusted library allocation
page read and write
E8F000
stack
page read and write
7EFF0000
trusted library allocation
page execute and read and write
1616000
heap
page read and write
36DC000
trusted library allocation
page read and write
15DC000
trusted library allocation
page execute and read and write
36F5000
trusted library allocation
page read and write
3688000
trusted library allocation
page read and write
1580000
heap
page read and write
15FE000
heap
page read and write
CF0000
heap
page read and write
1369000
stack
page read and write
5DC000
stack
page read and write
36CB000
trusted library allocation
page read and write
190B000
trusted library allocation
page execute and read and write
36CE000
trusted library allocation
page read and write
1A10000
heap
page read and write
3699000
trusted library allocation
page read and write
36C8000
trusted library allocation
page read and write
15F0000
heap
page read and write
3676000
trusted library allocation
page read and write
36D9000
trusted library allocation
page read and write
1907000
trusted library allocation
page execute and read and write
3635000
trusted library allocation
page read and write
3682000
trusted library allocation
page read and write
36BA000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
1410000
heap
page read and write
3706000
trusted library allocation
page read and write
15C2000
trusted library allocation
page execute and read and write
3690000
trusted library allocation
page read and write
366A000
trusted library allocation
page read and write
9AE000
stack
page read and write
5D7E000
stack
page read and write
3679000
trusted library allocation
page read and write
36AC000
trusted library allocation
page read and write
579E000
stack
page read and write
36DF000
trusted library allocation
page read and write
36D1000
trusted library allocation
page read and write
13E0000
heap
page read and write
32BF000
stack
page read and write
36EA000
trusted library allocation
page read and write
136B000
stack
page read and write
1633000
heap
page read and write
1425000
heap
page read and write
There are 107 hidden memdumps, click here to show them.