IOC Report
MDE_File_Sample_bcdc0b75df7c481568c48ae5a8f1d75305b5fc22.zip

loading gif

Files

File Path
Type
Category
Malicious
MDE_File_Sample_bcdc0b75df7c481568c48ae5a8f1d75305b5fc22.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
initial sample
C:\Users\user\AppData\Local\Temp\unarchiver.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\unarchiver.exe
"C:\Windows\SysWow64\unarchiver.exe" "C:\Users\user\Desktop\MDE_File_Sample_bcdc0b75df7c481568c48ae5a8f1d75305b5fc22.zip"
C:\Windows\SysWOW64\7za.exe
"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\4o4mctv4.ggf" "C:\Users\user\Desktop\MDE_File_Sample_bcdc0b75df7c481568c48ae5a8f1d75305b5fc22.zip"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
2F12000
trusted library allocation
page read and write
2EF9000
trusted library allocation
page read and write
11AC000
trusted library allocation
page execute and read and write
122E000
stack
page read and write
119A000
trusted library allocation
page execute and read and write
DBE000
heap
page read and write
2F04000
trusted library allocation
page read and write
2EC1000
trusted library allocation
page read and write
2EE8000
trusted library allocation
page read and write
CFB000
stack
page read and write
2E90000
trusted library allocation
page read and write
C1E000
stack
page read and write
11C2000
trusted library allocation
page execute and read and write
1192000
trusted library allocation
page execute and read and write
2EB0000
trusted library allocation
page read and write
2EFE000
trusted library allocation
page read and write
11A2000
trusted library allocation
page execute and read and write
11A0000
trusted library allocation
page read and write
DB0000
heap
page read and write
11E0000
trusted library allocation
page read and write
11AA000
trusted library allocation
page execute and read and write
2F20000
trusted library allocation
page read and write
553E000
stack
page read and write
2EF3000
trusted library allocation
page read and write
503E000
stack
page read and write
7EE60000
trusted library allocation
page execute and read and write
2F15000
trusted library allocation
page read and write
1400000
heap
page execute and read and write
563E000
stack
page read and write
9A0000
heap
page read and write
990000
heap
page read and write
DA0000
heap
page read and write
2E61000
trusted library allocation
page read and write
C78000
heap
page read and write
2EB6000
trusted library allocation
page read and write
DD7000
heap
page read and write
9F0000
heap
page read and write
CF6000
stack
page read and write
E20000
heap
page read and write
E29000
heap
page read and write
2B1F000
stack
page read and write
9F5000
heap
page read and write
2ED6000
trusted library allocation
page read and write
4F3E000
stack
page read and write
BD0000
heap
page read and write
2F1D000
trusted library allocation
page read and write
2710000
heap
page read and write
11E7000
trusted library allocation
page execute and read and write
2F07000
trusted library allocation
page read and write
2EE5000
trusted library allocation
page read and write
11EB000
trusted library allocation
page execute and read and write
1230000
heap
page read and write
E6F000
stack
page read and write
2825000
heap
page read and write
2F23000
trusted library allocation
page read and write
C70000
heap
page read and write
7E0000
heap
page read and write
E2B000
heap
page read and write
11CA000
trusted library allocation
page execute and read and write
5050000
trusted library allocation
page execute and read and write
DEE000
heap
page read and write
DBA000
heap
page read and write
E18000
heap
page read and write
2820000
heap
page read and write
2EE2000
trusted library allocation
page read and write
1180000
trusted library allocation
page read and write
790000
heap
page read and write
D60000
heap
page read and write
AFD000
stack
page read and write
7DE000
stack
page read and write
92C000
stack
page read and write
F6F000
stack
page read and write
549F000
stack
page read and write
CF9000
stack
page read and write
72C000
stack
page read and write
2EEB000
trusted library allocation
page read and write
2F0F000
trusted library allocation
page read and write
2F01000
trusted library allocation
page read and write
539E000
stack
page read and write
C30000
trusted library allocation
page read and write
2EC9000
trusted library allocation
page read and write
2EF6000
trusted library allocation
page read and write
11D0000
heap
page read and write
3E61000
trusted library allocation
page read and write
2E95000
trusted library allocation
page read and write
DF5000
heap
page read and write
2EA8000
trusted library allocation
page read and write
C20000
heap
page read and write
5040000
trusted library allocation
page read and write
2F0C000
trusted library allocation
page read and write
2ECF000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
2EC4000
trusted library allocation
page read and write
2F1A000
trusted library allocation
page read and write
2ED9000
trusted library allocation
page read and write
There are 85 hidden memdumps, click here to show them.