IOC Report
Velaro-Setup-3.0.1.exe.004

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding

Memdumps

Base Address
Regiontype
Protect
Malicious
1528CC50000
heap
page read and write
21C10FE000
stack
page read and write
1528CC10000
heap
page read and write
1528CC80000
heap
page read and write
21C107E000
stack
page read and write
21C0D5E000
stack
page read and write
1528CC55000
heap
page read and write
1528CBE0000
heap
page read and write
21C0CDA000
stack
page read and write
1528E5A0000
heap
page read and write
21C117E000
stack
page read and write
1528CCBB000
heap
page read and write
21C0DDE000
stack
page read and write
1528CAA0000
heap
page read and write
1528CC89000
heap
page read and write
There are 5 hidden memdumps, click here to show them.