IOC Report
5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca.zip

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

Memdumps

Base Address
Regiontype
Protect
Malicious
1BC550A0000
heap
page read and write
1BC56A90000
heap
page read and write
B13D0FE000
stack
page read and write
1BC54FC0000
heap
page read and write
1BC553F0000
heap
page read and write
1BC55128000
heap
page read and write
1BC553F5000
heap
page read and write
B13CDAC000
stack
page read and write
B13D07E000
stack
page read and write
1BC55120000
heap
page read and write
B13D17F000
stack
page read and write
1BC550C0000
heap
page read and write
There are 2 hidden memdumps, click here to show them.