IOC Report
CA-70408.zip

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

Memdumps

Base Address
Regiontype
Protect
Malicious
D8BA07F000
stack
page read and write
20A4A9B0000
heap
page read and write
20A4AAA7000
heap
page read and write
20A4AC60000
heap
page read and write
D8B9CAC000
stack
page read and write
20A4AC65000
heap
page read and write
20A4C550000
heap
page read and write
D8B9D2E000
stack
page read and write
20A4ABC0000
heap
page read and write
D8B9DAE000
stack
page read and write
20A4AAA0000
heap
page read and write
20A4ABA0000
heap
page read and write
There are 2 hidden memdumps, click here to show them.