IOC Report
CA-70408.zip

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

Memdumps

Base Address
Regiontype
Protect
Malicious
1F8D6180000
heap
page read and write
1F8D5F20000
heap
page read and write
1F8D5FB9000
heap
page read and write
ABA4B7E000
stack
page read and write
1F8D7AA0000
heap
page read and write
ABA4BFE000
stack
page read and write
ABA4AFF000
stack
page read and write
ABA4A7C000
stack
page read and write
1F8D5E20000
heap
page read and write
1F8D6185000
heap
page read and write
1F8D5F00000
heap
page read and write
1F8D5FB0000
heap
page read and write
There are 2 hidden memdumps, click here to show them.