IOC Report
CA-70408.zip

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

Memdumps

Base Address
Regiontype
Protect
Malicious
29D5ED10000
heap
page read and write
29D5ED17000
heap
page read and write
DD95A7F000
stack
page read and write
29D5EE90000
heap
page read and write
29D5EE10000
heap
page read and write
29D5EE95000
heap
page read and write
29D607B0000
heap
page read and write
DD957EC000
stack
page read and write
29D5ECE0000
heap
page read and write
29D5EC00000
heap
page read and write
DD95AFE000
stack
page read and write
DD95B7E000
stack
page read and write
There are 2 hidden memdumps, click here to show them.