IOC Report
MDE_File_Sample_d09ac12e80d793e2bb60f6dc17656721cb8751bf.zip

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172

Memdumps

Base Address
Regiontype
Protect
Malicious
18A18B00000
heap
page read and write
87F6E8C000
stack
page read and write
87F6F0E000
stack
page read and write
18A18900000
heap
page read and write
87F6F8E000
stack
page read and write
87F727F000
stack
page read and write
18A18C40000
heap
page read and write
18A18918000
heap
page read and write
18A1A580000
heap
page read and write
18A18AE0000
heap
page read and write
18A18C45000
heap
page read and write
18A18910000
heap
page read and write
18A1891E000
heap
page read and write
There are 3 hidden memdumps, click here to show them.