IOC Report
mydoc.zip

loading gif

Files

File Path
Type
Category
Malicious
mydoc.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
initial sample
C:\Users\user\AppData\Local\Temp\unarchiver.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\unarchiver.exe
"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Desktop\mydoc.zip"
C:\Windows\SysWOW64\7za.exe
"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\pk3m1tos.mei" "C:\Users\user\Desktop\mydoc.zip"

Memdumps

Base Address
Regiontype
Protect
Malicious
22E000
heap
page read and write
25A1000
trusted library allocation
page read and write
53E000
stack
page read and write
10000
heap
page read and write
1C0000
heap
page read and write
253C000
trusted library allocation
page read and write
2596000
trusted library allocation
page read and write
4C9E000
stack
page read and write
12C000
stack
page read and write
2507000
trusted library allocation
page read and write
570000
heap
page read and write
2545000
trusted library allocation
page read and write
1A0000
trusted library allocation
page read and write
256F000
trusted library allocation
page read and write
24F9000
trusted library allocation
page read and write
A0000
heap
page read and write
2A0000
heap
page read and write
2529000
trusted library allocation
page read and write
F9E000
stack
page read and write
747000
heap
page read and write
140000
heap
page read and write
462F000
stack
page read and write
2569000
trusted library allocation
page read and write
740000
heap
page read and write
252E000
trusted library allocation
page read and write
2526000
trusted library allocation
page read and write
F5E000
stack
page read and write
4AE000
stack
page read and write
1AC000
trusted library allocation
page execute and read and write
15D000
heap
page read and write
2582000
trusted library allocation
page read and write
250000
trusted library allocation
page read and write
251A000
trusted library allocation
page read and write
256C000
trusted library allocation
page read and write
234000
heap
page read and write
2517000
trusted library allocation
page read and write
2550000
trusted library allocation
page read and write
10000
heap
page read and write
24B1000
trusted library allocation
page read and write
24FF000
trusted library allocation
page read and write
2558000
trusted library allocation
page read and write
4D0000
trusted library allocation
page execute and read and write
253F000
trusted library allocation
page read and write
2553000
trusted library allocation
page read and write
A00000
heap
page execute and read and write
24F2000
trusted library allocation
page read and write
2577000
trusted library allocation
page read and write
2512000
trusted library allocation
page read and write
130000
trusted library allocation
page read and write
570000
heap
page read and write
4C0000
trusted library allocation
page read and write
254D000
trusted library allocation
page read and write
257A000
trusted library allocation
page read and write
44FE000
stack
page read and write
1E4000
heap
page read and write
2542000
trusted library allocation
page read and write
24CA000
trusted library allocation
page read and write
1A2000
trusted library allocation
page execute and read and write
24D2000
trusted library allocation
page read and write
2588000
trusted library allocation
page read and write
237000
heap
page read and write
257D000
trusted library allocation
page read and write
255B000
trusted library allocation
page read and write
140000
heap
page read and write
462E000
stack
page read and write | page guard
259B000
trusted library allocation
page read and write
C0F000
stack
page read and write
2590000
trusted library allocation
page read and write
2504000
trusted library allocation
page read and write
2574000
trusted library allocation
page read and write
250A000
trusted library allocation
page read and write
2531000
trusted library allocation
page read and write
2585000
trusted library allocation
page read and write
219F000
stack
page read and write
4E0000
heap
page read and write
254A000
trusted library allocation
page read and write
2534000
trusted library allocation
page read and write
41D000
stack
page read and write
3EB000
stack
page read and write
19C000
stack
page read and write
765000
heap
page read and write
7EF50000
trusted library allocation
page execute and read and write
25A4000
trusted library allocation
page read and write
2CA000
trusted library allocation
page execute and read and write
250C000
trusted library allocation
page read and write
2566000
trusted library allocation
page read and write
152000
trusted library allocation
page execute and read and write
2561000
trusted library allocation
page read and write
2D7000
trusted library allocation
page execute and read and write
2A6000
heap
page read and write
2537000
trusted library allocation
page read and write
240000
heap
page read and write
20C000
heap
page read and write
4A3D000
stack
page read and write
3E6000
stack
page read and write
20000
heap
page read and write
1AA000
trusted library allocation
page execute and read and write
2DB000
trusted library allocation
page execute and read and write
255E000
trusted library allocation
page read and write
2523000
trusted library allocation
page read and write
2593000
trusted library allocation
page read and write
460000
heap
page execute and read and write
1C7000
heap
page read and write
15A000
trusted library allocation
page execute and read and write
2C2000
trusted library allocation
page execute and read and write
258B000
trusted library allocation
page read and write
34B1000
trusted library allocation
page read and write
1F8000
heap
page read and write
24C2000
trusted library allocation
page read and write
259E000
trusted library allocation
page read and write
There are 100 hidden memdumps, click here to show them.