IOC Report
ku46_xmM.zip

loading gif

Files

File Path
Type
Category
Malicious
ku46_xmM.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
initial sample
C:\Users\user\AppData\Local\Temp\unarchiver.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\unarchiver.exe
"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Desktop\ku46_xmM.zip"
C:\Windows\SysWOW64\7za.exe
"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\yvqdkcog.4vj" "C:\Users\user\Desktop\ku46_xmM.zip"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
2FE7000
trusted library allocation
page read and write
125C000
stack
page read and write
3009000
trusted library allocation
page read and write
3042000
trusted library allocation
page read and write
55DE000
stack
page read and write
3048000
trusted library allocation
page read and write
56DE000
stack
page read and write
100A000
trusted library allocation
page execute and read and write
104A000
heap
page read and write
307D000
trusted library allocation
page read and write
2FE4000
trusted library allocation
page read and write
3034000
trusted library allocation
page read and write
1012000
trusted library allocation
page execute and read and write
3195000
heap
page read and write
3061000
trusted library allocation
page read and write
1418000
heap
page read and write
161E000
stack
page read and write
135D000
stack
page read and write
512F000
stack
page read and write
3037000
trusted library allocation
page read and write
1040000
heap
page read and write
10A8000
heap
page read and write
13B0000
heap
page read and write
3013000
trusted library allocation
page read and write
308B000
trusted library allocation
page read and write
1066000
heap
page read and write
185E000
stack
page read and write
51BE000
stack
page read and write
143E000
stack
page read and write
CF9000
stack
page read and write
3093000
trusted library allocation
page read and write
1410000
heap
page read and write
FF0000
trusted library allocation
page read and write
3000000
trusted library allocation
page read and write
303D000
trusted library allocation
page read and write
CFB000
stack
page read and write
101A000
trusted library allocation
page execute and read and write
10B4000
heap
page read and write
99C000
stack
page read and write
3077000
trusted library allocation
page read and write
1002000
trusted library allocation
page execute and read and write
3190000
heap
page read and write
3069000
trusted library allocation
page read and write
171F000
stack
page read and write
EB0000
heap
page read and write
3050000
trusted library allocation
page read and write
2FF5000
trusted library allocation
page read and write
3045000
trusted library allocation
page read and write
3056000
trusted library allocation
page read and write
7FDC0000
trusted library allocation
page execute and read and write
1470000
heap
page read and write
2FC0000
trusted library allocation
page read and write
2FDF000
trusted library allocation
page read and write
302F000
trusted library allocation
page read and write
3085000
trusted library allocation
page read and write
3072000
trusted library allocation
page read and write
52BD000
stack
page read and write
2FFA000
trusted library allocation
page read and write
175E000
stack
page read and write
305E000
trusted library allocation
page read and write
104E000
heap
page read and write
1300000
trusted library allocation
page read and write
3021000
trusted library allocation
page read and write
301B000
trusted library allocation
page read and write
303A000
trusted library allocation
page read and write
14A0000
heap
page execute and read and write
1310000
trusted library allocation
page execute and read and write
3059000
trusted library allocation
page read and write
3010000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
D00000
heap
page read and write
3064000
trusted library allocation
page read and write
107D000
heap
page read and write
13F0000
heap
page read and write
FC0000
heap
page read and write
3006000
trusted library allocation
page read and write
2F91000
trusted library allocation
page read and write
3026000
trusted library allocation
page read and write
3018000
trusted library allocation
page read and write
103A000
trusted library allocation
page execute and read and write
2FF2000
trusted library allocation
page read and write
CF6000
stack
page read and write
3099000
trusted library allocation
page read and write
302C000
trusted library allocation
page read and write
3053000
trusted library allocation
page read and write
E80000
heap
page read and write
3080000
trusted library allocation
page read and write
EB5000
heap
page read and write
101C000
trusted library allocation
page execute and read and write
1032000
trusted library allocation
page execute and read and write
306C000
trusted library allocation
page read and write
304B000
trusted library allocation
page read and write
1330000
heap
page read and write
DE0000
heap
page read and write
1247000
trusted library allocation
page execute and read and write
128E000
stack
page read and write
1010000
trusted library allocation
page read and write
3000000
heap
page read and write
301E000
trusted library allocation
page read and write
3F91000
trusted library allocation
page read and write
308E000
trusted library allocation
page read and write
307A000
trusted library allocation
page read and write
12DE000
stack
page read and write
3100000
trusted library allocation
page read and write
3096000
trusted library allocation
page read and write
124B000
trusted library allocation
page execute and read and write
3029000
trusted library allocation
page read and write
306F000
trusted library allocation
page read and write
3088000
trusted library allocation
page read and write
13D0000
heap
page read and write
13C0000
heap
page read and write
There are 101 hidden memdumps, click here to show them.