IOC Report
powershell.zip

loading gif

Files

File Path
Type
Category
Malicious
powershell.zip
Unicode text, UTF-16, little-endian text, with very long lines (32767), with no line terminators
initial sample
C:\Users\user\AppData\Local\Temp\unarchiver.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\unarchiver.exe
"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Desktop\powershell.zip"
C:\Windows\SysWOW64\7za.exe
"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\ymnnrtn0.425" "C:\Users\user\Desktop\powershell.zip"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
26B6000
trusted library allocation
page read and write
902000
trusted library allocation
page execute and read and write
269D000
trusted library allocation
page read and write
86F000
stack
page read and write
947000
trusted library allocation
page execute and read and write
638000
heap
page read and write
26B9000
trusted library allocation
page read and write
2150000
trusted library allocation
page read and write
2674000
trusted library allocation
page read and write
26A8000
trusted library allocation
page read and write
2235000
heap
page read and write
415000
heap
page read and write
26AB000
trusted library allocation
page read and write
90A000
trusted library allocation
page execute and read and write
26FC000
trusted library allocation
page read and write
76E000
stack
page read and write
26A3000
trusted library allocation
page read and write
234C000
heap
page read and write
610000
heap
page read and write
B50000
heap
page read and write
2687000
trusted library allocation
page read and write
430000
heap
page read and write
487000
heap
page read and write
1AC000
stack
page read and write
43A000
heap
page read and write
2611000
trusted library allocation
page read and write
8F0000
trusted library allocation
page read and write
26E3000
trusted library allocation
page read and write
4AEA000
stack
page read and write
26D2000
trusted library allocation
page read and write
2240000
heap
page read and write
1B6000
stack
page read and write
910000
trusted library allocation
page read and write
26DD000
trusted library allocation
page read and write
8AE000
stack
page read and write
2678000
trusted library allocation
page read and write
9AF000
stack
page read and write
410000
heap
page read and write
26E0000
trusted library allocation
page read and write
26EB000
trusted library allocation
page read and write
46EE000
stack
page read and write
4B4000
heap
page read and write
2670000
trusted library allocation
page read and write
22CF000
stack
page read and write
620000
heap
page read and write
2684000
trusted library allocation
page read and write
26CD000
trusted library allocation
page read and write
4B8000
heap
page read and write
4CCE000
stack
page read and write
2658000
trusted library allocation
page read and write
26F9000
trusted library allocation
page read and write
26EE000
trusted library allocation
page read and write
2707000
trusted library allocation
page read and write
520000
heap
page read and write
46D000
heap
page read and write
94B000
trusted library allocation
page execute and read and write
7FC80000
trusted library allocation
page execute and read and write
26CA000
trusted library allocation
page read and write
264C000
trusted library allocation
page read and write
268F000
trusted library allocation
page read and write
B90000
trusted library allocation
page execute and read and write
932000
trusted library allocation
page execute and read and write
1F0000
heap
page read and write
3611000
trusted library allocation
page read and write
2672000
trusted library allocation
page read and write
26C4000
trusted library allocation
page read and write
BA0000
heap
page read and write
47B000
heap
page read and write
47E000
heap
page read and write
98E000
stack
page read and write
26BC000
trusted library allocation
page read and write
620000
heap
page read and write
4DCE000
stack
page read and write
9B0000
heap
page read and write
456000
heap
page read and write
43E000
heap
page read and write
630000
heap
page read and write
4FD000
stack
page read and write
269A000
trusted library allocation
page read and write
26FF000
trusted library allocation
page read and write
2681000
trusted library allocation
page read and write
26E6000
trusted library allocation
page read and write
26D5000
trusted library allocation
page read and write
473000
heap
page read and write
2640000
trusted library allocation
page read and write
530000
heap
page read and write
600000
heap
page read and write
2668000
trusted library allocation
page read and write
26F4000
trusted library allocation
page read and write
267B000
trusted library allocation
page read and write
91C000
trusted library allocation
page execute and read and write
93A000
trusted library allocation
page execute and read and write
2695000
trusted library allocation
page read and write
26C7000
trusted library allocation
page read and write
91A000
trusted library allocation
page execute and read and write
2660000
trusted library allocation
page read and write
26B1000
trusted library allocation
page read and write
2692000
trusted library allocation
page read and write
1B9000
stack
page read and write
26A0000
trusted library allocation
page read and write
2702000
trusted library allocation
page read and write
26AE000
trusted library allocation
page read and write
B80000
trusted library allocation
page read and write
270A000
trusted library allocation
page read and write
BB0000
heap
page execute and read and write
1BB000
stack
page read and write
2230000
heap
page read and write
2241000
heap
page read and write
49ED000
stack
page read and write
BC000
stack
page read and write
26D8000
trusted library allocation
page read and write
26F1000
trusted library allocation
page read and write
912000
trusted library allocation
page execute and read and write
268C000
trusted library allocation
page read and write
264E000
trusted library allocation
page read and write
47EE000
stack
page read and write
26BF000
trusted library allocation
page read and write
There are 107 hidden memdumps, click here to show them.