IOC Report
PUESTO.zip

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

Memdumps

Base Address
Regiontype
Protect
Malicious
27BE67C000
stack
page read and write
1F5590C0000
heap
page read and write
1F5591C0000
heap
page read and write
1F55AC30000
heap
page read and write
27BE7FF000
stack
page read and write
1F5590A0000
heap
page read and write
27BE77E000
stack
page read and write
27BE6FF000
stack
page read and write
1F5590C8000
heap
page read and write
1F558FC0000
heap
page read and write
1F559300000
heap
page read and write
1F559305000
heap
page read and write
There are 2 hidden memdumps, click here to show them.