IOC Report
38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip

loading gif

Files

File Path
Type
Category
Malicious
38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip
Zip archive data, at least v2.0 to extract, compression method=store
initial sample
malicious
C:\Users\user\AppData\Local\Temp\u0djtksr.ouv\38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\unarchiver.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\unarchiver.exe
"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Desktop\38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip"
C:\Windows\SysWOW64\7za.exe
"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\u0djtksr.ouv" "C:\Users\user\Desktop\38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
492D000
stack
page read and write
274F000
trusted library allocation
page read and write
BF0000
heap
page execute and read and write
4F9000
stack
page read and write
BCE000
stack
page read and write
872000
trusted library allocation
page execute and read and write
2740000
trusted library allocation
page read and write
36E1000
trusted library allocation
page read and write
618000
heap
page read and write
BD0000
trusted library allocation
page execute and read and write
274C000
trusted library allocation
page read and write
14C000
stack
page read and write
9C2000
trusted library allocation
page execute and read and write
5F0000
heap
page read and write
272A000
trusted library allocation
page read and write
300000
heap
page read and write
271C000
trusted library allocation
page read and write
5E0000
trusted library allocation
page read and write
88A000
trusted library allocation
page execute and read and write
24D000
stack
page read and write
B8E000
stack
page read and write
82F000
stack
page read and write
23D0000
trusted library allocation
page read and write
2748000
trusted library allocation
page read and write
3E0000
trusted library allocation
page read and write
4DEF000
stack
page read and write
4A2D000
stack
page read and write
2735000
trusted library allocation
page read and write
4F6000
stack
page read and write
4FB000
stack
page read and write
97F000
stack
page read and write
4CEE000
stack
page read and write
610000
heap
page read and write
2B0000
heap
page read and write
39E000
stack
page read and write
87A000
trusted library allocation
page execute and read and write
4B6D000
stack
page read and write
273B000
trusted library allocation
page read and write
2220000
heap
page read and write
1D5000
heap
page read and write
62D000
heap
page read and write
A30000
heap
page read and write
2FE000
stack
page read and write
9DB000
trusted library allocation
page execute and read and write
271A000
trusted library allocation
page read and write
3B0000
heap
page read and write
4BAE000
stack
page read and write
72E000
stack
page read and write
86E000
stack
page read and write
13C000
stack
page read and write
8B0000
heap
page read and write
616000
heap
page read and write
88C000
trusted library allocation
page execute and read and write
487E000
stack
page read and write
23C5000
heap
page read and write
A7F000
stack
page read and write
5FE000
heap
page read and write
2743000
trusted library allocation
page read and write
9D7000
trusted library allocation
page execute and read and write
A1E000
stack
page read and write
4CAE000
stack
page read and write
7F6B0000
trusted library allocation
page execute and read and write
882000
trusted library allocation
page execute and read and write
1B0000
heap
page read and write
5FA000
heap
page read and write
2710000
trusted library allocation
page read and write
7A0000
heap
page read and write
9BF000
stack
page read and write
890000
heap
page read and write
4A6E000
stack
page read and write
A80000
heap
page read and write
2730000
trusted library allocation
page read and write
23C0000
heap
page read and write
1D0000
heap
page read and write
3C0000
trusted library allocation
page read and write
A70000
trusted library allocation
page read and write
26E1000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
9CA000
trusted library allocation
page execute and read and write
1A0000
heap
page read and write
There are 70 hidden memdumps, click here to show them.