IOC Report
OneDrive_1_25-11-2024.zip

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

URLs

Name
IP
Malicious
http://www.eci.org/eci/en/eciRGB.phpdesc
unknown
http://www.eci.org/eci/en/eciRGB.php
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
4610FFF000
stack
page read and write
20939625000
heap
page read and write
20939400000
heap
page read and write
4610E7C000
stack
page read and write
209393F8000
heap
page read and write
4610F7E000
stack
page read and write
20939320000
heap
page read and write
4610EFF000
stack
page read and write
20939340000
heap
page read and write
209395B0000
heap
page read and write
209393F0000
heap
page read and write
20939240000
heap
page read and write
20939620000
heap
page read and write
There are 3 hidden memdumps, click here to show them.