IOC Report
OneDrive_1_25-11-2024.zip

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

URLs

Name
IP
Malicious
http://www.eci.org/eci/en/eciRGB.phpdesc
unknown
http://www.eci.org/eci/en/eciRGB.php
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1689C340000
heap
page read and write
1689BFD9000
heap
page read and write
1689BF40000
heap
page read and write
1689BF30000
heap
page read and write
28BEE7E000
stack
page read and write
1689BF60000
heap
page read and write
28BEEFF000
stack
page read and write
28BEF7E000
stack
page read and write
1689DB10000
heap
page read and write
1689C345000
heap
page read and write
1689BFD0000
heap
page read and write
28BEBFC000
stack
page read and write
There are 2 hidden memdumps, click here to show them.