IOC Report
x318002.dat

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\x318002.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\x318002.dll",#1
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\x318002.dll,ServiceMain
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\x318002.dll",#1

URLs

Name
IP
Malicious
https://ipinfo.io/json
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
3E0000
heap
page read and write
41E000
heap
page read and write
1E89000
heap
page read and write
20B000
stack
page read and write
AB000
stack
page read and write
1D15000
heap
page read and write
280000
heap
page read and write
430000
heap
page read and write
10000
heap
page read and write
287000
heap
page read and write
230000
heap
page read and write
1E80000
heap
page read and write
3B6000
heap
page read and write
1CF0000
heap
page read and write
10000
heap
page read and write
380000
heap
page read and write
20000
heap
page read and write
2BE000
heap
page read and write
1E19000
heap
page read and write
2F0000
heap
page read and write
32E000
heap
page read and write
124000
heap
page read and write
2840000
heap
page read and write
10000
heap
page read and write
287B000
heap
page read and write
234000
heap
page read and write
1C70000
heap
page read and write
120000
heap
page read and write
2845000
heap
page read and write
1FD000
stack
page read and write
1E15000
heap
page read and write
2F8000
heap
page read and write
1E10000
heap
page read and write
1D10000
heap
page read and write
246000
heap
page read and write
1D4B000
heap
page read and write
1E85000
heap
page read and write
210000
heap
page read and write
3E7000
heap
page read and write
There are 29 hidden memdumps, click here to show them.