IOC Report
8TuwlFKxC5.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\8TuwlFKxC5.dll"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\8TuwlFKxC5.dll,FreeLibraryMemoryAndExitThread
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\8TuwlFKxC5.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\8TuwlFKxC5.dll,NtUnloadDllMemoryAndExitThread
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\8TuwlFKxC5.dll",FreeLibraryMemoryAndExitThread
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\8TuwlFKxC5.dll",NtUnloadDllMemoryAndExitThread
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\8TuwlFKxC5.dll",#1

Memdumps

Base Address
Regiontype
Protect
Malicious
2920000
heap
page read and write
3400000
heap
page read and write
4E00000
heap
page read and write
6E0DB000
unkown
page readonly
6E0B1000
unkown
page execute read
327C000
stack
page read and write
320F000
heap
page read and write
6E0B0000
unkown
page readonly
2F3B000
stack
page read and write
30D0000
heap
page read and write
AB0000
heap
page read and write
4D60000
heap
page read and write
6E0DB000
unkown
page readonly
3270000
heap
page read and write
340A000
heap
page read and write
303B000
stack
page read and write
6E0E5000
unkown
page write copy
6E0B1000
unkown
page execute read
33D0000
heap
page read and write
3100000
heap
page read and write
2660000
heap
page read and write
5D0000
heap
page read and write
6E0EC000
unkown
page readonly
32D0000
heap
page read and write
2CA0000
heap
page read and write
35BA000
heap
page read and write
8FC000
stack
page read and write
6E0DB000
unkown
page readonly
6E0B1000
unkown
page execute read
3450000
heap
page read and write
303C000
stack
page read and write
5E0000
heap
page read and write
30D0000
heap
page read and write
6E0B0000
unkown
page readonly
31FA000
heap
page read and write
2DFB000
stack
page read and write
2A1A000
heap
page read and write
30E0000
heap
page read and write
36B0000
heap
page read and write
6E0EC000
unkown
page readonly
ABF000
heap
page read and write
25DC000
stack
page read and write
2FF0000
heap
page read and write
97E000
stack
page read and write
33B0000
heap
page read and write
6E0DB000
unkown
page readonly
DAF000
stack
page read and write
32E0000
heap
page read and write
6E0B0000
unkown
page readonly
6E0DB000
unkown
page readonly
31F0000
heap
page read and write
6E0B1000
unkown
page execute read
3880000
heap
page read and write
4C50000
heap
page read and write
ABB000
heap
page read and write
56C000
stack
page read and write
CAF000
stack
page read and write
6E0E5000
unkown
page write copy
6E0EC000
unkown
page readonly
2F7C000
stack
page read and write
93E000
stack
page read and write
6E0E8000
unkown
page read and write
323B000
stack
page read and write
2FE0000
heap
page read and write
30B0000
heap
page read and write
4F50000
heap
page read and write
6E0B0000
unkown
page readonly
ACD000
heap
page read and write
6E0E5000
unkown
page write copy
6E0B1000
unkown
page execute read
6E0E8000
unkown
page read and write
2970000
heap
page read and write
307C000
stack
page read and write
30A0000
heap
page read and write
6E0E8000
unkown
page read and write
327A000
heap
page read and write
6E0EC000
unkown
page readonly
980000
heap
page read and write
6E0E8000
unkown
page read and write
6E0B0000
unkown
page readonly
6E0E8000
unkown
page read and write
6E0EC000
unkown
page readonly
35B0000
heap
page read and write
6E0E5000
unkown
page write copy
4470000
heap
page read and write
259B000
stack
page read and write
AC7000
heap
page read and write
2840000
heap
page read and write
2A10000
heap
page read and write
3140000
heap
page read and write
AD4000
heap
page read and write
6E0E5000
unkown
page write copy
There are 82 hidden memdumps, click here to show them.