Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\FastMath.dll.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\FastMath.dll.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\FastMath.dll.dll",#1
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
8403BEE000
|
stack
|
page read and write
|
||
8403E7F000
|
stack
|
page read and write
|
||
210EA19C000
|
heap
|
page read and write
|
||
CA646FF000
|
stack
|
page read and write
|
||
8403EFE000
|
stack
|
page read and write
|
||
210EA195000
|
heap
|
page read and write
|
||
25BDDF20000
|
heap
|
page read and write
|
||
210ED840000
|
trusted library allocation
|
page read and write
|
||
210ED6E0000
|
heap
|
page read and write
|
||
210EA0E0000
|
heap
|
page read and write
|
||
25BDE000000
|
heap
|
page read and write
|
||
210EA385000
|
heap
|
page read and write
|
||
25BDE040000
|
heap
|
page read and write
|
||
210ED6C0000
|
heap
|
page read and write
|
||
25BDE080000
|
heap
|
page read and write
|
||
25BDFD90000
|
heap
|
page read and write
|
||
8403B6F000
|
stack
|
page read and write
|
||
210EA150000
|
heap
|
page read and write
|
||
CA645FF000
|
stack
|
page read and write
|
||
210EA38B000
|
heap
|
page read and write
|
||
210EA18F000
|
heap
|
page read and write
|
||
210EA1A4000
|
heap
|
page read and write
|
||
210EA18F000
|
heap
|
page read and write
|
||
25BDE0E9000
|
heap
|
page read and write
|
||
210EA0F0000
|
heap
|
page read and write
|
||
210EA198000
|
heap
|
page read and write
|
||
25BDE040000
|
heap
|
page read and write
|
||
210EA18C000
|
heap
|
page read and write
|
||
210ED6C3000
|
heap
|
page read and write
|
||
25BDE11E000
|
heap
|
page read and write
|
||
25BDE0F8000
|
heap
|
page read and write
|
||
25BDE106000
|
heap
|
page read and write
|
||
25BDE0E0000
|
heap
|
page read and write
|
||
25BDE120000
|
heap
|
page read and write
|
||
210EA198000
|
heap
|
page read and write
|
||
8403AD6000
|
stack
|
page read and write
|
||
210EA16D000
|
heap
|
page read and write
|
||
210EA19D000
|
heap
|
page read and write
|
||
210EA1A1000
|
heap
|
page read and write
|
||
210EA18F000
|
heap
|
page read and write
|
||
CA644E6000
|
stack
|
page read and write
|
||
210EA18F000
|
heap
|
page read and write
|
||
25BDE0ED000
|
heap
|
page read and write
|
||
210EA1A1000
|
heap
|
page read and write
|
||
210EBE70000
|
heap
|
page read and write
|
||
210EA380000
|
heap
|
page read and write
|
||
210EA198000
|
heap
|
page read and write
|
||
210EA110000
|
heap
|
page read and write
|
||
210EA184000
|
heap
|
page read and write
|
||
210EA185000
|
heap
|
page read and write
|
||
210EA198000
|
heap
|
page read and write
|
||
210EA198000
|
heap
|
page read and write
|
||
210EA158000
|
heap
|
page read and write
|
There are 43 hidden memdumps, click here to show them.