IOC Report
file.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\file.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\file.dll",#1

Memdumps

Base Address
Regiontype
Protect
Malicious
2CB0000
heap
page read and write
2AC0000
heap
page read and write
61D0000
trusted library allocation
page read and write
134E000
stack
page read and write
2C4F000
stack
page read and write
FA0000
heap
page read and write
2CCF000
heap
page read and write
FD0000
heap
page read and write
2CDC000
heap
page read and write
2CCF000
heap
page read and write
2CFC000
heap
page read and write
2CBA000
heap
page read and write
2CDC000
heap
page read and write
27F0000
heap
page read and write
2CDD000
heap
page read and write
E5D000
stack
page read and write
104B000
heap
page read and write
2CDC000
heap
page read and write
2CF3000
heap
page read and write
14F0000
heap
page read and write
2CD8000
heap
page read and write
104F000
heap
page read and write
278C000
stack
page read and write
5E04000
heap
page read and write
274A000
stack
page read and write
2F5A000
heap
page read and write
2ABF000
stack
page read and write
2A00000
heap
page read and write
2CF4000
heap
page read and write
FC0000
heap
page read and write
2F56000
heap
page read and write
2CCC000
heap
page read and write
2F50000
heap
page read and write
101E000
stack
page read and write
130F000
stack
page read and write
2CDF000
heap
page read and write
2CDE000
heap
page read and write
2C90000
heap
page read and write
2CD3000
heap
page read and write
2C80000
heap
page read and write
F5D000
stack
page read and write
144F000
stack
page read and write
2BFE000
stack
page read and write
2A7E000
stack
page read and write
5E00000
heap
page read and write
1040000
heap
page read and write
There are 36 hidden memdumps, click here to show them.