IOC Report
file.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\file.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\file.dll",#1

Memdumps

Base Address
Regiontype
Protect
Malicious
30BA000
heap
page read and write
3290000
heap
page read and write
340A000
heap
page read and write
30F4000
heap
page read and write
66F000
stack
page read and write
334F000
stack
page read and write
30F3000
heap
page read and write
30D8000
heap
page read and write
1AD000
stack
page read and write
64C0000
heap
page read and write
30DC000
heap
page read and write
560000
heap
page read and write
3070000
heap
page read and write
64B0000
heap
page read and write
850000
heap
page read and write
9C0000
heap
page read and write
4F0000
heap
page read and write
30CF000
heap
page read and write
85B000
heap
page read and write
30CC000
heap
page read and write
30DD000
heap
page read and write
AD000
stack
page read and write
3400000
heap
page read and write
6564000
heap
page read and write
33CF000
stack
page read and write
6560000
heap
page read and write
30DC000
heap
page read and write
410000
heap
page read and write
30CF000
heap
page read and write
30D3000
heap
page read and write
338E000
stack
page read and write
3406000
heap
page read and write
30FC000
heap
page read and write
84F000
stack
page read and write
85F000
heap
page read and write
303C000
stack
page read and write
6AE000
stack
page read and write
2DF9000
stack
page read and write
30DE000
heap
page read and write
30DC000
heap
page read and write
30B0000
heap
page read and write
31B0000
heap
page read and write
53E000
stack
page read and write
30DF000
heap
page read and write
330E000
stack
page read and write
68E0000
trusted library allocation
page read and write
There are 36 hidden memdumps, click here to show them.