Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\d610000.dll.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\d610000.dll.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\d610000.dll.dll,#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\d610000.dll.dll",#1
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
21D887B0000
|
heap
|
page read and write
|
||
1FAD0C80000
|
trusted library allocation
|
page read and write
|
||
21D88A80000
|
heap
|
page read and write
|
||
1D5C11C3000
|
heap
|
page read and write
|
||
AC653EE000
|
stack
|
page read and write
|
||
1FACF030000
|
heap
|
page read and write
|
||
21D88A85000
|
heap
|
page read and write
|
||
21D8BB90000
|
heap
|
page read and write
|
||
1D5C1070000
|
heap
|
page read and write
|
||
21D8884F000
|
heap
|
page read and write
|
||
1FACD55F000
|
heap
|
page read and write
|
||
1D5C12B0000
|
heap
|
page read and write
|
||
1FACD2E0000
|
heap
|
page read and write
|
||
21D88852000
|
heap
|
page read and write
|
||
21D88852000
|
heap
|
page read and write
|
||
1FACD6F0000
|
heap
|
page read and write
|
||
1FACD745000
|
heap
|
page read and write
|
||
21D88849000
|
heap
|
page read and write
|
||
21D88A8B000
|
heap
|
page read and write
|
||
21D887D0000
|
heap
|
page read and write
|
||
1FACD557000
|
heap
|
page read and write
|
||
21D88875000
|
heap
|
page read and write
|
||
21D88846000
|
heap
|
page read and write
|
||
21D88852000
|
heap
|
page read and write
|
||
1FACD740000
|
heap
|
page read and write
|
||
1D5C11B0000
|
heap
|
page read and write
|
||
1FACD56D000
|
heap
|
page read and write
|
||
560851D000
|
stack
|
page read and write
|
||
1FACD440000
|
heap
|
page read and write
|
||
1FACD563000
|
heap
|
page read and write
|
||
21D8883B000
|
heap
|
page read and write
|
||
1FACD56D000
|
heap
|
page read and write
|
||
21D88856000
|
heap
|
page read and write
|
||
DDC6A7E000
|
stack
|
page read and write
|
||
1FACD586000
|
heap
|
page read and write
|
||
21D8885F000
|
heap
|
page read and write
|
||
21D8BBA0000
|
trusted library allocation
|
page read and write
|
||
AC6536E000
|
stack
|
page read and write
|
||
1FACD540000
|
heap
|
page read and write
|
||
21D8885A000
|
heap
|
page read and write
|
||
21D88740000
|
heap
|
page read and write
|
||
21D8C3A0000
|
heap
|
page read and write
|
||
1FACD572000
|
heap
|
page read and write
|
||
1FACD569000
|
heap
|
page read and write
|
||
1FACD420000
|
heap
|
page read and write
|
||
21D88837000
|
heap
|
page read and write
|
||
1D5C11BD000
|
heap
|
page read and write
|
||
21D88852000
|
heap
|
page read and write
|
||
1FACD55A000
|
heap
|
page read and write
|
||
21D88830000
|
heap
|
page read and write
|
||
21D88A10000
|
heap
|
page read and write
|
||
AC652EB000
|
stack
|
page read and write
|
||
1FACD6F3000
|
heap
|
page read and write
|
||
21D8884D000
|
heap
|
page read and write
|
||
56088FF000
|
stack
|
page read and write
|
||
21D8BB93000
|
heap
|
page read and write
|
||
1FACD548000
|
heap
|
page read and write
|
||
21D8885A000
|
heap
|
page read and write
|
||
21D88849000
|
heap
|
page read and write
|
||
1FACD74B000
|
heap
|
page read and write
|
||
21D88853000
|
heap
|
page read and write
|
||
1FACD55E000
|
heap
|
page read and write
|
||
1FACD55A000
|
heap
|
page read and write
|
||
DDC676B000
|
stack
|
page read and write
|
||
1FACD563000
|
heap
|
page read and write
|
||
1FACD57E000
|
heap
|
page read and write
|
||
1FACD4B0000
|
heap
|
page read and write
|
||
DDC67ED000
|
stack
|
page read and write
|
There are 58 hidden memdumps, click here to show them.