Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\RPHSNqfBjbKzV.dll,#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll",#1
|
||
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll",#1
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
286C000
|
heap
|
page read and write
|
||
289F000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
2E36000
|
heap
|
page read and write
|
||
2DBB000
|
heap
|
page read and write
|
||
34BA000
|
heap
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
2D1E000
|
stack
|
page read and write
|
||
2D5F000
|
stack
|
page read and write
|
||
4FED000
|
direct allocation
|
page readonly
|
||
2FC0000
|
heap
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
252B000
|
stack
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
5ADD000
|
direct allocation
|
page readonly
|
||
2DC6000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
2FEC000
|
stack
|
page read and write
|
||
2590000
|
heap
|
page read and write
|
||
32DE000
|
stack
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
7FF000
|
heap
|
page read and write
|
||
2DFF000
|
heap
|
page read and write
|
||
4EFA000
|
direct allocation
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
2850000
|
heap
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
536F000
|
direct allocation
|
page execute and read and write
|
||
35B0000
|
heap
|
page read and write
|
||
3690000
|
heap
|
page read and write
|
||
4A20000
|
direct allocation
|
page read and write
|
||
353F000
|
heap
|
page read and write
|
||
34D2000
|
heap
|
page read and write
|
||
4A21000
|
direct allocation
|
page execute read
|
||
4FEF000
|
direct allocation
|
page execute and read and write
|
||
345E000
|
stack
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
34DC000
|
heap
|
page read and write
|
||
2DB6000
|
heap
|
page read and write
|
||
2DCC000
|
heap
|
page read and write
|
||
2FAB000
|
stack
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
2DB1000
|
heap
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
5511000
|
direct allocation
|
page execute read
|
||
2D9A000
|
heap
|
page read and write
|
||
34D1000
|
heap
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
2E2E000
|
heap
|
page read and write
|
||
2FE6000
|
stack
|
page read and write
|
||
34D7000
|
heap
|
page read and write
|
||
22B0000
|
heap
|
page read and write
|
||
4B7A000
|
direct allocation
|
page read and write
|
||
2866000
|
heap
|
page read and write
|
||
566A000
|
direct allocation
|
page read and write
|
||
3520000
|
heap
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
2E1E000
|
heap
|
page read and write
|
||
2DBF000
|
heap
|
page read and write
|
||
24EB000
|
stack
|
page read and write
|
||
2A5B000
|
stack
|
page read and write
|
||
2CCF000
|
stack
|
page read and write
|
||
285F000
|
heap
|
page read and write
|
||
536D000
|
direct allocation
|
page readonly
|
||
2DB0000
|
heap
|
page read and write
|
||
7FB000
|
heap
|
page read and write
|
||
42BF000
|
stack
|
page read and write
|
||
9EF000
|
stack
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
2525000
|
stack
|
page read and write
|
||
296E000
|
stack
|
page read and write
|
||
3537000
|
heap
|
page read and write
|
||
AEF000
|
stack
|
page read and write
|
||
283A000
|
heap
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
341F000
|
stack
|
page read and write
|
||
34EC000
|
heap
|
page read and write
|
||
34DF000
|
heap
|
page read and write
|
||
2856000
|
heap
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
354F000
|
heap
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
2E16000
|
heap
|
page read and write
|
||
349E000
|
stack
|
page read and write
|
||
285B000
|
heap
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
4340000
|
heap
|
page read and write
|
||
3557000
|
heap
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
34E6000
|
heap
|
page read and write
|
||
25A0000
|
heap
|
page read and write
|
||
2A9C000
|
stack
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
2851000
|
heap
|
page read and write
|
||
4DA1000
|
direct allocation
|
page execute read
|
||
3010000
|
heap
|
page read and write
|
||
5370000
|
direct allocation
|
page read and write
|
||
29AF000
|
stack
|
page read and write
|
||
5ADF000
|
direct allocation
|
page execute and read and write
|
||
5AE0000
|
direct allocation
|
page read and write
|
||
2A96000
|
stack
|
page read and write
|
||
3CC000
|
stack
|
page read and write
|
||
80D000
|
heap
|
page read and write
|
||
5510000
|
direct allocation
|
page read and write
|
||
2CC000
|
stack
|
page read and write
|
There are 97 hidden memdumps, click here to show them.