IOC Report
oj5IqW8pvv.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\oj5IqW8pvv.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\oj5IqW8pvv.dll",#1
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\oj5IqW8pvv.dll",#1

Memdumps

Base Address
Regiontype
Protect
Malicious
21E810D3000
heap
page read and write
21E81040000
heap
page read and write
21E810B0000
heap
page read and write
21E810CA000
heap
page read and write
21E810D3000
heap
page read and write
21E812C0000
heap
page read and write
1599F35D000
heap
page read and write
21E810D0000
heap
page read and write
21E810EC000
heap
page read and write
1599F359000
heap
page read and write
712EAFF000
stack
page read and write
1599F270000
heap
page read and write
1599F190000
heap
page read and write
15A7AFC000
stack
page read and write
21E812E0000
heap
page read and write
21E812E3000
heap
page read and write
21E81300000
heap
page read and write
712EA7A000
stack
page read and write
21E81050000
heap
page read and write
21E810D4000
heap
page read and write
21E81070000
heap
page read and write
21E810B8000
heap
page read and write
21E81305000
heap
page read and write
1599F350000
heap
page read and write
There are 14 hidden memdumps, click here to show them.