IOC Report
_psutil_windows.cp311-win_amd64.pyd

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\_psutil_windows.cp311-win_amd64.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\_psutil_windows.cp311-win_amd64.dll",#1
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\_psutil_windows.cp311-win_amd64.dll,PyInit__psutil_windows
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\_psutil_windows.cp311-win_amd64.dll",#1

Memdumps

Base Address
Regiontype
Protect
Malicious
1958D983000
heap
page read and write
1958A7C0000
heap
page read and write
15B418F0000
heap
page read and write
254B5B90000
heap
page read and write
1958A6A8000
heap
page read and write
15B418DB000
heap
page read and write
1958A790000
heap
page read and write
15B418E4000
heap
page read and write
1958A6C5000
heap
page read and write
1958A670000
heap
page read and write
3B34B0A000
stack
page read and write
254B5C59000
heap
page read and write
15B418E5000
heap
page read and write
15B418A0000
heap
page read and write
3B34EFF000
stack
page read and write
1958A6AB000
heap
page read and write
1958C360000
heap
page read and write
15B41A95000
heap
page read and write
15B41A9B000
heap
page read and write
1958A6B4000
heap
page read and write
1958DCD0000
trusted library allocation
page read and write
7BD2BEA000
stack
page read and write
15B418DB000
heap
page read and write
254B5C50000
heap
page read and write
9449EFC000
stack
page read and write
254B5C5D000
heap
page read and write
15B418E4000
heap
page read and write
15B44C50000
heap
page read and write
15B44C53000
heap
page read and write
15B4190C000
heap
page read and write
3B34E7D000
stack
page read and write
3B34B8E000
stack
page read and write
9449FFF000
stack
page read and write
1958A7CB000
heap
page read and write
1958A6AF000
heap
page read and write
15B450A0000
trusted library allocation
page read and write
1958A6C0000
heap
page read and write
1958A6B4000
heap
page read and write
1958A6B5000
heap
page read and write
254B5AB0000
heap
page read and write
1958A698000
heap
page read and write
1958A590000
heap
page read and write
1958C1F0000
heap
page read and write
15B418F6000
heap
page read and write
15B418C8000
heap
page read and write
254B5C68000
heap
page read and write
15B418C0000
heap
page read and write
15B418E4000
heap
page read and write
7BD2EFD000
stack
page read and write
1958A69E000
heap
page read and write
7BD2E7F000
stack
page read and write
15B418DF000
heap
page read and write
1958D980000
heap
page read and write
1958A6B4000
heap
page read and write
15B41880000
heap
page read and write
15B418D8000
heap
page read and write
944A0FE000
stack
page read and write
944A1FF000
stack
page read and write
15B417A0000
heap
page read and write
1958A6AB000
heap
page read and write
1958A7C5000
heap
page read and write
1958A6DC000
heap
page read and write
15B43380000
heap
page read and write
1958A690000
heap
page read and write
15B41A20000
heap
page read and write
15B41A90000
heap
page read and write
15B418E1000
heap
page read and write
15B418E4000
heap
page read and write
There are 58 hidden memdumps, click here to show them.