Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\1728837010f8dbc27ab56e33ce777df8975cafb75f4fb4ee8083e6485fe669922eb6a54392628.dat-decoded.dll"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\1728837010f8dbc27ab56e33ce777df8975cafb75f4fb4ee8083e6485fe669922eb6a54392628.dat-decoded.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\1728837010f8dbc27ab56e33ce777df8975cafb75f4fb4ee8083e6485fe669922eb6a54392628.dat-decoded.dll",#1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s-part-0023.t-0009.t-msedge.net
|
13.107.246.51
|
||
time.windows.com
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6050000
|
heap
|
page read and write
|
||
2ED8000
|
heap
|
page read and write
|
||
4CCF000
|
stack
|
page read and write
|
||
5BD000
|
stack
|
page read and write
|
||
2E5A000
|
heap
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
2ED8000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
9BF000
|
heap
|
page read and write
|
||
2EBA000
|
heap
|
page read and write
|
||
2C7C000
|
stack
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
2ED5000
|
heap
|
page read and write
|
||
4C8E000
|
stack
|
page read and write
|
||
2ED8000
|
heap
|
page read and write
|
||
2E1E000
|
stack
|
page read and write
|
||
6090000
|
heap
|
page read and write
|
||
2EE6000
|
heap
|
page read and write
|
||
2EDF000
|
heap
|
page read and write
|
||
39D000
|
stack
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
BAF000
|
stack
|
page read and write
|
||
2ED8000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
45E000
|
stack
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
2EDF000
|
heap
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
2E9F000
|
stack
|
page read and write
|
||
6094000
|
heap
|
page read and write
|
||
2ED9000
|
heap
|
page read and write
|
||
64B0000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
2ED9000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
6040000
|
heap
|
page read and write
|
||
2E57000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
2C39000
|
stack
|
page read and write
|
||
2ED4000
|
heap
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
9BB000
|
heap
|
page read and write
|
There are 37 hidden memdumps, click here to show them.