IOC Report
yjF33u9fqZ.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\yjF33u9fqZ.dll"
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\yjF33u9fqZ.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\yjF33u9fqZ.dll,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\yjF33u9fqZ.dll",#1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\yjF33u9fqZ.dll",#1

Memdumps

Base Address
Regiontype
Protect
Malicious
186B59A1000
direct allocation
page execute and read and write
malicious
2AB0BF31000
direct allocation
page execute and read and write
malicious
7FFBC31D7000
unkown
page read and write
malicious
2711000
direct allocation
page execute and read and write
malicious
7FFBC31D7000
unkown
page read and write
malicious
7FFBC31D7000
unkown
page read and write
malicious
23BEAF21000
direct allocation
page execute and read and write
malicious
7FFBC31D7000
unkown
page read and write
malicious
27DF000
stack
page read and write
2AB0A400000
heap
page read and write
D31E2FF000
stack
page read and write
2AB0A4D5000
heap
page read and write
82296FE000
stack
page read and write
EA6000
heap
page read and write
7FFBC31D1000
unkown
page execute read
7FFBC31F6000
unkown
page readonly
23BEC990000
heap
page read and write
186B5889000
heap
page read and write
186B5710000
heap
page read and write
2AB0A3E0000
heap
page read and write
B99A28C000
stack
page read and write
186B5850000
heap
page read and write
D31E3FB000
stack
page read and write
2AB0A4CC000
heap
page read and write
2AB0A4A8000
heap
page read and write
23BEB027000
heap
page read and write
E79000
heap
page read and write
EB3000
heap
page read and write
23BEB047000
heap
page read and write
E70000
heap
page read and write
186B5878000
heap
page read and write
186B5886000
heap
page read and write
7FFBC31D6000
unkown
page readonly
186B5858000
heap
page read and write
E60000
heap
page read and write
2AB0A4A0000
heap
page read and write
186B5889000
heap
page read and write
186B5885000
heap
page read and write
7FFBC31D0000
unkown
page readonly
E87000
heap
page read and write
2AB0A4D5000
heap
page read and write
23BEB009000
heap
page read and write
7FFBC31D6000
unkown
page readonly
E4E000
stack
page read and write
2AB0A785000
heap
page read and write
186B5810000
heap
page read and write
23BEB022000
heap
page read and write
23BEB02B000
heap
page read and write
23BEAE10000
heap
page read and write
ED5000
heap
page read and write
D31E4FF000
stack
page read and write
822967C000
stack
page read and write
23BEAFF9000
heap
page read and write
186B5A30000
heap
page read and write
2AB0A490000
heap
page read and write
B99A67B000
stack
page read and write
7FFBC31D0000
unkown
page readonly
23BEC9D0000
heap
page read and write
7FFBC31F6000
unkown
page readonly
7FFBC31D0000
unkown
page readonly
D60000
heap
page read and write
2AB0A4D6000
heap
page read and write
7FFBC31D6000
unkown
page readonly
23BEAF60000
heap
page read and write
EA6000
heap
page read and write
186B5885000
heap
page read and write
23BEB033000
heap
page read and write
EC1000
heap
page read and write
EB1000
heap
page read and write
7FFBC31D1000
unkown
page execute read
B99A38F000
stack
page read and write
186B59E0000
heap
page read and write
2AB0A3D0000
heap
page read and write
7FFBC31D1000
unkown
page execute read
2AB0A4EC000
heap
page read and write
2750000
heap
page read and write
ED5000
heap
page read and write
23BEB04F000
heap
page read and write
23BEB019000
heap
page read and write
7FFBC31D1000
unkown
page execute read
822977E000
stack
page read and write
D90000
heap
page read and write
2AB0A780000
heap
page read and write
7FFBC31F6000
unkown
page readonly
C7B000
stack
page read and write
23BEAFF0000
heap
page read and write
186B588A000
heap
page read and write
82297FB000
stack
page read and write
285B000
stack
page read and write
2AB0A494000
heap
page read and write
7FFBC31D0000
unkown
page readonly
186B587C000
heap
page read and write
186B57F0000
heap
page read and write
C80000
heap
page read and write
ECD000
heap
page read and write
EAD000
heap
page read and write
186B5A85000
heap
page read and write
2AB0A4C3000
heap
page read and write
E7B000
heap
page read and write
23BEAFB0000
heap
page read and write
23BEC993000
heap
page read and write
2AB0A4D5000
heap
page read and write
186B5A34000
heap
page read and write
E65000
heap
page read and write
186B5885000
heap
page read and write
186B587C000
heap
page read and write
EB7000
heap
page read and write
23BEB046000
heap
page read and write
B99A30F000
stack
page read and write
D31E1FD000
stack
page read and write
23BEC9D5000
heap
page read and write
2753000
heap
page read and write
7FFBC31D6000
unkown
page readonly
186B5A80000
heap
page read and write
2AB0A760000
heap
page read and write
EB1000
heap
page read and write
7FFBC31F6000
unkown
page readonly
23BEAFFD000
heap
page read and write
2AB0A4D2000
heap
page read and write
2AB0A4CC000
heap
page read and write
23BEB031000
heap
page read and write
186B589C000
heap
page read and write
D31E0FC000
stack
page read and write
EB8000
heap
page read and write
186B5882000
heap
page read and write
23BEB022000
heap
page read and write
2CC0000
heap
page read and write
EB3000
heap
page read and write
23BEAEF0000
heap
page read and write
There are 119 hidden memdumps, click here to show them.