IOC Report
YmAxTGvrQk.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll"
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\YmAxTGvrQk.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\YmAxTGvrQk.dll,DllRegisterServer
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll",#1

Memdumps

Base Address
Regiontype
Protect
Malicious
1A3CA651000
direct allocation
page execute and read and write
malicious
7FFE13246000
unkown
page read and write
malicious
7FFE13246000
unkown
page read and write
malicious
26C1000
direct allocation
page execute and read and write
malicious
21509031000
direct allocation
page execute and read and write
malicious
7FFE13246000
unkown
page read and write
malicious
7FFE13246000
unkown
page read and write
malicious
1F3AEBA1000
direct allocation
page execute and read and write
malicious
1A3CA6D9000
heap
page read and write
1A3CA4C0000
heap
page read and write
1A3CA6C8000
heap
page read and write
1A3CA6ED000
heap
page read and write
7FFE13240000
unkown
page readonly
21507603000
heap
page read and write
D51000
heap
page read and write
1A3CA6D5000
heap
page read and write
7FFE13245000
unkown
page readonly
7FFE13245000
unkown
page readonly
96B000
stack
page read and write
1F3AEC28000
heap
page read and write
D46000
heap
page read and write
FAC000
heap
page read and write
1F3AEC3D000
heap
page read and write
9B0000
heap
page read and write
7FFE13265000
unkown
page readonly
2CEF000
stack
page read and write
9C0000
heap
page read and write
1F3AEBE0000
heap
page read and write
D75000
heap
page read and write
1F3AEC59000
heap
page read and write
D27000
heap
page read and write
1F3B0770000
heap
page read and write
D6F000
heap
page read and write
D53000
heap
page read and write
215076F0000
heap
page read and write
2150762F000
heap
page read and write
1F3AEC4A000
heap
page read and write
B2AF4FF000
stack
page read and write
215075F0000
heap
page read and write
7FFE13241000
unkown
page execute read
1F3B077B000
heap
page read and write
5C50000
heap
page read and write
1F3B1EE0000
trusted library allocation
page read and write
D4D000
heap
page read and write
D75000
heap
page read and write
B2AF3FF000
stack
page read and write
7FFE13245000
unkown
page readonly
D51000
heap
page read and write
CACAF7B000
stack
page read and write
1F3AEC38000
heap
page read and write
215075F8000
heap
page read and write
1F3B06D0000
heap
page read and write
CACABFC000
stack
page read and write
21507627000
heap
page read and write
21507710000
heap
page read and write
26BE000
stack
page read and write
1F3B0775000
heap
page read and write
1F3AEC55000
heap
page read and write
1A3CA905000
heap
page read and write
7FFE13240000
unkown
page readonly
D57000
heap
page read and write
1A3CA6D9000
heap
page read and write
7FFE13241000
unkown
page execute read
2150762D000
heap
page read and write
21509094000
heap
page read and write
263E000
stack
page read and write
CACAE7E000
stack
page read and write
D55000
heap
page read and write
27C0000
heap
page read and write
21507750000
heap
page read and write
7FFE13241000
unkown
page execute read
21507615000
heap
page read and write
B2AF2FC000
stack
page read and write
21507627000
heap
page read and write
1F3AEC10000
heap
page read and write
1A3CA890000
heap
page read and write
1F3AEC41000
heap
page read and write
1A3CA6DA000
heap
page read and write
2150763D000
heap
page read and write
1F3B26E0000
heap
page read and write
7FFE13241000
unkown
page execute read
1A3CA5A0000
heap
page read and write
21507755000
heap
page read and write
D46000
heap
page read and write
D19000
heap
page read and write
FA5000
heap
page read and write
B2AF6FE000
stack
page read and write
21507500000
heap
page read and write
1A3CA6D0000
heap
page read and write
D53000
heap
page read and write
1A3CA5C0000
heap
page read and write
2833000
heap
page read and write
D54000
heap
page read and write
1F3AEB70000
heap
page read and write
7FFE13265000
unkown
page readonly
1A3CC230000
heap
page read and write
1A3CA6CC000
heap
page read and write
44A0D6F000
stack
page read and write
1F3AEC1D000
heap
page read and write
1F3AEC4A000
heap
page read and write
7FFE13245000
unkown
page readonly
1F3AEC6E000
heap
page read and write
1F3AEC52000
heap
page read and write
FA0000
heap
page read and write
7FFE13240000
unkown
page readonly
D6D000
heap
page read and write
1A3CA6D6000
heap
page read and write
2150761E000
heap
page read and write
44A0DEE000
stack
page read and write
2150764B000
heap
page read and write
1A3CA6A8000
heap
page read and write
21507643000
heap
page read and write
CACAEFE000
stack
page read and write
2830000
heap
page read and write
44A0CEC000
stack
page read and write
5450000
trusted library allocation
page read and write
1A3CA6D5000
heap
page read and write
1A3CA6A0000
heap
page read and write
1A3CA6D5000
heap
page read and write
1A3CA6D2000
heap
page read and write
2150762D000
heap
page read and write
1F3AEC67000
heap
page read and write
21509090000
heap
page read and write
D58000
heap
page read and write
1A3CC234000
heap
page read and write
2150761E000
heap
page read and write
1F3AEC41000
heap
page read and write
7FFE13240000
unkown
page readonly
1F3B06D3000
heap
page read and write
1F3AEB60000
heap
page read and write
1F3AEC4A000
heap
page read and write
D10000
heap
page read and write
D1B000
heap
page read and write
CD0000
heap
page read and write
21509060000
heap
page read and write
1F3B0690000
heap
page read and write
44A107B000
stack
page read and write
7FFE13265000
unkown
page readonly
1A3CA900000
heap
page read and write
7FFE13265000
unkown
page readonly
There are 130 hidden memdumps, click here to show them.