IOC Report
dllhost.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\dllhost.exe
"C:\Users\user\Desktop\dllhost.exe"
malicious

URLs

Name
IP
Malicious
http://online.drweb.com/result/
unknown
http://www.indyproject.org/
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
FD1000
unkown
page execute read
malicious
33A1000
heap
page read and write
354D000
direct allocation
page read and write
1BA8000
unkown
page execute read
33A1000
heap
page read and write
3501000
direct allocation
page read and write
924000
heap
page read and write
359F000
direct allocation
page read and write
924000
heap
page read and write
33A2000
heap
page read and write
33A5000
heap
page read and write
14B8000
unkown
page read and write
1449000
unkown
page read and write
3574000
direct allocation
page read and write
3529000
direct allocation
page read and write
3598000
direct allocation
page read and write
3A00000
heap
page read and write
924000
heap
page read and write
924000
heap
page read and write
924000
heap
page read and write
BFD000
stack
page read and write
35A6000
direct allocation
page read and write
940000
trusted library allocation
page read and write
924000
heap
page read and write
3589000
direct allocation
page read and write
33A1000
heap
page read and write
355D000
direct allocation
page read and write
3564000
direct allocation
page read and write
35AD000
direct allocation
page read and write
145B000
unkown
page read and write
924000
heap
page read and write
3509000
direct allocation
page read and write
34F8000
direct allocation
page read and write
1493000
unkown
page execute read
3510000
direct allocation
page read and write
35BC000
direct allocation
page read and write
924000
heap
page read and write
3537000
direct allocation
page read and write
63B000
stack
page read and write
924000
heap
page read and write
35CA000
direct allocation
page read and write
FD0000
unkown
page readonly
35C3000
direct allocation
page read and write
A08000
heap
page read and write
3520000
direct allocation
page read and write
924000
heap
page read and write
33A1000
heap
page read and write
3590000
direct allocation
page read and write
790000
heap
page read and write
3582000
direct allocation
page read and write
35D1000
direct allocation
page read and write
924000
heap
page read and write
1492000
unkown
page readonly
924000
heap
page read and write
1490000
unkown
page readonly
DD0000
heap
page read and write
924000
heap
page read and write
924000
heap
page read and write
1CA9000
unkown
page readonly
16C6000
unkown
page execute read
33A1000
heap
page read and write
920000
heap
page read and write
9D0000
heap
page read and write
3A03000
heap
page read and write
924000
heap
page read and write
33B0000
heap
page read and write
35B4000
direct allocation
page read and write
924000
heap
page read and write
924000
heap
page read and write
33A1000
heap
page read and write
148B000
unkown
page read and write
924000
heap
page read and write
1474000
unkown
page read and write
1CB7000
unkown
page readonly
980000
direct allocation
page execute and read and write
33A1000
heap
page read and write
33A0000
heap
page read and write
8EE000
stack
page read and write
14BE000
unkown
page execute read
924000
heap
page read and write
970000
heap
page read and write
357B000
direct allocation
page read and write
3530000
direct allocation
page read and write
356B000
direct allocation
page read and write
8F0000
heap
page read and write
9C0000
heap
page read and write
8AE000
stack
page read and write
A00000
heap
page read and write
CFE000
stack
page read and write
924000
heap
page read and write
33A1000
heap
page read and write
35D8000
direct allocation
page read and write
33A1000
heap
page read and write
73B000
stack
page read and write
There are 84 hidden memdumps, click here to show them.