IOC Report
4eb9650.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\4eb9650.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\4eb9650.dll",#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\4eb9650.dll",#1

Memdumps

Base Address
Regiontype
Protect
Malicious
30C0000
heap
page read and write
30CC000
heap
page read and write
C4C000
stack
page read and write
30CD000
heap
page read and write
4B3E000
stack
page read and write
30D0000
heap
page read and write
30CC000
heap
page read and write
2DE0000
heap
page read and write
6320000
heap
page read and write
CD0000
heap
page read and write
30ED000
heap
page read and write
CC0000
heap
page read and write
30C9000
heap
page read and write
61F0000
heap
page read and write
2DEA000
heap
page read and write
497E000
stack
page read and write
304E000
stack
page read and write
30A0000
heap
page read and write
2DE7000
heap
page read and write
8FD000
stack
page read and write
30C0000
heap
page read and write
4B7F000
stack
page read and write
C90000
heap
page read and write
DD0000
heap
page read and write
30C4000
heap
page read and write
9E0000
heap
page read and write
B30000
heap
page read and write
4ABE000
stack
page read and write
61F4000
heap
page read and write
30E5000
heap
page read and write
920000
heap
page read and write
B3B000
heap
page read and write
6730000
trusted library allocation
page read and write
30E3000
heap
page read and write
30CE000
heap
page read and write
4AFF000
stack
page read and write
C09000
stack
page read and write
49BE000
stack
page read and write
30AA000
heap
page read and write
B3F000
heap
page read and write
6310000
heap
page read and write
308E000
stack
page read and write
30C5000
heap
page read and write
5BC000
stack
page read and write
930000
heap
page read and write
There are 35 hidden memdumps, click here to show them.