IOCReport

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe 'C:\Users\user\Desktop\gg_1.gif.dll'
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\gg_1.gif.dll,DllServer
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe 'C:\Users\user\Desktop\gg_1.gif.dll',#1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\gg_1.gif.dll',#1
clean

Memdumps

Base Address
Regiontype
Protect
Malicious
4BA0000
unkown
page read and write
malicious
4B40000
unkown
page read and write
malicious
EC0000
unkown
page read and write
malicious
5170000
unkown
page read and write
clean
51CAAFE000
unkown
page read and write
clean
5000000
unkown
page read and write
clean
4CB0000
unkown
page readonly
clean
5170000
unkown
page read and write
clean
7FF521EAD000
unkown
page readonly
clean
C20000
unkown
page read and write
clean
247767D0000
unkown
page read and write
clean
C20000
unkown
page read and write
clean
24777120000
unkown
page readonly
clean
1AD91940000
unkown
page readonly
clean
2122B776000
unkown
page read and write
clean
7FF526FAF000
unkown
page readonly
clean
127A179000
unkown
page read and write
clean
7FF5BC1D3000
unkown
page readonly
clean
5000000
unkown
page read and write
clean
2122B755000
unkown
page read and write
clean
7FF5AEA06000
unkown
page readonly
clean
2D82000
unkown
page readonly
clean
C20000
unkown
page read and write
clean
5000000
unkown
page read and write
clean
2122B77C000
unkown
page read and write
clean
2477B5E0000
unkown
page read and write
clean
C20000
unkown
page read and write
clean
1AD91A00000
unkown
page read and write
clean
7FF5AC965000
unkown
page readonly
clean
C20000
unkown
page read and write
clean
7FF568DA7000
unkown
page readonly
clean
5170000
unkown
page read and write
clean
7FF526D92000
unkown
page readonly
clean
C20000
unkown
page read and write
clean
5000000
unkown
page read and write
clean
C20000
unkown
page read and write
clean
23E93482000
unkown
page read and write
clean
86124FF000
unkown
page read and write
clean
C20000
unkown
page read and write
clean
C20000
unkown
page read and write
clean
7FF52C19E000
unkown
page readonly
clean
C20000
unkown
page read and write
clean
23E94310000
unkown
page read and write
clean
23E931FE000
unkown
page read and write
clean
C20000
unkown
page read and write
clean
1CB1166C000
unkown
page read and write
clean
7FF52C3B7000
unkown
page readonly
clean
1716C950000
heap private
page read and write
clean
C20000
unkown
page read and write
clean
1CB1166C000
unkown
page read and write
clean
ED9157F000
unkown
page read and write
clean
2122AEF3000
unkown
page read and write
clean
23E931F9000
unkown
page read and write
clean
2122B745000
unkown
page read and write
clean
7FF4FC047000
unkown
page readonly
clean
2122B7A5000
unkown
page read and write
clean
5170000
unkown
page read and write
clean
14687C6F000
unkown
page read and write
clean
5000000
unkown
page read and write
clean
2477B6EC000
unkown
page readonly
clean
ED910FB000
unkown
page read and write
clean
16B3A708000
unkown
page read and write
clean
21C48D14000
unkown
page read and write
clean
1CB11668000
unkown
page read and write
clean
5000000
unkown
page read and write
clean
7FF5AC65C000
unkown
page readonly
clean
7FF59525F000
unkown
page readonly
clean
2477B88A000
unkown
page read and write
clean
C20000
unkown
page read and write
clean
ED9127A000
unkown
page read and write
clean
347F000
unkown
page execute and read and write
clean
169E6600000
unkown
page readonly
clean
12