IOC Report

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\202c6770000.dll"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\202c6770000.dll,#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\202c6770000.dll",#1
malicious
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\202c6770000.dll",#1
clean

Memdumps

Base Address
Regiontype
Protect
Malicious
17F5E780000
unkown
page read and write
clean
1C288FD0000
unkown
page read and write
clean
7DF46B720000
unkown image
page readonly
clean
7FF55870C000
unkown image
page readonly
clean
1C289285000
heap private
page read and write
clean
1D800E27000
unkown
page read and write
clean
1D800E64000
unkown
page read and write
clean
25E3EC90000
unkown
page read and write
clean
7FF55874E000
unkown image
page readonly
clean
17F5E770000
unkown image
page readonly
clean
EC3E7B000
unkown
page read and write
clean
7FF55867C000
unkown image
page readonly
clean
7FF5566E6000
unkown image
page readonly
clean
1D800E7D000
unkown
page read and write
clean
7FF55864C000
unkown image
page readonly
clean
1C289076000
unkown
page read and write
clean
7FF5566E9000
unkown image
page readonly
clean
7FF5BD760000
unkown image
page readonly
clean
180000000
unkown image
page readonly
clean
7FF55873E000
unkown image
page readonly
clean
EC3EFE000
stack
page read and write
clean
17F5E620000
heap default
page read and write
clean
1C289050000
unkown
page read and write
clean
7FF5C7743000
unkown image
page readonly
clean
7FF5BD770000
unkown image
page readonly
clean
7FF5C78E2000
unkown image
page readonly
clean
7FF5586E2000
unkown image
page readonly
clean
7DF5DC972000
unkown image
page readonly
clean
7FF55660C000
unkown image
page readonly
clean
7DFB69014000
unkown image
page readonly
clean
7FF5C7858000
unkown image
page readonly
clean
7FF5C781F000
unkown image
page readonly
clean
7FF5586EB000
unkown image
page readonly
clean
17F5E500000
unkown image
page readonly
clean
1D800DC0000
unkown image
page readonly
clean
7FF556633000
unkown image
page readonly
clean
17F5E65E000
unkown
page read and write
clean
17F5E520000
unkown image
page readonly
clean
CDF8CFE000
stack
page read and write
clean
1C28AB70000
unkown
page read and write
clean
7FF55667B000
unkown image
page readonly
clean
1C28C3F3000
heap private
page read and write
clean
7FF556675000
unkown image
page readonly
clean
7FF5C75A1000
unkown image
page readonly
clean
17F61940000
unkown
page read and write
clean
1C28C400000
unkown
page read and write
clean
7FF5C785E000
unkown image
page readonly
clean
7FF556670000
unkown image
page readonly
clean
1C28904B000
unkown
page read and write
clean
1D800E3C000
unkown
page read and write
clean
7DF5DC962000
unkown image
page readonly
clean
7FF5C7641000
unkown image
page readonly
clean
7FF5587D2000
unkown image
page readonly
clean
7DF5DC970000
unkown image
page readonly
clean
7FF5BD772000
unkown image
page readonly
clean
17F5E7D0000
unkown
page read and write
clean
7FF55675A000
unkown image
page readonly
clean
1C288F80000
unkown image
page readonly
clean
1D800F08000
unkown
page read and write
clean
7FF5566BA000
unkown image
page readonly
clean
7FF5C77EE000
unkown image
page readonly
clean
1C289054000
unkown
page read and write
clean
7FF5BD772000
unkown image
page readonly
clean
7E7D47F000
stack
page read and write
clean
7FF5C7844000
unkown image
page readonly
clean
1D800D60000
unkown image
page readonly
clean
7E7D17F000
stack
page read and write
clean
7FF55669C000
unkown image
page readonly
clean
1C288F60000
unkown image
page read and write
clean
1C28906F000
unkown
page read and write
clean
7FF558718000
unkown image
page readonly
clean
7FF5C78DA000
unkown image
page readonly
clean
1D800DB0000
heap default
page read and write
clean