Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\pmfoxWgt1q.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\pmfoxWgt1q.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\pmfoxWgt1q.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\pmfoxWgt1q.dll,DllRegisterServer
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\pmfoxWgt1q.dll,YAeJyEAYL7F4eDck6YUaf
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\pmfoxWgt1q.dll,fmFkmnQYB5TC2Sq5NGFkK
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pmfoxWgt1q.dll",#1
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FFC739F1000
|
unkown
|
page execute read
|
||
7FFC739F1000
|
unkown
|
page execute read
|
||
7FFC739F1000
|
unkown
|
page execute read
|
||
7FFC739F1000
|
unkown
|
page execute read
|
||
7FFC739F1000
|
unkown
|
page execute read
|
||
7FFC739F1000
|
unkown
|
page execute read
|
||
245F1DF0000
|
trusted library allocation
|
page read and write
|
||
255AECFE000
|
heap
|
page read and write
|
||
2F219FF000
|
stack
|
page read and write
|
||
255B4200000
|
heap
|
page read and write
|
||
9FA9BFC000
|
stack
|
page read and write
|
||
1ADFB340000
|
heap
|
page read and write
|
||
255B42FA000
|
heap
|
page read and write
|
||
2332FF75000
|
heap
|
page read and write
|
||
225CCA05000
|
heap
|
page read and write
|
||
255B44F0000
|
trusted library allocation
|
page read and write
|
||
22C58E02000
|
heap
|
page read and write
|
||
200F4E4D000
|
heap
|
page read and write
|
||
2332FBC0000
|
heap
|
page read and write
|
||
7FFC73A93000
|
unkown
|
page read and write
|
||
245F1ED0000
|
heap
|
page read and write
|
||
200F4E40000
|
heap
|
page read and write
|
||
1642F659000
|
heap
|
page read and write
|
||
225CC620000
|
heap
|
page read and write
|
||
1ADFB51D000
|
heap
|
page read and write
|
||
22C58C20000
|
heap
|
page read and write
|
||
255B4240000
|
heap
|
page read and write
|
||
255AED02000
|
heap
|
page read and write
|
||
2F214FE000
|
stack
|
page read and write
|
||
1997BCB0000
|
heap
|
page read and write
|
||
255AF518000
|
heap
|
page read and write
|
||
20E0000
|
heap
|
page read and write
|
||
1642F613000
|
heap
|
page read and write
|
||
9FAA57C000
|
stack
|
page read and write
|
||
255B41F0000
|
trusted library allocation
|
page read and write
|
||
255B42E5000
|
heap
|
page read and write
|
||
17559B13000
|
heap
|
page read and write
|
||
245F1EC1000
|
heap
|
page read and write
|
||
25A4F050000
|
heap
|
page read and write
|
||
245F1E3E000
|
heap
|
page read and write
|
||
200F4E3D000
|
heap
|
page read and write
|
||
700000
|
direct allocation
|
page execute and read and write
|
||
1997BCD0000
|
heap
|
page read and write
|
||
1997BD16000
|
heap
|
page read and write
|
||
785000
|
heap
|
page read and write
|
||
255B4520000
|
trusted library allocation
|
page read and write
|
||
17559A13000
|
heap
|
page read and write
|
||
255B41F0000
|
trusted library allocation
|
page read and write
|
||
7FFC739F0000
|
unkown
|
page readonly
|
||
1CADF5F0000
|
heap
|
page read and write
|
||
17559A02000
|
heap
|
page read and write
|
||
255AED14000
|
heap
|
page read and write
|
||
255B42A8000
|
heap
|
page read and write
|
||
6E876EC000
|
stack
|
page read and write
|
||
200F4E63000
|
heap
|
page read and write
|
||
1997BD1E000
|
heap
|
page read and write
|
||
255AEC8D000
|
heap
|
page read and write
|
||
200F4E3E000
|
heap
|
page read and write
|
||
17559A79000
|
heap
|
page read and write
|
||
1997C880000
|
trusted library allocation
|
page read and write
|
||
22C58E13000
|
heap
|
page read and write
|
||
A6C573B000
|
stack
|
page read and write
|
||
1642F5A0000
|
remote allocation
|
page read and write
|
||
1997BD42000
|
heap
|
page read and write
|
||
1CADF602000
|
heap
|
page read and write
|
||
255AF513000
|
heap
|
page read and write
|
||
200F4E79000
|
heap
|
page read and write
|
||
225CC780000
|
heap
|
page read and write
|
||
1997C886000
|
trusted library allocation
|
page read and write
|
||
2332FC17000
|
heap
|
page read and write
|
||
7FFC73A93000
|
unkown
|
page read and write
|
||
AF36CFE000
|
stack
|
page read and write
|
||
17559B00000
|
heap
|
page read and write
|
||
255B4424000
|
trusted library allocation
|
page read and write
|
||
1997BEC9000
|
heap
|
page read and write
|
||
EC4BBFE000
|
stack
|
page read and write
|
||
7FFC739F0000
|
unkown
|
page readonly
|
||
255B4500000
|
trusted library allocation
|
page read and write
|
||
1CADF713000
|
heap
|
page read and write
|
||
200F4CC0000
|
heap
|
page read and write
|
||
1642F63E000
|
heap
|
page read and write
|
||
7FFC73A96000
|
unkown
|
page readonly
|
||
255B4540000
|
remote allocation
|
page read and write
|
||
255B4265000
|
heap
|
page read and write
|
||
255AEC94000
|
heap
|
page read and write
|
||
408FD7E000
|
stack
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
245F1F13000
|
heap
|
page read and write
|
||
E4F32FA000
|
stack
|
page read and write
|
||
22C58E3D000
|
heap
|
page read and write
|
||
1642F5A0000
|
remote allocation
|
page read and write
|
||
200F4E69000
|
heap
|
page read and write
|
||
EC4BAFE000
|
stack
|
page read and write
|
||
9FAA47B000
|
stack
|
page read and write
|
||
255E92C0000
|
heap
|
page read and write
|
||
255B4420000
|
trusted library allocation
|
page read and write
|
||
2F20F4C000
|
stack
|
page read and write
|
||
255B41E0000
|
trusted library allocation
|
page read and write
|
||
408F87B000
|
stack
|
page read and write
|
||
255B42AA000
|
heap
|
page read and write
|
||
1997BD1E000
|
heap
|
page read and write
|
||
6E4727E000
|
stack
|
page read and write
|
||
E4F2E7C000
|
stack
|
page read and write
|
||
255AEC58000
|
heap
|
page read and write
|
||
200F4E7D000
|
heap
|
page read and write
|
||
2F218FE000
|
stack
|
page read and write
|
||
200F4E48000
|
heap
|
page read and write
|
||
6E4737B000
|
stack
|
page read and write
|
||
200F4E4B000
|
heap
|
page read and write
|
||
200F4E51000
|
heap
|
page read and write
|
||
7FFC739F0000
|
unkown
|
page readonly
|
||
1CADF600000
|
heap
|
page read and write
|
||
1CADF643000
|
heap
|
page read and write
|
||
200F4E29000
|
heap
|
page read and write
|
||
7FFC73A81000
|
unkown
|
page readonly
|
||
245F1DC0000
|
heap
|
page read and write
|
||
25A4F200000
|
heap
|
page read and write
|
||
255AED07000
|
heap
|
page read and write
|
||
1997CB40000
|
trusted library allocation
|
page read and write
|
||
AF369FB000
|
stack
|
page read and write
|
||
2F21AFF000
|
stack
|
page read and write
|
||
25A4EE10000
|
heap
|
page read and write
|
||
1997BD42000
|
heap
|
page read and write
|
||
9FAA27E000
|
stack
|
page read and write
|
||
44FE47D000
|
stack
|
page read and write
|
||
255AEC7C000
|
heap
|
page read and write
|
||
255B5000000
|
heap
|
page read and write
|
||
17559970000
|
heap
|
page read and write
|
||
255E9019000
|
heap
|
page read and write
|
||
17559910000
|
heap
|
page read and write
|
||
255B44C0000
|
trusted library allocation
|
page read and write
|
||
245F2602000
|
heap
|
page read and write
|
||
200F4E6F000
|
heap
|
page read and write
|
||
225CC760000
|
heap
|
page read and write
|
||
255B4302000
|
heap
|
page read and write
|
||
1755A202000
|
trusted library allocation
|
page read and write
|
||
1CADF629000
|
heap
|
page read and write
|
||
1997BEB0000
|
trusted library allocation
|
page read and write
|
||
200F4E33000
|
heap
|
page read and write
|
||
25A4EF6E000
|
heap
|
page read and write
|
||
255E8F80000
|
direct allocation
|
page execute and read and write
|
||
255AF500000
|
heap
|
page read and write
|
||
245F1EE2000
|
heap
|
page read and write
|
||
EC4BDFE000
|
stack
|
page read and write
|
||
255B41E0000
|
trusted library allocation
|
page read and write
|
||
22C58C10000
|
heap
|
page read and write
|
||
1CADF590000
|
heap
|
page read and write
|
||
22C58F02000
|
heap
|
page read and write
|
||
2F21CFE000
|
stack
|
page read and write
|
||
225CC7D0000
|
direct allocation
|
page execute and read and write
|
||
255AEC7A000
|
heap
|
page read and write
|
||
1ADFB510000
|
heap
|
page read and write
|
||
EC4B87B000
|
stack
|
page read and write
|
||
1642F4D0000
|
heap
|
page read and write
|
||
9FAA77D000
|
stack
|
page read and write
|
||
6E47179000
|
stack
|
page read and write
|
||
AF3707F000
|
stack
|
page read and write
|
||
255B40C0000
|
trusted library allocation
|
page read and write
|
||
22C59602000
|
trusted library allocation
|
page read and write
|
||
255B4510000
|
trusted library allocation
|
page read and write
|
||
245F1D50000
|
heap
|
page read and write
|
||
255B44B0000
|
trusted library allocation
|
page read and write
|
||
1ADFB480000
|
heap
|
page read and write
|
||
AF36EFF000
|
stack
|
page read and write
|
||
7FFC73A81000
|
unkown
|
page readonly
|
||
200F4E80000
|
heap
|
page read and write
|
||
E4F35FB000
|
stack
|
page read and write
|
||
225CCA00000
|
heap
|
page read and write
|
||
1997BEC0000
|
heap
|
page read and write
|
||
22C58E50000
|
heap
|
page read and write
|
||
255B4408000
|
trusted library allocation
|
page read and write
|
||
255B4540000
|
remote allocation
|
page read and write
|
||
200F5480000
|
trusted library allocation
|
page read and write
|
||
17559A6B000
|
heap
|
page read and write
|
||
1642F600000
|
heap
|
page read and write
|
||
1642F602000
|
heap
|
page read and write
|
||
1997CAD0000
|
heap
|
page readonly
|
||
1997BB70000
|
heap
|
page read and write
|
||
1CADF63D000
|
heap
|
page read and write
|
||
44FE0FC000
|
stack
|
page read and write
|
||
255AED02000
|
heap
|
page read and write
|
||
1CADFD50000
|
trusted library allocation
|
page read and write
|
||
1642F65F000
|
heap
|
page read and write
|
||
255AEB20000
|
heap
|
page read and write
|
||
200F4E13000
|
heap
|
page read and write
|
||
7FFC73A93000
|
unkown
|
page read and write
|
||
255E8F30000
|
heap
|
page read and write
|
||
7FFC739F0000
|
unkown
|
page readonly
|
||
1997BD1D000
|
heap
|
page read and write
|
||
200F4E6C000
|
heap
|
page read and write
|
||
25A4F205000
|
heap
|
page read and write
|
||
245F1E88000
|
heap
|
page read and write
|
||
225CC848000
|
heap
|
page read and write
|
||
255AEC9F000
|
heap
|
page read and write
|
||
EC4B8FE000
|
stack
|
page read and write
|
||
17559900000
|
heap
|
page read and write
|
||
1997BE50000
|
trusted library allocation
|
page read and write
|
||
200F4E86000
|
heap
|
page read and write
|
||
255AF400000
|
heap
|
page read and write
|
||
200F4E42000
|
heap
|
page read and write
|
||
255B4306000
|
heap
|
page read and write
|
||
255AECFE000
|
heap
|
page read and write
|
||
255B4424000
|
trusted library allocation
|
page read and write
|
||
7FFC739F0000
|
unkown
|
page readonly
|
||
17559A28000
|
heap
|
page read and write
|
||
17559B02000
|
heap
|
page read and write
|
||
44FE37E000
|
stack
|
page read and write
|
||
1642F540000
|
heap
|
page read and write
|
||
245F1E13000
|
heap
|
page read and write
|
||
255AEBB0000
|
trusted library allocation
|
page read and write
|
||
255AF502000
|
heap
|
page read and write
|
||
17559A74000
|
heap
|
page read and write
|
||
17559A3C000
|
heap
|
page read and write
|
||
255B4421000
|
trusted library allocation
|
page read and write
|
||
255AEC13000
|
heap
|
page read and write
|
||
6E471F9000
|
stack
|
page read and write
|
||
1CADF65A000
|
heap
|
page read and write
|
||
E4F2EFF000
|
stack
|
page read and write
|
||
255B424D000
|
heap
|
page read and write
|
||
1CADFD70000
|
trusted library allocation
|
page read and write
|
||
2332FE00000
|
unkown
|
page execute and read and write
|
||
255B44B0000
|
trusted library allocation
|
page read and write
|
||
255AF3B1000
|
trusted library allocation
|
page read and write
|
||
44FDBDB000
|
stack
|
page read and write
|
||
255B4630000
|
trusted library allocation
|
page read and write
|
||
245F1ED2000
|
heap
|
page read and write
|
||
200F4E64000
|
heap
|
page read and write
|
||
25A4F070000
|
heap
|
page read and write
|
||
255B40D0000
|
trusted library allocation
|
page read and write
|
||
59341BC000
|
stack
|
page read and write
|
||
255AECAF000
|
heap
|
page read and write
|
||
255B4540000
|
remote allocation
|
page read and write
|
||
1997BDD0000
|
heap
|
page read and write
|
||
408FC7B000
|
stack
|
page read and write
|
||
E4F34FB000
|
stack
|
page read and write
|
||
200F4E6D000
|
heap
|
page read and write
|
||
1997BD1D000
|
heap
|
page read and write
|
||
1CADFE02000
|
trusted library allocation
|
page read and write
|
||
255E9000000
|
heap
|
page read and write
|
||
7FFC73A96000
|
unkown
|
page readonly
|
||
255B4258000
|
heap
|
page read and write
|
||
255AEC23000
|
heap
|
page read and write
|
||
255E8F10000
|
heap
|
page read and write
|
||
255AEC29000
|
heap
|
page read and write
|
||
6E472F9000
|
stack
|
page read and write
|
||
AF36C7B000
|
stack
|
page read and write
|
||
200F4F02000
|
heap
|
page read and write
|
||
255AF402000
|
heap
|
page read and write
|
||
1997BD3D000
|
heap
|
page read and write
|
||
1642F570000
|
trusted library allocation
|
page read and write
|
||
25A4F0C0000
|
direct allocation
|
page execute and read and write
|
||
200F4E44000
|
heap
|
page read and write
|
||
2332FBE0000
|
heap
|
page read and write
|
||
255AEB10000
|
heap
|
page read and write
|
||
7FFC73A93000
|
unkown
|
page read and write
|
||
408FB7B000
|
stack
|
page read and write
|
||
9FAA2FC000
|
stack
|
page read and write
|
||
1997BCE0000
|
heap
|
page read and write
|
||
255AF504000
|
heap
|
page read and write
|
||
255B422F000
|
heap
|
page read and write
|
||
200F5602000
|
trusted library allocation
|
page read and write
|
||
2F217FD000
|
stack
|
page read and write
|
||
22C58C80000
|
heap
|
page read and write
|
||
7FFC73A81000
|
unkown
|
page readonly
|
||
255B440E000
|
trusted library allocation
|
page read and write
|
||
255AEB80000
|
heap
|
page read and write
|
||
1997BED0000
|
trusted library allocation
|
page read and write
|
||
255AEC00000
|
heap
|
page read and write
|
||
200F4E4A000
|
heap
|
page read and write
|
||
1CADF613000
|
heap
|
page read and write
|
||
1ADFB4B0000
|
unkown
|
page execute and read and write
|
||
255B42B1000
|
heap
|
page read and write
|
||
EC4B97E000
|
stack
|
page read and write
|
||
1997CAE0000
|
trusted library allocation
|
page read and write
|
||
255B42E2000
|
heap
|
page read and write
|
||
200F4E50000
|
heap
|
page read and write
|
||
22C58E00000
|
heap
|
page read and write
|
||
200F4E62000
|
heap
|
page read and write
|
||
9FAA3FD000
|
stack
|
page read and write
|
||
255E8DD0000
|
heap
|
page read and write
|
||
1997BE40000
|
trusted library allocation
|
page read and write
|
||
1CADF62F000
|
heap
|
page read and write
|
||
E4F33FE000
|
stack
|
page read and write
|
||
200F4E43000
|
heap
|
page read and write
|
||
200F4D20000
|
heap
|
page read and write
|
||
255AF3D3000
|
trusted library allocation
|
page read and write
|
||
200F4E30000
|
heap
|
page read and write
|
||
1ADFB523000
|
heap
|
page read and write
|
||
9FAA87E000
|
stack
|
page read and write
|
||
EC4BCFE000
|
stack
|
page read and write
|
||
255E92C5000
|
heap
|
page read and write
|
||
7FFC73A81000
|
unkown
|
page readonly
|
||
22C58E6E000
|
heap
|
page read and write
|
||
9B479AC000
|
stack
|
page read and write
|
||
953C07C000
|
stack
|
page read and write
|
||
AF36B7E000
|
stack
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
1642FE02000
|
trusted library allocation
|
page read and write
|
||
17559A00000
|
heap
|
page read and write
|
||
255B44B0000
|
trusted library allocation
|
page read and write
|
||
2332FB50000
|
heap
|
page read and write
|
||
255B42E9000
|
heap
|
page read and write
|
||
7FFC73A93000
|
unkown
|
page read and write
|
||
7FFC73A96000
|
unkown
|
page readonly
|
||
1CADF580000
|
heap
|
page read and write
|
||
255B4400000
|
trusted library allocation
|
page read and write
|
||
255B0060000
|
trusted library allocation
|
page read and write
|
||
7FFC739F0000
|
unkown
|
page readonly
|
||
44FE2FD000
|
stack
|
page read and write
|
||
255AF3E0000
|
trusted library allocation
|
page read and write
|
||
255AEC3F000
|
heap
|
page read and write
|
||
200F4E49000
|
heap
|
page read and write
|
||
2F21BFF000
|
stack
|
page read and write
|
||
1997CAF0000
|
trusted library allocation
|
page read and write
|
||
7FFC73A81000
|
unkown
|
page readonly
|
||
1997BEC5000
|
heap
|
page read and write
|
||
22C58E64000
|
heap
|
page read and write
|
||
2332FC10000
|
heap
|
page read and write
|
||
E4F3BFF000
|
stack
|
page read and write
|
||
22C58D80000
|
trusted library allocation
|
page read and write
|
||
7FFC73A96000
|
unkown
|
page readonly
|
||
200F4E7C000
|
heap
|
page read and write
|
||
7FFC73A96000
|
unkown
|
page readonly
|
||
7FFC73A93000
|
unkown
|
page read and write
|
||
1642F629000
|
heap
|
page read and write
|
||
1CADF652000
|
heap
|
page read and write
|
||
AF36DFA000
|
stack
|
page read and write
|
||
200F4E3C000
|
heap
|
page read and write
|
||
255AEC77000
|
heap
|
page read and write
|
||
6E46DCC000
|
stack
|
page read and write
|
||
1997CAC0000
|
trusted library allocation
|
page read and write
|
||
200F4E00000
|
heap
|
page read and write
|
||
245F2714000
|
heap
|
page read and write
|
||
255B4300000
|
heap
|
page read and write
|
||
22C58E29000
|
heap
|
page read and write
|
||
255B4400000
|
trusted library allocation
|
page read and write
|
||
200F4E31000
|
heap
|
page read and write
|
||
22C58E76000
|
heap
|
page read and write
|
||
255B4308000
|
heap
|
page read and write
|
||
E4F39F9000
|
stack
|
page read and write
|
||
9FAA1FB000
|
stack
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
200F4CB0000
|
heap
|
page read and write
|
||
245F1F02000
|
heap
|
page read and write
|
||
245F1D60000
|
heap
|
page read and write
|
||
22C58F13000
|
heap
|
page read and write
|
||
255AF415000
|
heap
|
page read and write
|
||
225CC840000
|
heap
|
page read and write
|
||
25A4EF5B000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
255B4221000
|
heap
|
page read and write
|
||
255B41F0000
|
trusted library allocation
|
page read and write
|
||
255B4217000
|
heap
|
page read and write
|
||
E4F31FD000
|
stack
|
page read and write
|
||
1642F5A0000
|
remote allocation
|
page read and write
|
||
255AF3F0000
|
trusted library allocation
|
page read and write
|
||
E4F3077000
|
stack
|
page read and write
|
||
175599A0000
|
trusted library allocation
|
page read and write
|
||
255AF518000
|
heap
|
page read and write
|
||
255AFBE0000
|
trusted library allocation
|
page read and write
|
||
25A4EF50000
|
heap
|
page read and write
|
||
2332FC2E000
|
heap
|
page read and write
|
||
44FE07C000
|
stack
|
page read and write
|
||
245F2700000
|
heap
|
page read and write
|
||
2332FF70000
|
heap
|
page read and write
|
||
2F2137B000
|
stack
|
page read and write
|
||
200F4E46000
|
heap
|
page read and write
|
||
1997BB80000
|
trusted library allocation
|
page read and write
|
||
1CADF700000
|
heap
|
page read and write
|
||
255AEC72000
|
heap
|
page read and write
|
||
7FFC73A81000
|
unkown
|
page readonly
|
||
9FA9FFF000
|
stack
|
page read and write
|
||
49B000
|
stack
|
page read and write
|
||
1997BD20000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
245F1E29000
|
heap
|
page read and write
|
||
7FFC73A96000
|
unkown
|
page readonly
|
||
200F4E47000
|
heap
|
page read and write
|
||
AF3658C000
|
stack
|
page read and write
|
||
5AB000
|
heap
|
page read and write
|
||
245F1E00000
|
heap
|
page read and write
|
||
1ADFB536000
|
heap
|
page read and write
|
||
1642F702000
|
heap
|
page read and write
|
||
44FE5FC000
|
stack
|
page read and write
|
||
17559A56000
|
heap
|
page read and write
|
||
255AF3D0000
|
trusted library allocation
|
page read and write
|
||
1642F4E0000
|
heap
|
page read and write
|
||
1CADF702000
|
heap
|
page read and write
|
||
1997BCD8000
|
heap
|
page read and write
|
||
245F1E6E000
|
heap
|
page read and write
|
||
255E900B000
|
heap
|
page read and write
|
||
255B4650000
|
trusted library allocation
|
page read and write
|
||
2F215FC000
|
stack
|
page read and write
|
||
22C58E65000
|
heap
|
page read and write
|
There are 384 hidden memdumps, click here to show them.