Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,JdXfbK
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,MDlQdmktXg
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,VejwwBbES
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",JdXfbK
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",MDlQdmktXg
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",VejwwBbES
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",XeZsfh
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",YqufWwLNu
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\ijexogdf64.dll"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
peranistaer.top
|
|||
ultomductingbig.pro
|
|||
klareqvino.com
|
|||
gruvihabralo.nl
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
18E2E579000
|
heap
|
page read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
433177C000
|
stack
|
page read and write
|
||
6B47C7E000
|
stack
|
page read and write
|
||
1893FCF0000
|
heap
|
page read and write
|
||
2DFCE2E0000
|
heap
|
page read and write
|
||
2DFCDFD0000
|
heap
|
page read and write
|
||
4B2DC7E000
|
stack
|
page read and write
|
||
432027F000
|
stack
|
page read and write
|
||
23CA23C0000
|
trusted library allocation
|
page read and write
|
||
1AE77E10000
|
heap
|
page read and write
|
||
6B4758E000
|
stack
|
page read and write
|
||
FD8A47E000
|
stack
|
page read and write
|
||
23CA247F000
|
heap
|
page read and write
|
||
23CA2513000
|
heap
|
page read and write
|
||
23CA2462000
|
heap
|
page read and write
|
||
244E0980000
|
heap
|
page read and write
|
||
23CA2500000
|
heap
|
page read and write
|
||
232B71C0000
|
heap
|
page read and write
|
||
16798C03000
|
heap
|
page read and write
|
||
244E08B0000
|
heap
|
page read and write
|
||
23CA2320000
|
heap
|
page read and write
|
||
244E0998000
|
heap
|
page read and write
|
||
232B8C80000
|
heap
|
page read and write
|
||
6B4797B000
|
stack
|
page read and write
|
||
8DFFDFE000
|
stack
|
page read and write
|
||
210CD920000
|
heap
|
page read and write
|
||
23CA2448000
|
heap
|
page read and write
|
||
232B71C8000
|
heap
|
page read and write
|
||
7FFFF0311000
|
unkown
|
page execute read
|
||
232B7140000
|
heap
|
page read and write
|
||
BBB3DAE000
|
stack
|
page read and write
|
||
1AE797B0000
|
heap
|
page read and write
|
||
210CDAE0000
|
heap
|
page read and write
|
||
16798F30000
|
heap
|
page read and write
|
||
232B7160000
|
heap
|
page read and write
|
||
232B7400000
|
heap
|
page read and write
|
||
18E2E64C000
|
heap
|
page read and write
|
||
2B7682D0000
|
heap
|
page read and write
|
||
1893E108000
|
heap
|
page read and write
|
||
BEDA94C000
|
stack
|
page read and write
|
||
BBB3D2C000
|
stack
|
page read and write
|
||
23CA2465000
|
heap
|
page read and write
|
||
F0DD97E000
|
stack
|
page read and write
|
||
1AE77AC8000
|
heap
|
page read and write
|
||
1AE77E15000
|
heap
|
page read and write
|
||
2B7683F0000
|
heap
|
page read and write
|
||
14802325000
|
heap
|
page read and write
|
||
23CA2E02000
|
trusted library allocation
|
page read and write
|
||
6B4750B000
|
stack
|
page read and write
|
||
1AE77A40000
|
heap
|
page read and write
|
||
23CA2400000
|
heap
|
page read and write
|
||
431FF9F000
|
stack
|
page read and write
|
||
23CA2454000
|
heap
|
page read and write
|
||
18E2E865000
|
heap
|
page read and write
|
||
232B7405000
|
heap
|
page read and write
|
||
2B768160000
|
heap
|
page read and write
|
||
232B70D0000
|
heap
|
page read and write
|
||
23CA2429000
|
heap
|
page read and write
|
||
23CA243C000
|
heap
|
page read and write
|
||
23CA2330000
|
heap
|
page read and write
|
||
23CA2502000
|
heap
|
page read and write
|
||
4B2D9EC000
|
stack
|
page read and write
|
||
18E2E570000
|
heap
|
page read and write
|
||
14802039000
|
heap
|
page read and write
|
||
2B7683F5000
|
heap
|
page read and write
|
||
1893E070000
|
heap
|
page read and write
|
||
2B768168000
|
heap
|
page read and write
|
||
210CF650000
|
heap
|
page read and write
|
||
1AE77A20000
|
heap
|
page read and write
|
||
1AE77AC0000
|
heap
|
page read and write
|
||
16798BFD000
|
heap
|
page read and write
|
||
14801F20000
|
heap
|
page read and write
|
||
18E2E550000
|
heap
|
page read and write
|
||
1893E000000
|
heap
|
page read and write
|
||
7FFFF0365000
|
unkown
|
page readonly
|
||
2DFCDE90000
|
heap
|
page read and write
|
||
BBB407E000
|
stack
|
page read and write
|
||
1AE779B0000
|
heap
|
page read and write
|
||
210CDD45000
|
heap
|
page read and write
|
||
18E2E530000
|
heap
|
page read and write
|
||
14802320000
|
heap
|
page read and write
|
||
8DFFD7C000
|
stack
|
page read and write
|
||
23CA2461000
|
heap
|
page read and write
|
||
244E0990000
|
heap
|
page read and write
|
||
14802030000
|
heap
|
page read and write
|
||
7FFFF0310000
|
unkown
|
page readonly
|
||
210CDA60000
|
heap
|
page read and write
|
||
14803C50000
|
heap
|
page read and write
|
||
2DFCE2E5000
|
heap
|
page read and write
|
||
23CA249B000
|
heap
|
page read and write
|
||
244E08D0000
|
heap
|
page read and write
|
||
23CA2508000
|
heap
|
page read and write
|
||
6B47A7B000
|
stack
|
page read and write
|
||
18E2E850000
|
heap
|
page read and write
|
||
16798BF0000
|
heap
|
page read and write
|
||
BEDAC7E000
|
stack
|
page read and write
|
||
1893E3E5000
|
heap
|
page read and write
|
||
268047C000
|
stack
|
page read and write
|
||
18E2E860000
|
heap
|
page read and write
|
||
2B767FF0000
|
heap
|
page read and write
|
||
210CDA80000
|
heap
|
page read and write
|
||
18E2E4C0000
|
heap
|
page read and write
|
||
2392F5D000
|
stack
|
page read and write
|
||
FD8A4FF000
|
stack
|
page read and write
|
||
4B2DCFE000
|
stack
|
page read and write
|
||
8D8007E000
|
stack
|
page read and write
|
||
14801F90000
|
heap
|
page read and write
|
||
2DFCE0F0000
|
heap
|
page read and write
|
||
1893E100000
|
heap
|
page read and write
|
||
2DFCDFD8000
|
heap
|
page read and write
|
||
1893E3E0000
|
heap
|
page read and write
|
||
14801FB0000
|
heap
|
page read and write
|
||
2DFCE0D0000
|
heap
|
page read and write
|
||
268057F000
|
stack
|
page read and write
|
||
23CA2390000
|
heap
|
page read and write
|
||
431FF1C000
|
stack
|
page read and write
|
||
23CA245F000
|
heap
|
page read and write
|
||
6B47B77000
|
stack
|
page read and write
|
||
18E30360000
|
unclassified section
|
page execute and read and write
|
||
2DFCFA80000
|
heap
|
page read and write
|
||
F0DD8FE000
|
stack
|
page read and write
|
||
FD8A1AC000
|
stack
|
page read and write
|
||
1893E090000
|
heap
|
page read and write
|
||
2B768130000
|
heap
|
page read and write
|
||
180003000
|
direct allocation
|
page read and write
|
||
244E2310000
|
heap
|
page read and write
|
||
210CDAE8000
|
heap
|
page read and write
|
||
244E0985000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
180002000
|
direct allocation
|
page readonly
|
||
43317FE000
|
stack
|
page read and write
|
||
4331A7F000
|
stack
|
page read and write
|
||
210CDD40000
|
heap
|
page read and write
|
||
6B4787E000
|
stack
|
page read and write
|
||
2B768260000
|
heap
|
page read and write
|
||
23CA2469000
|
heap
|
page read and write
|
||
16798BA0000
|
heap
|
page read and write
|
||
16798B70000
|
heap
|
page read and write
|
||
F0DD87C000
|
stack
|
page read and write
|
||
26804FF000
|
stack
|
page read and write
|
||
23CA2413000
|
heap
|
page read and write
|
||
BEDA9CF000
|
stack
|
page read and write
|
||
16798B00000
|
heap
|
page read and write
|
||
244E0770000
|
heap
|
page read and write
|
||
6B47D7E000
|
stack
|
page read and write
|
There are 136 hidden memdumps, click here to show them.