IOC Report
d610000.dll.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\d610000.dll.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\d610000.dll.dll",#1
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\d610000.dll.dll,#1
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\d610000.dll.dll",#1

Memdumps

Base Address
Regiontype
Protect
Malicious
21D887B0000
heap
page read and write
1FAD0C80000
trusted library allocation
page read and write
21D88A80000
heap
page read and write
1D5C11C3000
heap
page read and write
AC653EE000
stack
page read and write
1FACF030000
heap
page read and write
21D88A85000
heap
page read and write
21D8BB90000
heap
page read and write
1D5C1070000
heap
page read and write
21D8884F000
heap
page read and write
1FACD55F000
heap
page read and write
1D5C12B0000
heap
page read and write
1FACD2E0000
heap
page read and write
21D88852000
heap
page read and write
21D88852000
heap
page read and write
1FACD6F0000
heap
page read and write
1FACD745000
heap
page read and write
21D88849000
heap
page read and write
21D88A8B000
heap
page read and write
21D887D0000
heap
page read and write
1FACD557000
heap
page read and write
21D88875000
heap
page read and write
21D88846000
heap
page read and write
21D88852000
heap
page read and write
1FACD740000
heap
page read and write
1D5C11B0000
heap
page read and write
1FACD56D000
heap
page read and write
560851D000
stack
page read and write
1FACD440000
heap
page read and write
1FACD563000
heap
page read and write
21D8883B000
heap
page read and write
1FACD56D000
heap
page read and write
21D88856000
heap
page read and write
DDC6A7E000
stack
page read and write
1FACD586000
heap
page read and write
21D8885F000
heap
page read and write
21D8BBA0000
trusted library allocation
page read and write
AC6536E000
stack
page read and write
1FACD540000
heap
page read and write
21D8885A000
heap
page read and write
21D88740000
heap
page read and write
21D8C3A0000
heap
page read and write
1FACD572000
heap
page read and write
1FACD569000
heap
page read and write
1FACD420000
heap
page read and write
21D88837000
heap
page read and write
1D5C11BD000
heap
page read and write
21D88852000
heap
page read and write
1FACD55A000
heap
page read and write
21D88830000
heap
page read and write
21D88A10000
heap
page read and write
AC652EB000
stack
page read and write
1FACD6F3000
heap
page read and write
21D8884D000
heap
page read and write
56088FF000
stack
page read and write
21D8BB93000
heap
page read and write
1FACD548000
heap
page read and write
21D8885A000
heap
page read and write
21D88849000
heap
page read and write
1FACD74B000
heap
page read and write
21D88853000
heap
page read and write
1FACD55E000
heap
page read and write
1FACD55A000
heap
page read and write
DDC676B000
stack
page read and write
1FACD563000
heap
page read and write
1FACD57E000
heap
page read and write
1FACD4B0000
heap
page read and write
DDC67ED000
stack
page read and write
There are 58 hidden memdumps, click here to show them.