IOC Report
1f0000.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\1f0000.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\1f0000.dll",#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\1f0000.dll",#1

Memdumps

Base Address
Regiontype
Protect
Malicious
3558000
heap
page read and write
354F000
heap
page read and write
3500000
trusted library allocation
page read and write
5180000
trusted library allocation
page read and write
2F2B000
stack
page read and write
92C000
stack
page read and write
2FFA000
heap
page read and write
3520000
heap
page read and write
990000
trusted library allocation
page read and write
3545000
heap
page read and write
8C0000
heap
page read and write
3545000
heap
page read and write
3553000
heap
page read and write
2EEA000
stack
page read and write
352A000
heap
page read and write
ED0000
heap
page read and write
6530000
heap
page read and write
2FF7000
heap
page read and write
3549000
heap
page read and write
4E3F000
stack
page read and write
3554000
heap
page read and write
33B0000
trusted library allocation
page read and write
4DFE000
stack
page read and write
354E000
heap
page read and write
2FF0000
heap
page read and write
354E000
heap
page read and write
3542000
heap
page read and write
2E80000
heap
page read and write
340F000
stack
page read and write
2F90000
trusted library allocation
page read and write
F80000
heap
page read and write
DCD000
stack
page read and write
33C0000
heap
page read and write
3553000
heap
page read and write
334E000
stack
page read and write
3550000
heap
page read and write
6533000
heap
page read and write
3569000
heap
page read and write
330E000
stack
page read and write
F8B000
heap
page read and write
338E000
stack
page read and write
6600000
trusted library allocation
page read and write
There are 32 hidden memdumps, click here to show them.