Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\5c70000.dll.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\5c70000.dll.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\5c70000.dll.dll,#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\5c70000.dll.dll",#1
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
19C23BF0000
|
heap
|
page read and write
|
||
19C23C90000
|
heap
|
page read and write
|
||
25D5CB6A000
|
heap
|
page read and write
|
||
763715E000
|
stack
|
page read and write
|
||
9BE5AEB000
|
stack
|
page read and write
|
||
25D5CB73000
|
heap
|
page read and write
|
||
19C23C99000
|
heap
|
page read and write
|
||
25D5CB6E000
|
heap
|
page read and write
|
||
19C23CBD000
|
heap
|
page read and write
|
||
19C26E80000
|
heap
|
page read and write
|
||
25D5CB95000
|
heap
|
page read and write
|
||
19C27310000
|
trusted library allocation
|
page read and write
|
||
9BE5BEF000
|
stack
|
page read and write
|
||
19C268C0000
|
heap
|
page read and write
|
||
25D5FF60000
|
trusted library allocation
|
page read and write
|
||
1D99963D000
|
heap
|
page read and write
|
||
25D5CE25000
|
heap
|
page read and write
|
||
1D999630000
|
heap
|
page read and write
|
||
25D5E803000
|
heap
|
page read and write
|
||
25D5CB72000
|
heap
|
page read and write
|
||
19C23BD0000
|
heap
|
page read and write
|
||
1D9995D0000
|
heap
|
page read and write
|
||
25D5CE2B000
|
heap
|
page read and write
|
||
1D999490000
|
heap
|
page read and write
|
||
25D5CD40000
|
heap
|
page read and write
|
||
19C23CC2000
|
heap
|
page read and write
|
||
3273BFF000
|
stack
|
page read and write
|
||
19C23C70000
|
heap
|
page read and write
|
||
19C23A90000
|
heap
|
page read and write
|
||
25D5CB50000
|
heap
|
page read and write
|
||
19C23C60000
|
heap
|
page read and write
|
||
25D5CB6A000
|
heap
|
page read and write
|
||
25D5CB7A000
|
heap
|
page read and write
|
||
19C23C65000
|
heap
|
page read and write
|
||
9BE5B6F000
|
stack
|
page read and write
|
||
3273AFD000
|
stack
|
page read and write
|
||
19C26E83000
|
heap
|
page read and write
|
||
19C23CAA000
|
heap
|
page read and write
|
||
25D5CE20000
|
heap
|
page read and write
|
||
19C23CB9000
|
heap
|
page read and write
|
||
25D5CAE0000
|
heap
|
page read and write
|
||
25D5CB72000
|
heap
|
page read and write
|
||
76370DB000
|
stack
|
page read and write
|
||
25D60760000
|
heap
|
page read and write
|
||
19C23CAA000
|
heap
|
page read and write
|
||
25D5CDB0000
|
heap
|
page read and write
|
||
19C23CBD000
|
heap
|
page read and write
|
||
25D5CB5B000
|
heap
|
page read and write
|
||
19C23CAE000
|
heap
|
page read and write
|
||
25D5CB6E000
|
heap
|
page read and write
|
||
1D999643000
|
heap
|
page read and write
|
||
19C23CB3000
|
heap
|
page read and write
|
||
25D5CB57000
|
heap
|
page read and write
|
||
19C23CD5000
|
heap
|
page read and write
|
||
3273CFF000
|
stack
|
page read and write
|
||
25D5CB6E000
|
heap
|
page read and write
|
||
25D5E800000
|
heap
|
page read and write
|
||
19C23CB3000
|
heap
|
page read and write
|
||
19C23CA7000
|
heap
|
page read and write
|
||
19C23CCE000
|
heap
|
page read and write
|
||
25D5CD20000
|
heap
|
page read and write
|
||
76371DE000
|
stack
|
page read and write
|
||
25D5CB72000
|
heap
|
page read and write
|
||
19C23C6B000
|
heap
|
page read and write
|
||
25D5CB7F000
|
heap
|
page read and write
|
There are 55 hidden memdumps, click here to show them.