IOC Report
5c70000.dll.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\5c70000.dll.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\5c70000.dll.dll",#1
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\5c70000.dll.dll,#1
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\5c70000.dll.dll",#1

Memdumps

Base Address
Regiontype
Protect
Malicious
19C23BF0000
heap
page read and write
19C23C90000
heap
page read and write
25D5CB6A000
heap
page read and write
763715E000
stack
page read and write
9BE5AEB000
stack
page read and write
25D5CB73000
heap
page read and write
19C23C99000
heap
page read and write
25D5CB6E000
heap
page read and write
19C23CBD000
heap
page read and write
19C26E80000
heap
page read and write
25D5CB95000
heap
page read and write
19C27310000
trusted library allocation
page read and write
9BE5BEF000
stack
page read and write
19C268C0000
heap
page read and write
25D5FF60000
trusted library allocation
page read and write
1D99963D000
heap
page read and write
25D5CE25000
heap
page read and write
1D999630000
heap
page read and write
25D5E803000
heap
page read and write
25D5CB72000
heap
page read and write
19C23BD0000
heap
page read and write
1D9995D0000
heap
page read and write
25D5CE2B000
heap
page read and write
1D999490000
heap
page read and write
25D5CD40000
heap
page read and write
19C23CC2000
heap
page read and write
3273BFF000
stack
page read and write
19C23C70000
heap
page read and write
19C23A90000
heap
page read and write
25D5CB50000
heap
page read and write
19C23C60000
heap
page read and write
25D5CB6A000
heap
page read and write
25D5CB7A000
heap
page read and write
19C23C65000
heap
page read and write
9BE5B6F000
stack
page read and write
3273AFD000
stack
page read and write
19C26E83000
heap
page read and write
19C23CAA000
heap
page read and write
25D5CE20000
heap
page read and write
19C23CB9000
heap
page read and write
25D5CAE0000
heap
page read and write
25D5CB72000
heap
page read and write
76370DB000
stack
page read and write
25D60760000
heap
page read and write
19C23CAA000
heap
page read and write
25D5CDB0000
heap
page read and write
19C23CBD000
heap
page read and write
25D5CB5B000
heap
page read and write
19C23CAE000
heap
page read and write
25D5CB6E000
heap
page read and write
1D999643000
heap
page read and write
19C23CB3000
heap
page read and write
25D5CB57000
heap
page read and write
19C23CD5000
heap
page read and write
3273CFF000
stack
page read and write
25D5CB6E000
heap
page read and write
25D5E800000
heap
page read and write
19C23CB3000
heap
page read and write
19C23CA7000
heap
page read and write
19C23CCE000
heap
page read and write
25D5CD20000
heap
page read and write
76371DE000
stack
page read and write
25D5CB72000
heap
page read and write
19C23C6B000
heap
page read and write
25D5CB7F000
heap
page read and write
There are 55 hidden memdumps, click here to show them.