IOC Report
8082-x86.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\8082-x86.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\8082-x86.dll",#1
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\8082-x86.dll
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\8082-x86.dll",#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\8082-x86.dll,DllGetClassObject
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\8082-x86.dll,DllMain
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\8082-x86.dll,DllRegisterServer

Memdumps

Base Address
Regiontype
Protect
Malicious
A90000
trusted library allocation
page read and write
33EF000
stack
page read and write
8FE000
stack
page read and write
AFB000
heap
page read and write
8C0000
heap
page read and write
404E000
stack
page read and write
2AB0000
heap
page read and write
10BE000
stack
page read and write
A1B000
stack
page read and write
8FF000
stack
page read and write
320E000
stack
page read and write
530000
trusted library allocation
page read and write
5E0000
heap
page read and write
6FF000
stack
page read and write
63E000
stack
page read and write
122F000
stack
page read and write
1620000
heap
page read and write
3340000
heap
page read and write
2DAB000
stack
page read and write
318E000
stack
page read and write
ADE000
stack
page read and write
9DC000
stack
page read and write
32F0000
heap
page read and write
31CF000
stack
page read and write
7B0000
heap
page read and write
2B60000
trusted library allocation
page read and write
318A000
heap
page read and write
1B0000
heap
page read and write
970000
heap
page read and write
AF0000
heap
page read and write
2D6C000
stack
page read and write
32AE000
stack
page read and write
2EC0000
heap
page read and write
107E000
stack
page read and write
2DF0000
trusted library allocation
page read and write
33A0000
heap
page read and write
3460000
heap
page read and write
1120000
trusted library allocation
page read and write
48C000
stack
page read and write
420000
heap
page read and write
2EEB000
stack
page read and write
4DD0000
heap
page read and write
2FA0000
heap
page read and write
331F000
stack
page read and write
324F000
stack
page read and write
346A000
heap
page read and write
4CB000
stack
page read and write
2F50000
trusted library allocation
page read and write
132F000
stack
page read and write
77F000
stack
page read and write
400F000
stack
page read and write
142F000
stack
page read and write
50A000
heap
page read and write
3FCE000
stack
page read and write
93F000
stack
page read and write
337E000
stack
page read and write
4D3F000
stack
page read and write
A2D000
stack
page read and write
920000
heap
page read and write
408F000
stack
page read and write
AE0000
heap
page read and write
47B000
stack
page read and write
5AE000
stack
page read and write
3180000
heap
page read and write
4C0000
trusted library allocation
page read and write
3140000
heap
page read and write
2D00000
heap
page read and write
7C0000
heap
page read and write
342E000
stack
page read and write
2FCE000
stack
page read and write
500000
heap
page read and write
333F000
stack
page read and write
334A000
heap
page read and write
DEF000
stack
page read and write
92D000
stack
page read and write
650000
heap
page read and write
32D0000
heap
page read and write
73E000
stack
page read and write
2EAC000
stack
page read and write
43C000
stack
page read and write
40E0000
heap
page read and write
2F60000
heap
page read and write
103E000
stack
page read and write
7CA000
heap
page read and write
3260000
heap
page read and write
2E40000
heap
page read and write
There are 76 hidden memdumps, click here to show them.