Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\8082-x64.dll.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\8082-x64.dll.dll",#1
|
||
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\8082-x64.dll.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\8082-x64.dll.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\8082-x64.dll.dll,DllGetClassObject
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\8082-x64.dll.dll,DllMain
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\8082-x64.dll.dll,DllRegisterServer
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2F829EA0000
|
trusted library allocation
|
page read and write
|
||
DD2557C000
|
stack
|
page read and write
|
||
ADD5E7C000
|
stack
|
page read and write
|
||
1B275429000
|
heap
|
page read and write
|
||
1BF4C100000
|
heap
|
page read and write
|
||
1B2753C0000
|
remote allocation
|
page read and write
|
||
10EC2CE0000
|
heap
|
page read and write
|
||
210D1AA0000
|
heap
|
page read and write
|
||
8E5C5FC000
|
stack
|
page read and write
|
||
287E8E75000
|
heap
|
page read and write
|
||
1BE15292000
|
heap
|
page read and write
|
||
ADD5C7C000
|
stack
|
page read and write
|
||
10EC1129000
|
heap
|
page read and write
|
||
C2D5CFF000
|
stack
|
page read and write
|
||
287E8CC0000
|
heap
|
page read and write
|
||
25B18C46000
|
heap
|
page read and write
|
||
96B000
|
stack
|
page read and write
|
||
1C0A1B30000
|
trusted library allocation
|
page read and write
|
||
280F4055000
|
heap
|
page read and write
|
||
2F828518000
|
heap
|
page read and write
|
||
1C0A1B50000
|
trusted library allocation
|
page read and write
|
||
C2D5AFD000
|
stack
|
page read and write
|
||
BCD5B7F000
|
stack
|
page read and write
|
||
1BE15A27000
|
heap
|
page read and write
|
||
15017F000
|
stack
|
page read and write
|
||
ADD63FD000
|
stack
|
page read and write
|
||
A6FE279000
|
stack
|
page read and write
|
||
1A595E02000
|
heap
|
page read and write
|
||
ADD64FF000
|
stack
|
page read and write
|
||
2196AE40000
|
heap
|
page read and write
|
||
1C0A0BF0000
|
trusted library allocation
|
page read and write
|
||
293EAFB000
|
stack
|
page read and write
|
||
853287D000
|
stack
|
page read and write
|
||
25B18A50000
|
heap
|
page read and write
|
||
FF6C87C000
|
stack
|
page read and write
|
||
1F894820000
|
heap
|
page read and write
|
||
BCD5A7F000
|
stack
|
page read and write
|
||
1F8949D0000
|
heap
|
page read and write
|
||
1B275C02000
|
trusted library allocation
|
page read and write
|
||
210D2402000
|
trusted library allocation
|
page read and write
|
||
CA042FE000
|
stack
|
page read and write
|
||
DD2567F000
|
stack
|
page read and write
|
||
25B18C31000
|
heap
|
page read and write
|
||
1BE15270000
|
heap
|
page read and write
|
||
F85000
|
heap
|
page read and write
|
||
1F8949E3000
|
heap
|
page read and write
|
||
280F3E58000
|
heap
|
page read and write
|
||
1B275426000
|
heap
|
page read and write
|
||
1FB144A0000
|
heap
|
page read and write
|
||
25B18D02000
|
heap
|
page read and write
|
||
287E8E73000
|
heap
|
page read and write
|
||
25B18AB0000
|
heap
|
page read and write
|
||
1C0A0D6A000
|
heap
|
page read and write
|
||
25B18C4E000
|
heap
|
page read and write
|
||
1BF4B902000
|
heap
|
page read and write
|
||
1FB144D8000
|
heap
|
page read and write
|
||
1BF4B884000
|
heap
|
page read and write
|
||
1BE15922000
|
heap
|
page read and write
|
||
287E8C50000
|
heap
|
page read and write
|
||
1C0A0D00000
|
heap
|
page read and write
|
||
1C0A1B60000
|
trusted library allocation
|
page read and write
|
||
2F828425000
|
heap
|
page read and write
|
||
1F894960000
|
heap
|
page read and write
|
||
2F828459000
|
heap
|
page read and write
|
||
1BE15A02000
|
heap
|
page read and write
|
||
1BF4B86E000
|
heap
|
page read and write
|
||
1BE15943000
|
heap
|
page read and write
|
||
2F828513000
|
heap
|
page read and write
|
||
CA03F0F000
|
stack
|
page read and write
|
||
1BE15A13000
|
heap
|
page read and write
|
||
1BF4B887000
|
heap
|
page read and write
|
||
1C0A18F0000
|
trusted library allocation
|
page read and write
|
||
2F828380000
|
heap
|
page read and write
|
||
85324FE000
|
stack
|
page read and write
|
||
1F894980000
|
heap
|
page read and write
|
||
2196AFA0000
|
heap
|
page read and write
|
||
1B275502000
|
heap
|
page read and write
|
||
1C0A0CD9000
|
heap
|
page read and write
|
||
DD2547A000
|
stack
|
page read and write
|
||
280F3E50000
|
heap
|
page read and write
|
||
293E9FB000
|
stack
|
page read and write
|
||
8531F8B000
|
stack
|
page read and write
|
||
1FB14830000
|
heap
|
page read and write
|
||
210D1C3B000
|
heap
|
page read and write
|
||
287E8F02000
|
heap
|
page read and write
|
||
1C0A0D4E000
|
heap
|
page read and write
|
||
1F894B60000
|
heap
|
page read and write
|
||
25B18C6A000
|
heap
|
page read and write
|
||
1BE1525C000
|
heap
|
page read and write
|
||
FF6CFFC000
|
stack
|
page read and write
|
||
25B18C5F000
|
heap
|
page read and write
|
||
25B18C45000
|
heap
|
page read and write
|
||
1BF4B8BC000
|
heap
|
page read and write
|
||
A6FE0FF000
|
stack
|
page read and write
|
||
10EC1110000
|
heap
|
page read and write
|
||
DD24F7B000
|
stack
|
page read and write
|
||
210D1C00000
|
heap
|
page read and write
|
||
1C0A1B40000
|
heap
|
page readonly
|
||
25B18C3A000
|
heap
|
page read and write
|
||
25B18C5E000
|
heap
|
page read and write
|
||
2196AFC0000
|
heap
|
page read and write
|
||
10EC1230000
|
heap
|
page read and write
|
||
1BE159BE000
|
heap
|
page read and write
|
||
1B275230000
|
heap
|
page read and write
|
||
2196C8B0000
|
heap
|
page read and write
|
||
287E8DC0000
|
trusted library allocation
|
page read and write
|
||
1C0A0D08000
|
heap
|
page read and write
|
||
85328FE000
|
stack
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
2F828502000
|
heap
|
page read and write
|
||
ADD5BFF000
|
stack
|
page read and write
|
||
C2D5DFE000
|
stack
|
page read and write
|
||
210D1C13000
|
heap
|
page read and write
|
||
853247C000
|
stack
|
page read and write
|
||
25B18C73000
|
heap
|
page read and write
|
||
5D59DFE000
|
stack
|
page read and write
|
||
1C0A0D46000
|
heap
|
page read and write
|
||
1FB143A0000
|
heap
|
page read and write
|
||
2F829F90000
|
remote allocation
|
page read and write
|
||
280F4050000
|
heap
|
page read and write
|
||
F4B0F7F000
|
stack
|
page read and write
|
||
287E8E02000
|
heap
|
page read and write
|
||
1BE15954000
|
heap
|
page read and write
|
||
1BE151E0000
|
trusted library allocation
|
page read and write
|
||
10EC13A5000
|
heap
|
page read and write
|
||
1FB14410000
|
heap
|
page read and write
|
||
210D1B00000
|
heap
|
page read and write
|
||
14FD7C000
|
stack
|
page read and write
|
||
10EC1210000
|
heap
|
page read and write
|
||
210D1C37000
|
heap
|
page read and write
|
||
1BE15A23000
|
heap
|
page read and write
|
||
1C0A0CF0000
|
trusted library allocation
|
page read and write
|
||
280F3C30000
|
heap
|
page read and write
|
||
25B18A40000
|
heap
|
page read and write
|
||
1BE1596F000
|
heap
|
page read and write
|
||
1BE1523D000
|
heap
|
page read and write
|
||
CA0427E000
|
stack
|
page read and write
|
||
1C0A0C70000
|
heap
|
page read and write
|
||
FF6D1FC000
|
stack
|
page read and write
|
||
1B27543F000
|
heap
|
page read and write
|
||
287E8E5B000
|
heap
|
page read and write
|
||
25B18C48000
|
heap
|
page read and write
|
||
1BE15213000
|
heap
|
page read and write
|
||
1C0A0D6F000
|
heap
|
page read and write
|
||
2F829ED0000
|
trusted library allocation
|
page read and write
|
||
1BE1525F000
|
heap
|
page read and write
|
||
210D1C2F000
|
heap
|
page read and write
|
||
C2D5BFF000
|
stack
|
page read and write
|
||
1C0A0D6F000
|
heap
|
page read and write
|
||
F4B0E7C000
|
stack
|
page read and write
|
||
FF6CDFF000
|
stack
|
page read and write
|
||
1BE15292000
|
heap
|
page read and write
|
||
1BF4B829000
|
heap
|
page read and write
|
||
2196B019000
|
heap
|
page read and write
|
||
1B27545F000
|
heap
|
page read and write
|
||
25B18C7A000
|
heap
|
page read and write
|
||
1BF4B83E000
|
heap
|
page read and write
|
||
25B18C6C000
|
heap
|
page read and write
|
||
25B18C44000
|
heap
|
page read and write
|
||
287E8E13000
|
heap
|
page read and write
|
||
BCD52FB000
|
stack
|
page read and write
|
||
2F828458000
|
heap
|
page read and write
|
||
280F3E00000
|
heap
|
page read and write
|
||
2F828459000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
25B18C40000
|
heap
|
page read and write
|
||
1C0A1880000
|
trusted library allocation
|
page read and write
|
||
25B18C96000
|
heap
|
page read and write
|
||
15007F000
|
stack
|
page read and write
|
||
25B18C42000
|
heap
|
page read and write
|
||
1BE15902000
|
heap
|
page read and write
|
||
287E8E29000
|
heap
|
page read and write
|
||
25B18C69000
|
heap
|
page read and write
|
||
1A596402000
|
trusted library allocation
|
page read and write
|
||
293EBFE000
|
stack
|
page read and write
|
||
1BE15269000
|
heap
|
page read and write
|
||
1BE15A00000
|
heap
|
page read and write
|
||
1BE159B0000
|
heap
|
page read and write
|
||
1BE15286000
|
heap
|
page read and write
|
||
2F829F10000
|
trusted library allocation
|
page read and write
|
||
210D1D02000
|
heap
|
page read and write
|
||
1A595E28000
|
heap
|
page read and write
|
||
2F828449000
|
heap
|
page read and write
|
||
A6FE1FB000
|
stack
|
page read and write
|
||
1A595E55000
|
heap
|
page read and write
|
||
1A595E00000
|
heap
|
page read and write
|
||
1BE15900000
|
heap
|
page read and write
|
||
1BE1522F000
|
heap
|
page read and write
|
||
ADD60FB000
|
stack
|
page read and write
|
||
EE99FF000
|
stack
|
page read and write
|
||
25B18C64000
|
heap
|
page read and write
|
||
1BE1538E000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
DD2537F000
|
stack
|
page read and write
|
||
ADD607C000
|
stack
|
page read and write
|
||
2F829F90000
|
remote allocation
|
page read and write
|
||
280F3D90000
|
heap
|
page read and write
|
||
210D1C29000
|
heap
|
page read and write
|
||
210D1C39000
|
heap
|
page read and write
|
||
1BF4B813000
|
heap
|
page read and write
|
||
1C0A0D4E000
|
heap
|
page read and write
|
||
1A595C10000
|
heap
|
page read and write
|
||
2196AFC5000
|
heap
|
page read and write
|
||
287E8C60000
|
heap
|
page read and write
|
||
1A595F02000
|
heap
|
page read and write
|
||
2F828370000
|
heap
|
page read and write
|
||
1FB14430000
|
heap
|
page read and write
|
||
1BF4B8CA000
|
heap
|
page read and write
|
||
EE987C000
|
stack
|
page read and write
|
||
EE997E000
|
stack
|
page read and write
|
||
280F3D70000
|
heap
|
page read and write
|
||
25B18C57000
|
heap
|
page read and write
|
||
287E8F13000
|
heap
|
page read and write
|
||
10EC13A0000
|
heap
|
page read and write
|
||
1BF4B8CD000
|
heap
|
page read and write
|
||
25B18C58000
|
heap
|
page read and write
|
||
1C0A0CD0000
|
heap
|
page read and write
|
||
CA03E8C000
|
stack
|
page read and write
|
||
85326FE000
|
stack
|
page read and write
|
||
25B19402000
|
trusted library allocation
|
page read and write
|
||
2196C9C0000
|
heap
|
page read and write
|
||
2F828500000
|
heap
|
page read and write
|
||
287E8E00000
|
heap
|
page read and write
|
||
BCD5C7F000
|
stack
|
page read and write
|
||
5D59CFF000
|
stack
|
page read and write
|
||
2F82843D000
|
heap
|
page read and write
|
||
5D59EFF000
|
stack
|
page read and write
|
||
25B18C7D000
|
heap
|
page read and write
|
||
1A595DE0000
|
trusted library allocation
|
page read and write
|
||
10EC1119000
|
heap
|
page read and write
|
||
280F3E67000
|
heap
|
page read and write
|
||
A6FDF7F000
|
stack
|
page read and write
|
||
25B18C61000
|
heap
|
page read and write
|
||
1BE15790000
|
trusted library allocation
|
page read and write
|
||
25B18C00000
|
heap
|
page read and write
|
||
287E9602000
|
trusted library allocation
|
page read and write
|
||
1BF4B8E1000
|
heap
|
page read and write
|
||
2F82842A000
|
heap
|
page read and write
|
||
5D597CE000
|
stack
|
page read and write
|
||
287E8E68000
|
heap
|
page read and write
|
||
1BE1528B000
|
heap
|
page read and write
|
||
210D2260000
|
trusted library allocation
|
page read and write
|
||
1BE15922000
|
heap
|
page read and write
|
||
2196B008000
|
heap
|
page read and write
|
||
1BE15802000
|
heap
|
page read and write
|
||
1BE159C8000
|
heap
|
page read and write
|
||
1BF4C139000
|
heap
|
page read and write
|
||
1BF4BE80000
|
trusted library allocation
|
page read and write
|
||
210D1C3E000
|
heap
|
page read and write
|
||
ADD61FD000
|
stack
|
page read and write
|
||
A6FDBBB000
|
stack
|
page read and write
|
||
280F3F50000
|
heap
|
page read and write
|
||
BCD577D000
|
stack
|
page read and write
|
||
1FB144D0000
|
heap
|
page read and write
|
||
1C0A0ED0000
|
trusted library allocation
|
page read and write
|
||
EE98FF000
|
stack
|
page read and write
|
||
1B275400000
|
heap
|
page read and write
|
||
A6FE57F000
|
stack
|
page read and write
|
||
25B18C79000
|
heap
|
page read and write
|
||
5D5974B000
|
stack
|
page read and write
|
||
2F82A002000
|
trusted library allocation
|
page read and write
|
||
25B18C62000
|
heap
|
page read and write
|
||
25B18C76000
|
heap
|
page read and write
|
||
1BE153B9000
|
heap
|
page read and write
|
||
25B18C83000
|
heap
|
page read and write
|
||
25B18C3D000
|
heap
|
page read and write
|
||
1BF4B6B0000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
1BE15010000
|
heap
|
page read and write
|
||
1F894B60000
|
heap
|
page read and write
|
||
ADD62FF000
|
stack
|
page read and write
|
||
2F828400000
|
heap
|
page read and write
|
||
1A595F00000
|
heap
|
page read and write
|
||
10EC0FD0000
|
heap
|
page read and write
|
||
2F828449000
|
heap
|
page read and write
|
||
1BF4B913000
|
heap
|
page read and write
|
||
1A595E6C000
|
heap
|
page read and write
|
||
1BE15992000
|
heap
|
page read and write
|
||
25B18C5A000
|
heap
|
page read and write
|
||
25B18C66000
|
heap
|
page read and write
|
||
1BE15A30000
|
heap
|
page read and write
|
||
2F829E80000
|
trusted library allocation
|
page read and write
|
||
853277F000
|
stack
|
page read and write
|
||
8E5C579000
|
stack
|
page read and write
|
||
5D59A7E000
|
stack
|
page read and write
|
||
1C0A18E0000
|
trusted library allocation
|
page read and write
|
||
1C0A1BB0000
|
trusted library allocation
|
page read and write
|
||
2F8283E0000
|
heap
|
page read and write
|
||
A6FE37E000
|
stack
|
page read and write
|
||
1BE15229000
|
heap
|
page read and write
|
||
1B275413000
|
heap
|
page read and write
|
||
EE9A7E000
|
stack
|
page read and write
|
||
1BF4B800000
|
heap
|
page read and write
|
||
1B2753C0000
|
remote allocation
|
page read and write
|
||
1B275220000
|
heap
|
page read and write
|
||
1BF4C002000
|
heap
|
page read and write
|
||
1C0A0D10000
|
heap
|
page read and write
|
||
1BF4B720000
|
heap
|
page read and write
|
||
25B18C5C000
|
heap
|
page read and write
|
||
1BF4C112000
|
heap
|
page read and write
|
||
ADD5A7B000
|
stack
|
page read and write
|
||
1A595E79000
|
heap
|
page read and write
|
||
1C0A0CD5000
|
heap
|
page read and write
|
||
FF6CBFF000
|
stack
|
page read and write
|
||
293ECFE000
|
stack
|
page read and write
|
||
1FB14835000
|
heap
|
page read and write
|
||
210D1C52000
|
heap
|
page read and write
|
||
1B275402000
|
heap
|
page read and write
|
||
2F828413000
|
heap
|
page read and write
|
||
1B275390000
|
trusted library allocation
|
page read and write
|
||
FF6CCFE000
|
stack
|
page read and write
|
||
A6FE47A000
|
stack
|
page read and write
|
||
BCD4EFB000
|
stack
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
BCD597F000
|
stack
|
page read and write
|
||
1BE14FB0000
|
heap
|
page read and write
|
||
1A595E13000
|
heap
|
page read and write
|
||
1BE153E5000
|
heap
|
page read and write
|
||
2F828448000
|
heap
|
page read and write
|
||
BCD557D000
|
stack
|
page read and write
|
||
F4B107E000
|
stack
|
page read and write
|
||
1A595BA0000
|
heap
|
page read and write
|
||
2F828402000
|
heap
|
page read and write
|
||
5D59BFF000
|
stack
|
page read and write
|
||
BCD547F000
|
stack
|
page read and write
|
||
1B275290000
|
heap
|
page read and write
|
||
1BE15244000
|
heap
|
page read and write
|
||
8E5C3F9000
|
stack
|
page read and write
|
||
2F828464000
|
heap
|
page read and write
|
||
1BF4B6C0000
|
heap
|
page read and write
|
||
26D0000
|
heap
|
page read and write
|
||
8E5C4FF000
|
stack
|
page read and write
|
||
25B18BB0000
|
trusted library allocation
|
page read and write
|
||
1C0A0BE0000
|
heap
|
page read and write
|
||
287E8E3C000
|
heap
|
page read and write
|
||
1BE14FA0000
|
heap
|
page read and write
|
||
8E5C47A000
|
stack
|
page read and write
|
||
DD25779000
|
stack
|
page read and write
|
||
1A595E3C000
|
heap
|
page read and write
|
||
2196B000000
|
heap
|
page read and write
|
||
210D1C68000
|
heap
|
page read and write
|
||
1BE15313000
|
heap
|
page read and write
|
||
FF6CEFC000
|
stack
|
page read and write
|
||
1F8949DD000
|
heap
|
page read and write
|
||
A6FE67B000
|
stack
|
page read and write
|
||
D05000
|
heap
|
page read and write
|
||
1BE15200000
|
heap
|
page read and write
|
||
CA03F8F000
|
stack
|
page read and write
|
||
293E49B000
|
stack
|
page read and write
|
||
210D1C02000
|
heap
|
page read and write
|
||
A6FE6FF000
|
stack
|
page read and write
|
||
F4B0EFF000
|
stack
|
page read and write
|
||
2F829F90000
|
remote allocation
|
page read and write
|
||
1500FF000
|
stack
|
page read and write
|
||
2F82848A000
|
heap
|
page read and write
|
||
1C0A0D4E000
|
heap
|
page read and write
|
||
25B18C29000
|
heap
|
page read and write
|
||
F4B0FFE000
|
stack
|
page read and write
|
||
1C0A0C50000
|
heap
|
page read and write
|
||
1BE1524F000
|
heap
|
page read and write
|
||
210D1AB0000
|
heap
|
page read and write
|
||
287E8E56000
|
heap
|
page read and write
|
||
25B18C74000
|
heap
|
page read and write
|
||
BCD587F000
|
stack
|
page read and write
|
||
14FDFF000
|
stack
|
page read and write
|
||
CEB000
|
heap
|
page read and write
|
||
8E5C27B000
|
stack
|
page read and write
|
||
210D1C44000
|
heap
|
page read and write
|
||
1A595BB0000
|
heap
|
page read and write
|
||
2196AF80000
|
heap
|
page read and write
|
||
1B2753C0000
|
remote allocation
|
page read and write
|
||
1A595F13000
|
heap
|
page read and write
|
||
25B18C13000
|
heap
|
page read and write
|
||
1F894980000
|
heap
|
page read and write
|
||
ADD5F7E000
|
stack
|
page read and write
|
There are 365 hidden memdumps, click here to show them.