Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\VGPINVPA.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\VGPINVPA.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\VGPINVPA.dll,AllocConsole
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\VGPINVPA.dll",#1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\VGPINVPA.dll,GetConsoleCP
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\VGPINVPA.dll,GetConsoleMode
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\VGPINVPA.dll",AllocConsole
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\VGPINVPA.dll",GetConsoleCP
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\VGPINVPA.dll",GetConsoleMode
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\VGPINVPA.dll",GetConsoleOutputCP
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\VGPINVPA.dll",GetNumberOfConsoleInputEvents
|
There are 5 hidden processes, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1CD05279000
|
heap
|
page read and write
|
||
1792DBD0000
|
remote allocation
|
page read and write
|
||
1792C248000
|
heap
|
page read and write
|
||
19A3A080000
|
heap
|
page read and write
|
||
2A9C42F0000
|
heap
|
page read and write
|
||
1DC43609000
|
heap
|
page read and write
|
||
1EBE8C02000
|
heap
|
page read and write
|
||
C97E87B000
|
stack
|
page read and write
|
||
1CD05262000
|
heap
|
page read and write
|
||
1792C213000
|
heap
|
page read and write
|
||
1792C302000
|
heap
|
page read and write
|
||
19A3A010000
|
heap
|
page read and write
|
||
1792C202000
|
heap
|
page read and write
|
||
17B6FDF000
|
stack
|
page read and write
|
||
1CD05140000
|
heap
|
page read and write
|
||
227D6200000
|
heap
|
page read and write
|
||
1792C258000
|
heap
|
page read and write
|
||
1EBE8B95000
|
heap
|
page read and write
|
||
1D31A7E0000
|
heap
|
page read and write
|
||
E126F9F000
|
stack
|
page read and write
|
||
D594EFF000
|
stack
|
page read and write
|
||
227D6257000
|
heap
|
page read and write
|
||
1CD05264000
|
heap
|
page read and write
|
||
1838F302000
|
heap
|
page read and write
|
||
2122AF70000
|
trusted library allocation
|
page read and write
|
||
9874BFD000
|
stack
|
page read and write
|
||
2A9C4520000
|
heap
|
page read and write
|
||
27447390000
|
heap
|
page read and write
|
||
2A9C4585000
|
heap
|
page read and write
|
||
14D070A0000
|
heap
|
page read and write
|
||
1F83EFF000
|
stack
|
page read and write
|
||
750917F000
|
stack
|
page read and write
|
||
A4FFF7D000
|
stack
|
page read and write
|
||
1912C813000
|
heap
|
page read and write
|
||
227D6277000
|
heap
|
page read and write
|
||
1E960720000
|
heap
|
page read and write
|
||
1CD05275000
|
heap
|
page read and write
|
||
A4FFB7C000
|
stack
|
page read and write
|
||
1DE3AC40000
|
heap
|
page read and write
|
||
1CD0525C000
|
heap
|
page read and write
|
||
C97EDFF000
|
stack
|
page read and write
|
||
1D31A6A0000
|
heap
|
page read and write
|
||
1912C802000
|
heap
|
page read and write
|
||
1792DE40000
|
trusted library allocation
|
page read and write
|
||
7D97FDF000
|
stack
|
page read and write
|
||
2122AFA0000
|
remote allocation
|
page read and write
|
||
5FED3DC000
|
stack
|
page read and write
|
||
1E960400000
|
heap
|
page read and write
|
||
1792DBD0000
|
remote allocation
|
page read and write
|
||
227D6271000
|
heap
|
page read and write
|
||
1CD05229000
|
heap
|
page read and write
|
||
1DC45080000
|
heap
|
page read and write
|
||
31938FF000
|
stack
|
page read and write
|
||
1EBE8BB0000
|
heap
|
page read and write
|
||
19A3A2F0000
|
heap
|
page read and write
|
||
1912C861000
|
heap
|
page read and write
|
||
D594FFF000
|
stack
|
page read and write
|
||
27447660000
|
heap
|
page read and write
|
||
14D07200000
|
heap
|
page read and write
|
||
D59477B000
|
stack
|
page read and write
|
||
1838F2BD000
|
heap
|
page read and write
|
||
1912C843000
|
heap
|
page read and write
|
||
1CD0524E000
|
heap
|
page read and write
|
||
1D31A868000
|
heap
|
page read and write
|
||
17B6EDC000
|
stack
|
page read and write
|
||
1CD0525F000
|
heap
|
page read and write
|
||
19A3A0D0000
|
heap
|
page read and write
|
||
B5BA4FF000
|
stack
|
page read and write
|
||
1CD05233000
|
heap
|
page read and write
|
||
1D6CF150000
|
heap
|
page read and write
|
||
1B8C9F35000
|
heap
|
page read and write
|
||
1912C913000
|
heap
|
page read and write
|
||
19A3A0A0000
|
heap
|
page read and write
|
||
1792DBA0000
|
trusted library allocation
|
page read and write
|
||
1792C240000
|
heap
|
page read and write
|
||
1F840FD000
|
stack
|
page read and write
|
||
5FEDF7C000
|
stack
|
page read and write
|
||
1912C83C000
|
heap
|
page read and write
|
||
1838F213000
|
heap
|
page read and write
|
||
1EBE8950000
|
heap
|
page read and write
|
||
1792C248000
|
heap
|
page read and write
|
||
2122B000000
|
heap
|
page read and write
|
||
1CD05A02000
|
trusted library allocation
|
page read and write
|
||
27447320000
|
heap
|
page read and write
|
||
1B8C9CC0000
|
heap
|
page read and write
|
||
D594DFF000
|
stack
|
page read and write
|
||
1D31A800000
|
heap
|
page read and write
|
||
1F841FE000
|
stack
|
page read and write
|
||
38678FF000
|
stack
|
page read and write
|
||
1DE3AE02000
|
heap
|
page read and write
|
||
E12727F000
|
stack
|
page read and write
|
||
1912C858000
|
heap
|
page read and write
|
||
1792C22A000
|
heap
|
page read and write
|
||
1DC43570000
|
heap
|
page read and write
|
||
1CD05263000
|
heap
|
page read and write
|
||
1D31C210000
|
heap
|
page read and write
|
||
C97EBFE000
|
stack
|
page read and write
|
||
1838F2CE000
|
heap
|
page read and write
|
||
1EBE8960000
|
trusted library allocation
|
page read and write
|
||
14D07230000
|
heap
|
page read and write
|
||
1CD0523D000
|
heap
|
page read and write
|
||
1CD05241000
|
heap
|
page read and write
|
||
1DE3AF00000
|
heap
|
page read and write
|
||
A4FFE7F000
|
stack
|
page read and write
|
||
B5BA1BC000
|
stack
|
page read and write
|
||
1CD05244000
|
heap
|
page read and write
|
||
274473B0000
|
heap
|
page read and write
|
||
1EBE8B90000
|
heap
|
page read and write
|
||
1792C224000
|
heap
|
page read and write
|
||
1838FA02000
|
heap
|
page read and write
|
||
38679FB000
|
stack
|
page read and write
|
||
31935EC000
|
stack
|
page read and write
|
||
1DE3ADA0000
|
trusted library allocation
|
page read and write
|
||
353A5AC000
|
stack
|
page read and write
|
||
353A87F000
|
stack
|
page read and write
|
||
1792C247000
|
heap
|
page read and write
|
||
1838F313000
|
heap
|
page read and write
|
||
93E907F000
|
stack
|
page read and write
|
||
1912CE02000
|
trusted library allocation
|
page read and write
|
||
1CD0523B000
|
heap
|
page read and write
|
||
1CD05260000
|
heap
|
page read and write
|
||
1CD05246000
|
heap
|
page read and write
|
||
1CD0526A000
|
heap
|
page read and write
|
||
1E9604C0000
|
heap
|
page read and write
|
||
1838F2E2000
|
heap
|
page read and write
|
||
1EBE98D0000
|
trusted library allocation
|
page read and write
|
||
1838F28B000
|
heap
|
page read and write
|
||
1792C318000
|
heap
|
page read and write
|
||
2122AED0000
|
heap
|
page read and write
|
||
C97EAFE000
|
stack
|
page read and write
|
||
1B8C9CCB000
|
heap
|
page read and write
|
||
AF0317E000
|
stack
|
page read and write
|
||
1CD05200000
|
heap
|
page read and write
|
||
A4FFBFE000
|
stack
|
page read and write
|
||
2122B03C000
|
heap
|
page read and write
|
||
227D623C000
|
heap
|
page read and write
|
||
1CD05274000
|
heap
|
page read and write
|
||
227D6020000
|
heap
|
page read and write
|
||
319387E000
|
stack
|
page read and write
|
||
1912C902000
|
heap
|
page read and write
|
||
1912C829000
|
heap
|
page read and write
|
||
1DC43430000
|
heap
|
page read and write
|
||
AF02F7E000
|
stack
|
page read and write
|
||
1CD05213000
|
heap
|
page read and write
|
||
229817D0000
|
heap
|
page read and write
|
||
1CD05245000
|
heap
|
page read and write
|
||
14D07420000
|
heap
|
page read and write
|
||
AF0293B000
|
stack
|
page read and write
|
||
1838FB3A000
|
heap
|
page read and write
|
||
1CD05257000
|
heap
|
page read and write
|
||
1EBE9650000
|
trusted library allocation
|
page read and write
|
||
1912C7D0000
|
trusted library allocation
|
page read and write
|
||
D5949FD000
|
stack
|
page read and write
|
||
1DC435F0000
|
heap
|
page read and write
|
||
7D97F5E000
|
stack
|
page read and write
|
||
1D31AB40000
|
heap
|
page read and write
|
||
A4FF77F000
|
stack
|
page read and write
|
||
5FEDD7C000
|
stack
|
page read and write
|
||
1EBE9660000
|
trusted library allocation
|
page read and write
|
||
1792C1E0000
|
trusted library allocation
|
page read and write
|
||
5FEDE7F000
|
stack
|
page read and write
|
||
1B8C9C90000
|
heap
|
page read and write
|
||
1EBE98B0000
|
heap
|
page readonly
|
||
1EBE8BEE000
|
heap
|
page read and write
|
||
1792C300000
|
heap
|
page read and write
|
||
1B8C9CD1000
|
heap
|
page read and write
|
||
1792DE00000
|
trusted library allocation
|
page read and write
|
||
1DC437A0000
|
heap
|
page read and write
|
||
1792C080000
|
heap
|
page read and write
|
||
1DC437A5000
|
heap
|
page read and write
|
||
1912C5A0000
|
heap
|
page read and write
|
||
274473DB000
|
heap
|
page read and write
|
||
1B8C9F30000
|
heap
|
page read and write
|
||
1DE3AE3E000
|
heap
|
page read and write
|
||
227D625B000
|
heap
|
page read and write
|
||
1792C258000
|
heap
|
page read and write
|
||
227D6269000
|
heap
|
page read and write
|
||
1792C313000
|
heap
|
page read and write
|
||
1EBE8B30000
|
trusted library allocation
|
page read and write
|
||
A4FF6FC000
|
stack
|
page read and write
|
||
1838F0A0000
|
heap
|
page read and write
|
||
E28138C000
|
stack
|
page read and write
|
||
1D31A879000
|
heap
|
page read and write
|
||
1F8375B000
|
stack
|
page read and write
|
||
1838F2C4000
|
heap
|
page read and write
|
||
227D6A02000
|
trusted library allocation
|
page read and write
|
||
1D6CF0C0000
|
heap
|
page read and write
|
||
1DE3AF02000
|
heap
|
page read and write
|
||
1792DBD0000
|
remote allocation
|
page read and write
|
||
3867A7E000
|
stack
|
page read and write
|
||
1912C865000
|
heap
|
page read and write
|
||
1F83DFE000
|
stack
|
page read and write
|
||
1912C590000
|
heap
|
page read and write
|
||
1838F229000
|
heap
|
page read and write
|
||
1CD05261000
|
heap
|
page read and write
|
||
1D31AB45000
|
heap
|
page read and write
|
||
3867B7F000
|
stack
|
page read and write
|
||
229815D3000
|
heap
|
page read and write
|
||
2A9C4339000
|
heap
|
page read and write
|
||
D5950FF000
|
stack
|
page read and write
|
||
1838F200000
|
heap
|
page read and write
|
||
1B8C9CCE000
|
heap
|
page read and write
|
||
227D6010000
|
heap
|
page read and write
|
||
1792C289000
|
heap
|
page read and write
|
||
1CD051B0000
|
heap
|
page read and write
|
||
B5BA47F000
|
stack
|
page read and write
|
||
1838F286000
|
heap
|
page read and write
|
||
1CD05265000
|
heap
|
page read and write
|
||
1912C84E000
|
heap
|
page read and write
|
||
1838FB13000
|
heap
|
page read and write
|
||
1EBE8A90000
|
heap
|
page read and write
|
||
5FEDA7F000
|
stack
|
page read and write
|
||
1838F26E000
|
heap
|
page read and write
|
||
1EBE8BEE000
|
heap
|
page read and write
|
||
1792C0E0000
|
heap
|
page read and write
|
||
1D6CF159000
|
heap
|
page read and write
|
||
1CD05259000
|
heap
|
page read and write
|
||
D5948FD000
|
stack
|
page read and write
|
||
1CD05284000
|
heap
|
page read and write
|
||
1792C257000
|
heap
|
page read and write
|
||
1DE3AE51000
|
heap
|
page read and write
|
||
227D626A000
|
heap
|
page read and write
|
||
1792DC02000
|
trusted library allocation
|
page read and write
|
||
1E9602A0000
|
heap
|
page read and write
|
||
93E90FF000
|
stack
|
page read and write
|
||
14D07239000
|
heap
|
page read and write
|
||
2122AEE0000
|
heap
|
page read and write
|
||
1CD0526D000
|
heap
|
page read and write
|
||
2A9C4420000
|
heap
|
page read and write
|
||
227D623F000
|
heap
|
page read and write
|
||
5FEDC7B000
|
stack
|
page read and write
|
||
7508CBC000
|
stack
|
page read and write
|
||
1838F243000
|
heap
|
page read and write
|
||
227D6080000
|
heap
|
page read and write
|
||
1EBE8BE6000
|
heap
|
page read and write
|
||
1DE3B602000
|
trusted library allocation
|
page read and write
|
||
1912C850000
|
heap
|
page read and write
|
||
D59435B000
|
stack
|
page read and write
|
||
1CD0526B000
|
heap
|
page read and write
|
||
14D07425000
|
heap
|
page read and write
|
||
386732B000
|
stack
|
page read and write
|
||
D594CFF000
|
stack
|
page read and write
|
||
1EBE8BE7000
|
heap
|
page read and write
|
||
1838F0B0000
|
heap
|
page read and write
|
||
AF0307E000
|
stack
|
page read and write
|
||
1DE3AE79000
|
heap
|
page read and write
|
||
5FEDBFE000
|
stack
|
page read and write
|
||
1E960640000
|
heap
|
page read and write
|
||
1EBE8AB0000
|
heap
|
page read and write
|
||
E126F1C000
|
stack
|
page read and write
|
||
1EBE8BA0000
|
heap
|
page read and write
|
||
227D6202000
|
heap
|
page read and write
|
||
1838F264000
|
heap
|
page read and write
|
||
14D08D60000
|
heap
|
page read and write
|
||
7508DBF000
|
stack
|
page read and write
|
||
1F83FFC000
|
stack
|
page read and write
|
||
1DC43590000
|
heap
|
page read and write
|
||
B63987C000
|
stack
|
page read and write
|
||
19A3A0D8000
|
heap
|
page read and write
|
||
1EBE8BA8000
|
heap
|
page read and write
|
||
1F842FC000
|
stack
|
page read and write
|
||
C97E97E000
|
stack
|
page read and write
|
||
1E9603E0000
|
heap
|
page read and write
|
||
1CD05232000
|
heap
|
page read and write
|
||
1CD0527B000
|
heap
|
page read and write
|
||
2122AFA0000
|
remote allocation
|
page read and write
|
||
229814E0000
|
heap
|
page read and write
|
||
5FEE07F000
|
stack
|
page read and write
|
||
19A3A0DE000
|
heap
|
page read and write
|
||
1838F266000
|
heap
|
page read and write
|
||
386777B000
|
stack
|
page read and write
|
||
1CD0527A000
|
heap
|
page read and write
|
||
1EBE8CA0000
|
trusted library allocation
|
page read and write
|
||
D594BFD000
|
stack
|
page read and write
|
||
227D6213000
|
heap
|
page read and write
|
||
C97E8FE000
|
stack
|
page read and write
|
||
1CD05240000
|
heap
|
page read and write
|
||
1EBE8BEE000
|
heap
|
page read and write
|
||
75090F9000
|
stack
|
page read and write
|
||
1CD05258000
|
heap
|
page read and write
|
||
14D07249000
|
heap
|
page read and write
|
||
C97ECFE000
|
stack
|
page read and write
|
||
2122AF40000
|
heap
|
page read and write
|
||
1DE3AE00000
|
heap
|
page read and write
|
||
1CD0526F000
|
heap
|
page read and write
|
||
7509079000
|
stack
|
page read and write
|
||
19A3A380000
|
heap
|
page read and write
|
||
5FEDAFC000
|
stack
|
page read and write
|
||
227D6180000
|
trusted library allocation
|
page read and write
|
||
353A8FF000
|
stack
|
page read and write
|
||
1F83CFE000
|
stack
|
page read and write
|
||
1CD05302000
|
heap
|
page read and write
|
||
1792C070000
|
heap
|
page read and write
|
||
227D6302000
|
heap
|
page read and write
|
||
3867DFF000
|
stack
|
page read and write
|
||
1D6CF425000
|
heap
|
page read and write
|
||
2122B802000
|
trusted library allocation
|
page read and write
|
||
1D6D0DB0000
|
heap
|
page read and write
|
||
1CD051E0000
|
trusted library allocation
|
page read and write
|
||
1838F110000
|
heap
|
page read and write
|
||
1E960725000
|
heap
|
page read and write
|
||
274473D0000
|
heap
|
page read and write
|
||
1838F2CB000
|
heap
|
page read and write
|
||
1CD05267000
|
heap
|
page read and write
|
||
93E8DCC000
|
stack
|
page read and write
|
||
2122AFA0000
|
remote allocation
|
page read and write
|
||
1792C262000
|
heap
|
page read and write
|
||
1B8C9C70000
|
heap
|
page read and write
|
||
1DE3AC30000
|
heap
|
page read and write
|
||
7D97EDC000
|
stack
|
page read and write
|
||
1912C900000
|
heap
|
page read and write
|
||
1DE3AE13000
|
heap
|
page read and write
|
||
17B6F5F000
|
stack
|
page read and write
|
||
1912C800000
|
heap
|
page read and write
|
||
1912C864000
|
heap
|
page read and write
|
||
5FED7FC000
|
stack
|
page read and write
|
||
B63997F000
|
stack
|
page read and write
|
||
1CD05150000
|
heap
|
page read and write
|
||
1B8CB8B0000
|
heap
|
page read and write
|
||
7508D3E000
|
stack
|
page read and write
|
||
1EBE9920000
|
trusted library allocation
|
page read and write
|
||
1D6CF420000
|
heap
|
page read and write
|
||
2A9C41B0000
|
heap
|
page read and write
|
||
1EBE98C0000
|
trusted library allocation
|
page read and write
|
||
1912CD90000
|
trusted library allocation
|
page read and write
|
||
1DE3AE28000
|
heap
|
page read and write
|
||
1DE3AE6C000
|
heap
|
page read and write
|
||
1D31A860000
|
heap
|
page read and write
|
||
5FED97E000
|
stack
|
page read and write
|
||
1838F870000
|
trusted library allocation
|
page read and write
|
||
1912C600000
|
heap
|
page read and write
|
||
1CD0525A000
|
heap
|
page read and write
|
||
1838FB00000
|
heap
|
page read and write
|
||
E28167F000
|
stack
|
page read and write
|
||
1CD05247000
|
heap
|
page read and write
|
||
1EBE8B20000
|
trusted library allocation
|
page read and write
|
||
227D622A000
|
heap
|
page read and write
|
||
A4FFCFE000
|
stack
|
page read and write
|
||
229815CD000
|
heap
|
page read and write
|
||
1CD05242000
|
heap
|
page read and write
|
||
75091F9000
|
stack
|
page read and write
|
||
1EBE98A0000
|
trusted library allocation
|
page read and write
|
||
B6398FF000
|
stack
|
page read and write
|
||
1792C200000
|
heap
|
page read and write
|
||
1DC435F9000
|
heap
|
page read and write
|
||
2122B102000
|
heap
|
page read and write
|
||
2122B002000
|
heap
|
page read and write
|
||
229814C0000
|
heap
|
page read and write
|
||
229815C0000
|
heap
|
page read and write
|
||
2122B051000
|
heap
|
page read and write
|
||
27447665000
|
heap
|
page read and write
|
||
1EBE8B99000
|
heap
|
page read and write
|
||
19A3A385000
|
heap
|
page read and write
|
||
227D6272000
|
heap
|
page read and write
|
||
1E9604C9000
|
heap
|
page read and write
|
||
2A9C4328000
|
heap
|
page read and write
|
||
3867C7A000
|
stack
|
page read and write
|
||
19A3A0E9000
|
heap
|
page read and write
|
||
2122B029000
|
heap
|
page read and write
|
||
227D6313000
|
heap
|
page read and write
|
||
E2816FE000
|
stack
|
page read and write
|
||
14D071E0000
|
heap
|
page read and write
|
||
2A9C4320000
|
heap
|
page read and write
|
||
1CD0527D000
|
heap
|
page read and write
|
||
1DE3AF13000
|
heap
|
page read and write
|
||
1E9604D9000
|
heap
|
page read and write
|
||
AF02E7B000
|
stack
|
page read and write
|
||
1D6CF320000
|
heap
|
page read and write
|
||
2A9C4580000
|
heap
|
page read and write
|
||
1B8C9C00000
|
heap
|
page read and write
|
||
22981380000
|
heap
|
page read and write
|
||
1CD0527E000
|
heap
|
page read and write
|
||
1CD05268000
|
heap
|
page read and write
|
||
1792C27F000
|
heap
|
page read and write
|
||
1D6CF130000
|
heap
|
page read and write
|
||
1912C876000
|
heap
|
page read and write
|
||
2122B013000
|
heap
|
page read and write
|
||
1DE3ACA0000
|
heap
|
page read and write
|
||
27448EA0000
|
heap
|
page read and write
|
||
A4FFDFD000
|
stack
|
page read and write
|
There are 370 hidden memdumps, click here to show them.