IOC Report
pmfoxWgt1q

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\pmfoxWgt1q.dll"
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\pmfoxWgt1q.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\pmfoxWgt1q.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\pmfoxWgt1q.dll,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\pmfoxWgt1q.dll,YAeJyEAYL7F4eDck6YUaf
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\pmfoxWgt1q.dll,fmFkmnQYB5TC2Sq5NGFkK
malicious
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pmfoxWgt1q.dll",#1

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFC739F1000
unkown
page execute read
malicious
7FFC739F1000
unkown
page execute read
malicious
7FFC739F1000
unkown
page execute read
malicious
7FFC739F1000
unkown
page execute read
malicious
7FFC739F1000
unkown
page execute read
malicious
7FFC739F1000
unkown
page execute read
malicious
245F1DF0000
trusted library allocation
page read and write
255AECFE000
heap
page read and write
2F219FF000
stack
page read and write
255B4200000
heap
page read and write
9FA9BFC000
stack
page read and write
1ADFB340000
heap
page read and write
255B42FA000
heap
page read and write
2332FF75000
heap
page read and write
225CCA05000
heap
page read and write
255B44F0000
trusted library allocation
page read and write
22C58E02000
heap
page read and write
200F4E4D000
heap
page read and write
2332FBC0000
heap
page read and write
7FFC73A93000
unkown
page read and write
245F1ED0000
heap
page read and write
200F4E40000
heap
page read and write
1642F659000
heap
page read and write
225CC620000
heap
page read and write
1ADFB51D000
heap
page read and write
22C58C20000
heap
page read and write
255B4240000
heap
page read and write
255AED02000
heap
page read and write
2F214FE000
stack
page read and write
1997BCB0000
heap
page read and write
255AF518000
heap
page read and write
20E0000
heap
page read and write
1642F613000
heap
page read and write
9FAA57C000
stack
page read and write
255B41F0000
trusted library allocation
page read and write
255B42E5000
heap
page read and write
17559B13000
heap
page read and write
245F1EC1000
heap
page read and write
25A4F050000
heap
page read and write
245F1E3E000
heap
page read and write
200F4E3D000
heap
page read and write
700000
direct allocation
page execute and read and write
1997BCD0000
heap
page read and write
1997BD16000
heap
page read and write
785000
heap
page read and write
255B4520000
trusted library allocation
page read and write
17559A13000
heap
page read and write
255B41F0000
trusted library allocation
page read and write
7FFC739F0000
unkown
page readonly
1CADF5F0000
heap
page read and write
17559A02000
heap
page read and write
255AED14000
heap
page read and write
255B42A8000
heap
page read and write
6E876EC000
stack
page read and write
200F4E63000
heap
page read and write
1997BD1E000
heap
page read and write
255AEC8D000
heap
page read and write
200F4E3E000
heap
page read and write
17559A79000
heap
page read and write
1997C880000
trusted library allocation
page read and write
22C58E13000
heap
page read and write
A6C573B000
stack
page read and write
1642F5A0000
remote allocation
page read and write
1997BD42000
heap
page read and write
1CADF602000
heap
page read and write
255AF513000
heap
page read and write
200F4E79000
heap
page read and write
225CC780000
heap
page read and write
1997C886000
trusted library allocation
page read and write
2332FC17000
heap
page read and write
7FFC73A93000
unkown
page read and write
AF36CFE000
stack
page read and write
17559B00000
heap
page read and write
255B4424000
trusted library allocation
page read and write
1997BEC9000
heap
page read and write
EC4BBFE000
stack
page read and write
7FFC739F0000
unkown
page readonly
255B4500000
trusted library allocation
page read and write
1CADF713000
heap
page read and write
200F4CC0000
heap
page read and write
1642F63E000
heap
page read and write
7FFC73A96000
unkown
page readonly
255B4540000
remote allocation
page read and write
255B4265000
heap
page read and write
255AEC94000
heap
page read and write
408FD7E000
stack
page read and write
6C0000
heap
page read and write
245F1F13000
heap
page read and write
E4F32FA000
stack
page read and write
22C58E3D000
heap
page read and write
1642F5A0000
remote allocation
page read and write
200F4E69000
heap
page read and write
EC4BAFE000
stack
page read and write
9FAA47B000
stack
page read and write
255E92C0000
heap
page read and write
255B4420000
trusted library allocation
page read and write
2F20F4C000
stack
page read and write
255B41E0000
trusted library allocation
page read and write
408F87B000
stack
page read and write
255B42AA000
heap
page read and write
1997BD1E000
heap
page read and write
6E4727E000
stack
page read and write
E4F2E7C000
stack
page read and write
255AEC58000
heap
page read and write
200F4E7D000
heap
page read and write
2F218FE000
stack
page read and write
200F4E48000
heap
page read and write
6E4737B000
stack
page read and write
200F4E4B000
heap
page read and write
200F4E51000
heap
page read and write
7FFC739F0000
unkown
page readonly
1CADF600000
heap
page read and write
1CADF643000
heap
page read and write
200F4E29000
heap
page read and write
7FFC73A81000
unkown
page readonly
245F1DC0000
heap
page read and write
25A4F200000
heap
page read and write
255AED07000
heap
page read and write
1997CB40000
trusted library allocation
page read and write
AF369FB000
stack
page read and write
2F21AFF000
stack
page read and write
25A4EE10000
heap
page read and write
1997BD42000
heap
page read and write
9FAA27E000
stack
page read and write
44FE47D000
stack
page read and write
255AEC7C000
heap
page read and write
255B5000000
heap
page read and write
17559970000
heap
page read and write
255E9019000
heap
page read and write
17559910000
heap
page read and write
255B44C0000
trusted library allocation
page read and write
245F2602000
heap
page read and write
200F4E6F000
heap
page read and write
225CC760000
heap
page read and write
255B4302000
heap
page read and write
1755A202000
trusted library allocation
page read and write
1CADF629000
heap
page read and write
1997BEB0000
trusted library allocation
page read and write
200F4E33000
heap
page read and write
25A4EF6E000
heap
page read and write
255E8F80000
direct allocation
page execute and read and write
255AF500000
heap
page read and write
245F1EE2000
heap
page read and write
EC4BDFE000
stack
page read and write
255B41E0000
trusted library allocation
page read and write
22C58C10000
heap
page read and write
1CADF590000
heap
page read and write
22C58F02000
heap
page read and write
2F21CFE000
stack
page read and write
225CC7D0000
direct allocation
page execute and read and write
255AEC7A000
heap
page read and write
1ADFB510000
heap
page read and write
EC4B87B000
stack
page read and write
1642F4D0000
heap
page read and write
9FAA77D000
stack
page read and write
6E47179000
stack
page read and write
AF3707F000
stack
page read and write
255B40C0000
trusted library allocation
page read and write
22C59602000
trusted library allocation
page read and write
255B4510000
trusted library allocation
page read and write
245F1D50000
heap
page read and write
255B44B0000
trusted library allocation
page read and write
1ADFB480000
heap
page read and write
AF36EFF000
stack
page read and write
7FFC73A81000
unkown
page readonly
200F4E80000
heap
page read and write
E4F35FB000
stack
page read and write
225CCA00000
heap
page read and write
1997BEC0000
heap
page read and write
22C58E50000
heap
page read and write
255B4408000
trusted library allocation
page read and write
255B4540000
remote allocation
page read and write
200F5480000
trusted library allocation
page read and write
17559A6B000
heap
page read and write
1642F600000
heap
page read and write
1642F602000
heap
page read and write
1997CAD0000
heap
page readonly
1997BB70000
heap
page read and write
1CADF63D000
heap
page read and write
44FE0FC000
stack
page read and write
255AED02000
heap
page read and write
1CADFD50000
trusted library allocation
page read and write
1642F65F000
heap
page read and write
255AEB20000
heap
page read and write
200F4E13000
heap
page read and write
7FFC73A93000
unkown
page read and write
255E8F30000
heap
page read and write
7FFC739F0000
unkown
page readonly
1997BD1D000
heap
page read and write
200F4E6C000
heap
page read and write
25A4F205000
heap
page read and write
245F1E88000
heap
page read and write
225CC848000
heap
page read and write
255AEC9F000
heap
page read and write
EC4B8FE000
stack
page read and write
17559900000
heap
page read and write
1997BE50000
trusted library allocation
page read and write
200F4E86000
heap
page read and write
255AF400000
heap
page read and write
200F4E42000
heap
page read and write
255B4306000
heap
page read and write
255AECFE000
heap
page read and write
255B4424000
trusted library allocation
page read and write
7FFC739F0000
unkown
page readonly
17559A28000
heap
page read and write
17559B02000
heap
page read and write
44FE37E000
stack
page read and write
1642F540000
heap
page read and write
245F1E13000
heap
page read and write
255AEBB0000
trusted library allocation
page read and write
255AF502000
heap
page read and write
17559A74000
heap
page read and write
17559A3C000
heap
page read and write
255B4421000
trusted library allocation
page read and write
255AEC13000
heap
page read and write
6E471F9000
stack
page read and write
1CADF65A000
heap
page read and write
E4F2EFF000
stack
page read and write
255B424D000
heap
page read and write
1CADFD70000
trusted library allocation
page read and write
2332FE00000
unkown
page execute and read and write
255B44B0000
trusted library allocation
page read and write
255AF3B1000
trusted library allocation
page read and write
44FDBDB000
stack
page read and write
255B4630000
trusted library allocation
page read and write
245F1ED2000
heap
page read and write
200F4E64000
heap
page read and write
25A4F070000
heap
page read and write
255B40D0000
trusted library allocation
page read and write
59341BC000
stack
page read and write
255AECAF000
heap
page read and write
255B4540000
remote allocation
page read and write
1997BDD0000
heap
page read and write
408FC7B000
stack
page read and write
E4F34FB000
stack
page read and write
200F4E6D000
heap
page read and write
1997BD1D000
heap
page read and write
1CADFE02000
trusted library allocation
page read and write
255E9000000
heap
page read and write
7FFC73A96000
unkown
page readonly
255B4258000
heap
page read and write
255AEC23000
heap
page read and write
255E8F10000
heap
page read and write
255AEC29000
heap
page read and write
6E472F9000
stack
page read and write
AF36C7B000
stack
page read and write
200F4F02000
heap
page read and write
255AF402000
heap
page read and write
1997BD3D000
heap
page read and write
1642F570000
trusted library allocation
page read and write
25A4F0C0000
direct allocation
page execute and read and write
200F4E44000
heap
page read and write
2332FBE0000
heap
page read and write
255AEB10000
heap
page read and write
7FFC73A93000
unkown
page read and write
408FB7B000
stack
page read and write
9FAA2FC000
stack
page read and write
1997BCE0000
heap
page read and write
255AF504000
heap
page read and write
255B422F000
heap
page read and write
200F5602000
trusted library allocation
page read and write
2F217FD000
stack
page read and write
22C58C80000
heap
page read and write
7FFC73A81000
unkown
page readonly
255B440E000
trusted library allocation
page read and write
255AEB80000
heap
page read and write
1997BED0000
trusted library allocation
page read and write
255AEC00000
heap
page read and write
200F4E4A000
heap
page read and write
1CADF613000
heap
page read and write
1ADFB4B0000
unkown
page execute and read and write
255B42B1000
heap
page read and write
EC4B97E000
stack
page read and write
1997CAE0000
trusted library allocation
page read and write
255B42E2000
heap
page read and write
200F4E50000
heap
page read and write
22C58E00000
heap
page read and write
200F4E62000
heap
page read and write
9FAA3FD000
stack
page read and write
255E8DD0000
heap
page read and write
1997BE40000
trusted library allocation
page read and write
1CADF62F000
heap
page read and write
E4F33FE000
stack
page read and write
200F4E43000
heap
page read and write
200F4D20000
heap
page read and write
255AF3D3000
trusted library allocation
page read and write
200F4E30000
heap
page read and write
1ADFB523000
heap
page read and write
9FAA87E000
stack
page read and write
EC4BCFE000
stack
page read and write
255E92C5000
heap
page read and write
7FFC73A81000
unkown
page readonly
22C58E6E000
heap
page read and write
9B479AC000
stack
page read and write
953C07C000
stack
page read and write
AF36B7E000
stack
page read and write
1D0000
heap
page read and write
1642FE02000
trusted library allocation
page read and write
17559A00000
heap
page read and write
255B44B0000
trusted library allocation
page read and write
2332FB50000
heap
page read and write
255B42E9000
heap
page read and write
7FFC73A93000
unkown
page read and write
7FFC73A96000
unkown
page readonly
1CADF580000
heap
page read and write
255B4400000
trusted library allocation
page read and write
255B0060000
trusted library allocation
page read and write
7FFC739F0000
unkown
page readonly
44FE2FD000
stack
page read and write
255AF3E0000
trusted library allocation
page read and write
255AEC3F000
heap
page read and write
200F4E49000
heap
page read and write
2F21BFF000
stack
page read and write
1997CAF0000
trusted library allocation
page read and write
7FFC73A81000
unkown
page readonly
1997BEC5000
heap
page read and write
22C58E64000
heap
page read and write
2332FC10000
heap
page read and write
E4F3BFF000
stack
page read and write
22C58D80000
trusted library allocation
page read and write
7FFC73A96000
unkown
page readonly
200F4E7C000
heap
page read and write
7FFC73A96000
unkown
page readonly
7FFC73A93000
unkown
page read and write
1642F629000
heap
page read and write
1CADF652000
heap
page read and write
AF36DFA000
stack
page read and write
200F4E3C000
heap
page read and write
255AEC77000
heap
page read and write
6E46DCC000
stack
page read and write
1997CAC0000
trusted library allocation
page read and write
200F4E00000
heap
page read and write
245F2714000
heap
page read and write
255B4300000
heap
page read and write
22C58E29000
heap
page read and write
255B4400000
trusted library allocation
page read and write
200F4E31000
heap
page read and write
22C58E76000
heap
page read and write
255B4308000
heap
page read and write
E4F39F9000
stack
page read and write
9FAA1FB000
stack
page read and write
780000
heap
page read and write
200F4CB0000
heap
page read and write
245F1F02000
heap
page read and write
245F1D60000
heap
page read and write
22C58F13000
heap
page read and write
255AF415000
heap
page read and write
225CC840000
heap
page read and write
25A4EF5B000
heap
page read and write
5A0000
heap
page read and write
255B4221000
heap
page read and write
255B41F0000
trusted library allocation
page read and write
255B4217000
heap
page read and write
E4F31FD000
stack
page read and write
1642F5A0000
remote allocation
page read and write
255AF3F0000
trusted library allocation
page read and write
E4F3077000
stack
page read and write
175599A0000
trusted library allocation
page read and write
255AF518000
heap
page read and write
255AFBE0000
trusted library allocation
page read and write
25A4EF50000
heap
page read and write
2332FC2E000
heap
page read and write
44FE07C000
stack
page read and write
245F2700000
heap
page read and write
2332FF70000
heap
page read and write
2F2137B000
stack
page read and write
200F4E46000
heap
page read and write
1997BB80000
trusted library allocation
page read and write
1CADF700000
heap
page read and write
255AEC72000
heap
page read and write
7FFC73A81000
unkown
page readonly
9FA9FFF000
stack
page read and write
49B000
stack
page read and write
1997BD20000
heap
page read and write
6A0000
heap
page read and write
245F1E29000
heap
page read and write
7FFC73A96000
unkown
page readonly
200F4E47000
heap
page read and write
AF3658C000
stack
page read and write
5AB000
heap
page read and write
245F1E00000
heap
page read and write
1ADFB536000
heap
page read and write
1642F702000
heap
page read and write
44FE5FC000
stack
page read and write
17559A56000
heap
page read and write
255AF3D0000
trusted library allocation
page read and write
1642F4E0000
heap
page read and write
1CADF702000
heap
page read and write
1997BCD8000
heap
page read and write
245F1E6E000
heap
page read and write
255E900B000
heap
page read and write
255B4650000
trusted library allocation
page read and write
2F215FC000
stack
page read and write
22C58E65000
heap
page read and write
There are 384 hidden memdumps, click here to show them.