IOC Report
ijexogdf64.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,JdXfbK
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,MDlQdmktXg
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,VejwwBbES
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",JdXfbK
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",MDlQdmktXg
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",VejwwBbES
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",XeZsfh
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",YqufWwLNu
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\ijexogdf64.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
peranistaer.top
malicious
ultomductingbig.pro
malicious
klareqvino.com
malicious
gruvihabralo.nl
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
18E2E579000
heap
page read and write
malicious
180001000
direct allocation
page execute read
malicious
433177C000
stack
page read and write
6B47C7E000
stack
page read and write
1893FCF0000
heap
page read and write
2DFCE2E0000
heap
page read and write
2DFCDFD0000
heap
page read and write
4B2DC7E000
stack
page read and write
432027F000
stack
page read and write
23CA23C0000
trusted library allocation
page read and write
1AE77E10000
heap
page read and write
6B4758E000
stack
page read and write
FD8A47E000
stack
page read and write
23CA247F000
heap
page read and write
23CA2513000
heap
page read and write
23CA2462000
heap
page read and write
244E0980000
heap
page read and write
23CA2500000
heap
page read and write
232B71C0000
heap
page read and write
16798C03000
heap
page read and write
244E08B0000
heap
page read and write
23CA2320000
heap
page read and write
244E0998000
heap
page read and write
232B8C80000
heap
page read and write
6B4797B000
stack
page read and write
8DFFDFE000
stack
page read and write
210CD920000
heap
page read and write
23CA2448000
heap
page read and write
232B71C8000
heap
page read and write
7FFFF0311000
unkown
page execute read
232B7140000
heap
page read and write
BBB3DAE000
stack
page read and write
1AE797B0000
heap
page read and write
210CDAE0000
heap
page read and write
16798F30000
heap
page read and write
232B7160000
heap
page read and write
232B7400000
heap
page read and write
18E2E64C000
heap
page read and write
2B7682D0000
heap
page read and write
1893E108000
heap
page read and write
BEDA94C000
stack
page read and write
BBB3D2C000
stack
page read and write
23CA2465000
heap
page read and write
F0DD97E000
stack
page read and write
1AE77AC8000
heap
page read and write
1AE77E15000
heap
page read and write
2B7683F0000
heap
page read and write
14802325000
heap
page read and write
23CA2E02000
trusted library allocation
page read and write
6B4750B000
stack
page read and write
1AE77A40000
heap
page read and write
23CA2400000
heap
page read and write
431FF9F000
stack
page read and write
23CA2454000
heap
page read and write
18E2E865000
heap
page read and write
232B7405000
heap
page read and write
2B768160000
heap
page read and write
232B70D0000
heap
page read and write
23CA2429000
heap
page read and write
23CA243C000
heap
page read and write
23CA2330000
heap
page read and write
23CA2502000
heap
page read and write
4B2D9EC000
stack
page read and write
18E2E570000
heap
page read and write
14802039000
heap
page read and write
2B7683F5000
heap
page read and write
1893E070000
heap
page read and write
2B768168000
heap
page read and write
210CF650000
heap
page read and write
1AE77A20000
heap
page read and write
1AE77AC0000
heap
page read and write
16798BFD000
heap
page read and write
14801F20000
heap
page read and write
18E2E550000
heap
page read and write
1893E000000
heap
page read and write
7FFFF0365000
unkown
page readonly
2DFCDE90000
heap
page read and write
BBB407E000
stack
page read and write
1AE779B0000
heap
page read and write
210CDD45000
heap
page read and write
18E2E530000
heap
page read and write
14802320000
heap
page read and write
8DFFD7C000
stack
page read and write
23CA2461000
heap
page read and write
244E0990000
heap
page read and write
14802030000
heap
page read and write
7FFFF0310000
unkown
page readonly
210CDA60000
heap
page read and write
14803C50000
heap
page read and write
2DFCE2E5000
heap
page read and write
23CA249B000
heap
page read and write
244E08D0000
heap
page read and write
23CA2508000
heap
page read and write
6B47A7B000
stack
page read and write
18E2E850000
heap
page read and write
16798BF0000
heap
page read and write
BEDAC7E000
stack
page read and write
1893E3E5000
heap
page read and write
268047C000
stack
page read and write
18E2E860000
heap
page read and write
2B767FF0000
heap
page read and write
210CDA80000
heap
page read and write
18E2E4C0000
heap
page read and write
2392F5D000
stack
page read and write
FD8A4FF000
stack
page read and write
4B2DCFE000
stack
page read and write
8D8007E000
stack
page read and write
14801F90000
heap
page read and write
2DFCE0F0000
heap
page read and write
1893E100000
heap
page read and write
2DFCDFD8000
heap
page read and write
1893E3E0000
heap
page read and write
14801FB0000
heap
page read and write
2DFCE0D0000
heap
page read and write
268057F000
stack
page read and write
23CA2390000
heap
page read and write
431FF1C000
stack
page read and write
23CA245F000
heap
page read and write
6B47B77000
stack
page read and write
18E30360000
unclassified section
page execute and read and write
2DFCFA80000
heap
page read and write
F0DD8FE000
stack
page read and write
FD8A1AC000
stack
page read and write
1893E090000
heap
page read and write
2B768130000
heap
page read and write
180003000
direct allocation
page read and write
244E2310000
heap
page read and write
210CDAE8000
heap
page read and write
244E0985000
heap
page read and write
180000000
direct allocation
page read and write
180002000
direct allocation
page readonly
43317FE000
stack
page read and write
4331A7F000
stack
page read and write
210CDD40000
heap
page read and write
6B4787E000
stack
page read and write
2B768260000
heap
page read and write
23CA2469000
heap
page read and write
16798BA0000
heap
page read and write
16798B70000
heap
page read and write
F0DD87C000
stack
page read and write
26804FF000
stack
page read and write
23CA2413000
heap
page read and write
BEDA9CF000
stack
page read and write
16798B00000
heap
page read and write
244E0770000
heap
page read and write
6B47D7E000
stack
page read and write
There are 136 hidden memdumps, click here to show them.