IOC Report
y2D56.tmp.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\y2D56.tmp.dll,JfUksQmDGYQRSQfC
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\y2D56.tmp.dll,MVeMOgOlu
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\y2D56.tmp.dll,OnqcowdLVOpj
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",JfUksQmDGYQRSQfC
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",MVeMOgOlu
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",OnqcowdLVOpj
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",aXXRQNg
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",agetCYHzlW
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\y2D56.tmp.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",#1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
alexbionka.com
malicious
http://alexbionka.com/QpkO
unknown
malicious
http://alexbionka.com/
64.227.108.27
malicious
http://alexbionka.com/UN
unknown
malicious
http://alexbionka.com:80/h
unknown
malicious

Domains

Name
IP
Malicious
alexbionka.com
64.227.108.27
malicious

IPs

IP
Domain
Country
Malicious
64.227.108.27
alexbionka.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
212820D0000
heap
page read and write
malicious
212802D9000
heap
page read and write
malicious
24B54615000
heap
page read and write
2E958910000
heap
page read and write
D5B87C000
stack
page read and write
21282104000
heap
page read and write
1FA56649000
heap
page read and write
2261E3C0000
heap
page read and write
E43DB9F000
stack
page read and write
8BD03FC000
stack
page read and write
21281D00000
unclassified section
page execute and read and write
2261E280000
heap
page read and write
24B54370000
heap
page read and write
D5B8FE000
stack
page read and write
21280250000
heap
page read and write
212803BA000
heap
page read and write
21280255000
heap
page read and write
1F590C00000
heap
page read and write
26C54510000
heap
page read and write
1FA56950000
heap
page read and write
AF6257F000
stack
page read and write
2261E435000
heap
page read and write
257E2BD0000
heap
page read and write
257E2C25000
heap
page read and write
1CA96D80000
heap
page read and write
180006000
direct allocation
page readonly
2261E469000
heap
page read and write
20499E30000
heap
page read and write
FEF73FE000
stack
page read and write
257E2C20000
heap
page read and write
24B542E0000
heap
page read and write
24B55FA0000
heap
page read and write
26C54580000
heap
page read and write
1FA56610000
heap
page read and write
1F35F7C000
stack
page read and write
2E9589BD000
heap
page read and write
1F590F00000
heap
page read and write
1CA97045000
heap
page read and write
FEF74FF000
stack
page read and write
26C5432A000
heap
page read and write
AF624FE000
stack
page read and write
24B54378000
heap
page read and write
1CA96FF0000
heap
page read and write
DCB2E7F000
stack
page read and write
2E958990000
heap
page read and write
2049BA30000
heap
page read and write
1FA565A0000
heap
page read and write
1F35FFC000
stack
page read and write
AF6247C000
stack
page read and write
E43DA9C000
stack
page read and write
257E2A00000
heap
page read and write
257E28B0000
heap
page read and write
24B542C0000
heap
page read and write
71D26FF000
stack
page read and write
852FEFF000
stack
page read and write
21281D30000
remote allocation
page read and write
1F35B3C000
stack
page read and write
20499EE0000
heap
page read and write
21280260000
heap
page read and write
852FE7C000
stack
page read and write
20499ED0000
heap
page read and write
21281D30000
remote allocation
page read and write
1F590DA9000
heap
page read and write
180004000
direct allocation
page readonly
1F35BBE000
stack
page read and write
7FFA65C50000
unkown
page readonly
7FFA65CA9000
unkown
page readonly
D5B97E000
stack
page read and write
180008000
direct allocation
page read and write
26C542B0000
heap
page read and write
1FA56920000
heap
page read and write
20499ED5000
heap
page read and write
1F590D40000
heap
page read and write
212801B0000
heap
page read and write
24B54250000
heap
page read and write
257E2B20000
heap
page read and write
21280220000
heap
page read and write
2261E430000
heap
page read and write
1CA96E09000
heap
page read and write
1FA56955000
heap
page read and write
2E9589C3000
heap
page read and write
1CA97040000
heap
page read and write
212802D0000
heap
page read and write
21281D80000
heap
page read and write
8BD06FF000
stack
page read and write
24B54610000
heap
page read and write
2E958940000
heap
page read and write
1FA56640000
heap
page read and write
2261E3E0000
heap
page read and write
DCB2BCE000
stack
page read and write
FEF72FD000
stack
page read and write
E43DB1E000
stack
page read and write
71D267C000
stack
page read and write
1F590D60000
heap
page read and write
2E9589B0000
heap
page read and write
A804EAC000
stack
page read and write
257E2A08000
heap
page read and write
1FA56810000
heap
page read and write
2261E460000
heap
page read and write
26C54585000
heap
page read and write
26C544F0000
heap
page read and write
212803B4000
heap
page read and write
1F590DA0000
heap
page read and write
2261FE70000
heap
page read and write
20499F60000
heap
page read and write
7FFA65C51000
unkown
page execute read
2E9587D0000
heap
page read and write
1F592890000
heap
page read and write
26C55DA0000
heap
page read and write
852FF7E000
stack
page read and write
1F35E7F000
stack
page read and write
DCB2B4C000
stack
page read and write
180000000
direct allocation
page read and write
71D277F000
stack
page read and write
A804F2F000
stack
page read and write
1CA96FD0000
heap
page read and write
21281D30000
remote allocation
page read and write
1CA96E00000
heap
page read and write
257E2B00000
heap
page read and write
8BD067F000
stack
page read and write
E43DE7F000
stack
page read and write
26C54320000
heap
page read and write
20499F69000
heap
page read and write
1CA98940000
heap
page read and write
20499EA0000
heap
page read and write
180001000
direct allocation
page execute read
1F590F05000
heap
page read and write
There are 117 hidden memdumps, click here to show them.