IOC Report
VGPINVPA.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\VGPINVPA.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\VGPINVPA.dll",#1
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\VGPINVPA.dll,AllocConsole
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\VGPINVPA.dll",#1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\VGPINVPA.dll,GetConsoleCP
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\VGPINVPA.dll,GetConsoleMode
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\VGPINVPA.dll",AllocConsole
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\VGPINVPA.dll",GetConsoleCP
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\VGPINVPA.dll",GetConsoleMode
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\VGPINVPA.dll",GetConsoleOutputCP
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\VGPINVPA.dll",GetNumberOfConsoleInputEvents
There are 5 hidden processes, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1CD05279000
heap
page read and write
1792DBD0000
remote allocation
page read and write
1792C248000
heap
page read and write
19A3A080000
heap
page read and write
2A9C42F0000
heap
page read and write
1DC43609000
heap
page read and write
1EBE8C02000
heap
page read and write
C97E87B000
stack
page read and write
1CD05262000
heap
page read and write
1792C213000
heap
page read and write
1792C302000
heap
page read and write
19A3A010000
heap
page read and write
1792C202000
heap
page read and write
17B6FDF000
stack
page read and write
1CD05140000
heap
page read and write
227D6200000
heap
page read and write
1792C258000
heap
page read and write
1EBE8B95000
heap
page read and write
1D31A7E0000
heap
page read and write
E126F9F000
stack
page read and write
D594EFF000
stack
page read and write
227D6257000
heap
page read and write
1CD05264000
heap
page read and write
1838F302000
heap
page read and write
2122AF70000
trusted library allocation
page read and write
9874BFD000
stack
page read and write
2A9C4520000
heap
page read and write
27447390000
heap
page read and write
2A9C4585000
heap
page read and write
14D070A0000
heap
page read and write
1F83EFF000
stack
page read and write
750917F000
stack
page read and write
A4FFF7D000
stack
page read and write
1912C813000
heap
page read and write
227D6277000
heap
page read and write
1E960720000
heap
page read and write
1CD05275000
heap
page read and write
A4FFB7C000
stack
page read and write
1DE3AC40000
heap
page read and write
1CD0525C000
heap
page read and write
C97EDFF000
stack
page read and write
1D31A6A0000
heap
page read and write
1912C802000
heap
page read and write
1792DE40000
trusted library allocation
page read and write
7D97FDF000
stack
page read and write
2122AFA0000
remote allocation
page read and write
5FED3DC000
stack
page read and write
1E960400000
heap
page read and write
1792DBD0000
remote allocation
page read and write
227D6271000
heap
page read and write
1CD05229000
heap
page read and write
1DC45080000
heap
page read and write
31938FF000
stack
page read and write
1EBE8BB0000
heap
page read and write
19A3A2F0000
heap
page read and write
1912C861000
heap
page read and write
D594FFF000
stack
page read and write
27447660000
heap
page read and write
14D07200000
heap
page read and write
D59477B000
stack
page read and write
1838F2BD000
heap
page read and write
1912C843000
heap
page read and write
1CD0524E000
heap
page read and write
1D31A868000
heap
page read and write
17B6EDC000
stack
page read and write
1CD0525F000
heap
page read and write
19A3A0D0000
heap
page read and write
B5BA4FF000
stack
page read and write
1CD05233000
heap
page read and write
1D6CF150000
heap
page read and write
1B8C9F35000
heap
page read and write
1912C913000
heap
page read and write
19A3A0A0000
heap
page read and write
1792DBA0000
trusted library allocation
page read and write
1792C240000
heap
page read and write
1F840FD000
stack
page read and write
5FEDF7C000
stack
page read and write
1912C83C000
heap
page read and write
1838F213000
heap
page read and write
1EBE8950000
heap
page read and write
1792C248000
heap
page read and write
2122B000000
heap
page read and write
1CD05A02000
trusted library allocation
page read and write
27447320000
heap
page read and write
1B8C9CC0000
heap
page read and write
D594DFF000
stack
page read and write
1D31A800000
heap
page read and write
1F841FE000
stack
page read and write
38678FF000
stack
page read and write
1DE3AE02000
heap
page read and write
E12727F000
stack
page read and write
1912C858000
heap
page read and write
1792C22A000
heap
page read and write
1DC43570000
heap
page read and write
1CD05263000
heap
page read and write
1D31C210000
heap
page read and write
C97EBFE000
stack
page read and write
1838F2CE000
heap
page read and write
1EBE8960000
trusted library allocation
page read and write
14D07230000
heap
page read and write
1CD0523D000
heap
page read and write
1CD05241000
heap
page read and write
1DE3AF00000
heap
page read and write
A4FFE7F000
stack
page read and write
B5BA1BC000
stack
page read and write
1CD05244000
heap
page read and write
274473B0000
heap
page read and write
1EBE8B90000
heap
page read and write
1792C224000
heap
page read and write
1838FA02000
heap
page read and write
38679FB000
stack
page read and write
31935EC000
stack
page read and write
1DE3ADA0000
trusted library allocation
page read and write
353A5AC000
stack
page read and write
353A87F000
stack
page read and write
1792C247000
heap
page read and write
1838F313000
heap
page read and write
93E907F000
stack
page read and write
1912CE02000
trusted library allocation
page read and write
1CD0523B000
heap
page read and write
1CD05260000
heap
page read and write
1CD05246000
heap
page read and write
1CD0526A000
heap
page read and write
1E9604C0000
heap
page read and write
1838F2E2000
heap
page read and write
1EBE98D0000
trusted library allocation
page read and write
1838F28B000
heap
page read and write
1792C318000
heap
page read and write
2122AED0000
heap
page read and write
C97EAFE000
stack
page read and write
1B8C9CCB000
heap
page read and write
AF0317E000
stack
page read and write
1CD05200000
heap
page read and write
A4FFBFE000
stack
page read and write
2122B03C000
heap
page read and write
227D623C000
heap
page read and write
1CD05274000
heap
page read and write
227D6020000
heap
page read and write
319387E000
stack
page read and write
1912C902000
heap
page read and write
1912C829000
heap
page read and write
1DC43430000
heap
page read and write
AF02F7E000
stack
page read and write
1CD05213000
heap
page read and write
229817D0000
heap
page read and write
1CD05245000
heap
page read and write
14D07420000
heap
page read and write
AF0293B000
stack
page read and write
1838FB3A000
heap
page read and write
1CD05257000
heap
page read and write
1EBE9650000
trusted library allocation
page read and write
1912C7D0000
trusted library allocation
page read and write
D5949FD000
stack
page read and write
1DC435F0000
heap
page read and write
7D97F5E000
stack
page read and write
1D31AB40000
heap
page read and write
A4FF77F000
stack
page read and write
5FEDD7C000
stack
page read and write
1EBE9660000
trusted library allocation
page read and write
1792C1E0000
trusted library allocation
page read and write
5FEDE7F000
stack
page read and write
1B8C9C90000
heap
page read and write
1EBE98B0000
heap
page readonly
1EBE8BEE000
heap
page read and write
1792C300000
heap
page read and write
1B8C9CD1000
heap
page read and write
1792DE00000
trusted library allocation
page read and write
1DC437A0000
heap
page read and write
1792C080000
heap
page read and write
1DC437A5000
heap
page read and write
1912C5A0000
heap
page read and write
274473DB000
heap
page read and write
1B8C9F30000
heap
page read and write
1DE3AE3E000
heap
page read and write
227D625B000
heap
page read and write
1792C258000
heap
page read and write
227D6269000
heap
page read and write
1792C313000
heap
page read and write
1EBE8B30000
trusted library allocation
page read and write
A4FF6FC000
stack
page read and write
1838F0A0000
heap
page read and write
E28138C000
stack
page read and write
1D31A879000
heap
page read and write
1F8375B000
stack
page read and write
1838F2C4000
heap
page read and write
227D6A02000
trusted library allocation
page read and write
1D6CF0C0000
heap
page read and write
1DE3AF02000
heap
page read and write
1792DBD0000
remote allocation
page read and write
3867A7E000
stack
page read and write
1912C865000
heap
page read and write
1F83DFE000
stack
page read and write
1912C590000
heap
page read and write
1838F229000
heap
page read and write
1CD05261000
heap
page read and write
1D31AB45000
heap
page read and write
3867B7F000
stack
page read and write
229815D3000
heap
page read and write
2A9C4339000
heap
page read and write
D5950FF000
stack
page read and write
1838F200000
heap
page read and write
1B8C9CCE000
heap
page read and write
227D6010000
heap
page read and write
1792C289000
heap
page read and write
1CD051B0000
heap
page read and write
B5BA47F000
stack
page read and write
1838F286000
heap
page read and write
1CD05265000
heap
page read and write
1912C84E000
heap
page read and write
1838FB13000
heap
page read and write
1EBE8A90000
heap
page read and write
5FEDA7F000
stack
page read and write
1838F26E000
heap
page read and write
1EBE8BEE000
heap
page read and write
1792C0E0000
heap
page read and write
1D6CF159000
heap
page read and write
1CD05259000
heap
page read and write
D5948FD000
stack
page read and write
1CD05284000
heap
page read and write
1792C257000
heap
page read and write
1DE3AE51000
heap
page read and write
227D626A000
heap
page read and write
1792DC02000
trusted library allocation
page read and write
1E9602A0000
heap
page read and write
93E90FF000
stack
page read and write
14D07239000
heap
page read and write
2122AEE0000
heap
page read and write
1CD0526D000
heap
page read and write
2A9C4420000
heap
page read and write
227D623F000
heap
page read and write
5FEDC7B000
stack
page read and write
7508CBC000
stack
page read and write
1838F243000
heap
page read and write
227D6080000
heap
page read and write
1EBE8BE6000
heap
page read and write
1DE3B602000
trusted library allocation
page read and write
1912C850000
heap
page read and write
D59435B000
stack
page read and write
1CD0526B000
heap
page read and write
14D07425000
heap
page read and write
386732B000
stack
page read and write
D594CFF000
stack
page read and write
1EBE8BE7000
heap
page read and write
1838F0B0000
heap
page read and write
AF0307E000
stack
page read and write
1DE3AE79000
heap
page read and write
5FEDBFE000
stack
page read and write
1E960640000
heap
page read and write
1EBE8AB0000
heap
page read and write
E126F1C000
stack
page read and write
1EBE8BA0000
heap
page read and write
227D6202000
heap
page read and write
1838F264000
heap
page read and write
14D08D60000
heap
page read and write
7508DBF000
stack
page read and write
1F83FFC000
stack
page read and write
1DC43590000
heap
page read and write
B63987C000
stack
page read and write
19A3A0D8000
heap
page read and write
1EBE8BA8000
heap
page read and write
1F842FC000
stack
page read and write
C97E97E000
stack
page read and write
1E9603E0000
heap
page read and write
1CD05232000
heap
page read and write
1CD0527B000
heap
page read and write
2122AFA0000
remote allocation
page read and write
229814E0000
heap
page read and write
5FEE07F000
stack
page read and write
19A3A0DE000
heap
page read and write
1838F266000
heap
page read and write
386777B000
stack
page read and write
1CD0527A000
heap
page read and write
1EBE8CA0000
trusted library allocation
page read and write
D594BFD000
stack
page read and write
227D6213000
heap
page read and write
C97E8FE000
stack
page read and write
1CD05240000
heap
page read and write
1EBE8BEE000
heap
page read and write
75090F9000
stack
page read and write
1CD05258000
heap
page read and write
14D07249000
heap
page read and write
C97ECFE000
stack
page read and write
2122AF40000
heap
page read and write
1DE3AE00000
heap
page read and write
1CD0526F000
heap
page read and write
7509079000
stack
page read and write
19A3A380000
heap
page read and write
5FEDAFC000
stack
page read and write
227D6180000
trusted library allocation
page read and write
353A8FF000
stack
page read and write
1F83CFE000
stack
page read and write
1CD05302000
heap
page read and write
1792C070000
heap
page read and write
227D6302000
heap
page read and write
3867DFF000
stack
page read and write
1D6CF425000
heap
page read and write
2122B802000
trusted library allocation
page read and write
1D6D0DB0000
heap
page read and write
1CD051E0000
trusted library allocation
page read and write
1838F110000
heap
page read and write
1E960725000
heap
page read and write
274473D0000
heap
page read and write
1838F2CB000
heap
page read and write
1CD05267000
heap
page read and write
93E8DCC000
stack
page read and write
2122AFA0000
remote allocation
page read and write
1792C262000
heap
page read and write
1B8C9C70000
heap
page read and write
1DE3AC30000
heap
page read and write
7D97EDC000
stack
page read and write
1912C900000
heap
page read and write
1DE3AE13000
heap
page read and write
17B6F5F000
stack
page read and write
1912C800000
heap
page read and write
1912C864000
heap
page read and write
5FED7FC000
stack
page read and write
B63997F000
stack
page read and write
1CD05150000
heap
page read and write
1B8CB8B0000
heap
page read and write
7508D3E000
stack
page read and write
1EBE9920000
trusted library allocation
page read and write
1D6CF420000
heap
page read and write
2A9C41B0000
heap
page read and write
1EBE98C0000
trusted library allocation
page read and write
1912CD90000
trusted library allocation
page read and write
1DE3AE28000
heap
page read and write
1DE3AE6C000
heap
page read and write
1D31A860000
heap
page read and write
5FED97E000
stack
page read and write
1838F870000
trusted library allocation
page read and write
1912C600000
heap
page read and write
1CD0525A000
heap
page read and write
1838FB00000
heap
page read and write
E28167F000
stack
page read and write
1CD05247000
heap
page read and write
1EBE8B20000
trusted library allocation
page read and write
227D622A000
heap
page read and write
A4FFCFE000
stack
page read and write
229815CD000
heap
page read and write
1CD05242000
heap
page read and write
75091F9000
stack
page read and write
1EBE98A0000
trusted library allocation
page read and write
B6398FF000
stack
page read and write
1792C200000
heap
page read and write
1DC435F9000
heap
page read and write
2122B102000
heap
page read and write
2122B002000
heap
page read and write
229814C0000
heap
page read and write
229815C0000
heap
page read and write
2122B051000
heap
page read and write
27447665000
heap
page read and write
1EBE8B99000
heap
page read and write
19A3A385000
heap
page read and write
227D6272000
heap
page read and write
1E9604C9000
heap
page read and write
2A9C4328000
heap
page read and write
3867C7A000
stack
page read and write
19A3A0E9000
heap
page read and write
2122B029000
heap
page read and write
227D6313000
heap
page read and write
E2816FE000
stack
page read and write
14D071E0000
heap
page read and write
2A9C4320000
heap
page read and write
1CD0527D000
heap
page read and write
1DE3AF13000
heap
page read and write
1E9604D9000
heap
page read and write
AF02E7B000
stack
page read and write
1D6CF320000
heap
page read and write
2A9C4580000
heap
page read and write
1B8C9C00000
heap
page read and write
22981380000
heap
page read and write
1CD0527E000
heap
page read and write
1CD05268000
heap
page read and write
1792C27F000
heap
page read and write
1D6CF130000
heap
page read and write
1912C876000
heap
page read and write
2122B013000
heap
page read and write
1DE3ACA0000
heap
page read and write
27448EA0000
heap
page read and write
A4FFDFD000
stack
page read and write
There are 370 hidden memdumps, click here to show them.