IOC Report
Dll1.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\Dll1.dll,mydllmain
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\Dll1.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/aclog.txt
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/aclog.txt
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/regit.tmp
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/regit.tmp
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/aclog.txt
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/regit.tmp
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\Dll1.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Dll1.dll",#1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://rammenale.com/for2/aclog
unknown
malicious
https://rammenale.com/for2/regit.tmp
131.153.206.231
malicious
https://rammenale.com/
unknown
malicious
https://rammenale.com/for2/aclog.txt
131.153.206.231
malicious
https://rammenale.com/for2/regit.tmpent
unknown
https://rammenale.com/for2/aclog.txtPR
unknown
https://rammenale.com/M
unknown
https://rammenale.com/for2/aclog.txtJ
unknown
https://rammenale.com/for2/regit.tmp$q
unknown
https://rammenale.com/K
unknown
https://rammenale.com/for2/aclog.txtQ8
unknown
https://rammenale.com/J
unknown
https://rammenale.com/for2/regit.tmpaC:
unknown
https://rammenale.com/for2/regit.tmp%
unknown
https://rammenale.com/for2/aclog.txtO
unknown
https://rammenale.com/for2/aclog.txthe
unknown
https://rammenale.com/for2/aclogI
unknown
https://rammenale.com/for2/aclog.txtPg
unknown
https://rammenale.com/for2/regit.tmp4r
unknown
https://rammenale.com/for2/aclog.txt4J
unknown
https://rammenale.com/for2/regit.tmpryh
unknown
https://rammenale.com/for2/aclog.txtf
unknown
https://rammenale.com/for2/aclog.txte
unknown
https://rammenale.com/for2/regit.tmp.(
unknown
https://rammenale.com/for2/regit.tmp60
unknown
https://rammenale.com/for2/aclog.txtd
unknown
https://rammenale.com/for2/regit.tmpent0
unknown
https://rammenale.com/for2/aclog.txt-
unknown
https://rammenale.com/for2/regit.tmprmh
unknown
https://rammenale.com/for2/aclog.txt(
unknown
https://rammenale.com/for2/aclog.txtag
unknown
https://rammenale.com/for2/aclog.txtent
unknown
https://rammenale.com/for2/aclog.txt4
unknown
https://rammenale.com/for2/aclog.txtentg
unknown
https://rammenale.com/for2/regit.tmpo
unknown
https://rammenale.com/for2/regit.tmpq
unknown
https://rammenale.com/for2/aclog.txt:
unknown
https://rammenale.com/for2/regit.tmpk
unknown
https://rammenale.com/for2/aclog.txt4j
unknown
https://rammenale.com/for2/aclog&
unknown
https://rammenale.com/for2/aclog.txtF
unknown
https://rammenale.com/for2/regit.tmpmpf
unknown
https://rammenale.com/for2/regit.tmpz
unknown
https://rammenale.com/for2/regit.tmps
unknown
https://rammenale.com/for2/regit.tmpt
unknown
https://rammenale.com/for2/regit.tmpC:
unknown
https://rammenale.com/for2/aclog.txt6634-1003
unknown
https://rammenale.com/for2/regit.tmp6634-1003
unknown
https://rammenale.com/for2/aclog.txt4p
unknown
https://rammenale.com/for2/regit.tmph
unknown
https://rammenale.com/for2/aclog.txtentindowsINetCookies
unknown
https://rammenale.com/for2/regit.tmpE0
unknown
https://rammenale.com/for2/regit.tmpj
unknown
https://rammenale.com/R#
unknown
https://rammenale.com/for2/regit.tmpd
unknown
https://rammenale.com/for2/aclog.txt4r
unknown
https://rammenale.com/for2/aclog.txt49?
unknown
https://rammenale.com/for2/regit.tmpPR
unknown
https://rammenale.com/for2/aclog.txt&8
unknown
https://rammenale.com/for2/aclog.txtC:
unknown
https://rammenale.com/for2/aclogtxtH
unknown
https://rammenale.com/for2/aclog.txt4er
unknown
https://rammenale.com/for2/regit.tmpY
unknown
https://rammenale.com/for2/regit.tmpentindowsINetCookies
unknown
https://rammenale.com/for2/aclog.txtft
unknown
https://rammenale.com/for2/aclog.txtjx
unknown
https://rammenale.com/for2/regit.tmpU
unknown
https://rammenale.com/for2/aclogtxtB
unknown
https://rammenale.com/for2/regit.tmpV
unknown
https://rammenale.com/for2/regit.tmp4e
unknown
https://rammenale.com/for2/aclog.txtm
unknown
https://rammenale.com/for2/aclog.txtV~
unknown
https://rammenale.com/for2/aclogtxt
unknown
https://rammenale.com/Si
unknown
https://rammenale.com/for2/regit.tmpG
unknown
https://rammenale.com/for2/regit.tmpH
unknown
https://rammenale.com/for2/aclog.txts
unknown
https://rammenale.com/for2/regit.tmp5A
unknown
https://rammenale.com/for2/aclog.txtr
unknown
https://rammenale.com/for2/aclog.txtp
unknown
https://rammenale.com/for2/regit.tmpE
unknown
https://rammenale.com/for2/aclog.txtWk
unknown
https://rammenale.com/for2/regit.tmp/
unknown
https://rammenale.com/for2/regit.tmp0
unknown
https://rammenale.com/for2/regit.tmpmp
unknown
https://rammenale.com/for2/regit.tmp2
unknown
https://rammenale.com/for2/aclog.txtz
unknown
https://rammenale.com/for2/regit.tmpR0
unknown
https://rammenale.com/for2/regit.tmp4T
unknown
https://rammenale.com/for2/aclog.txtP;
unknown
https://rammenale.com/for2/regit.tmp4P
unknown
https://rammenale.com/D
unknown
https://rammenale.com/for2/regit.tmp4
unknown
https://rammenale.com/1p
unknown
There are 84 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
rammenale.com
131.153.206.231
malicious
198.187.3.20.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
131.153.206.231
rammenale.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
963F000
stack
page read and write
26C6000
heap
page read and write
929F000
stack
page read and write
8ACB000
heap
page read and write
2E37000
stack
page read and write
500E000
stack
page read and write
2737000
heap
page read and write
3430000
heap
page read and write
6100000
trusted library allocation
page read and write
2CD6000
heap
page read and write
2732000
heap
page read and write
4180000
heap
page read and write
4680000
heap
page read and write
4ECB000
stack
page read and write
4160000
trusted library allocation
page read and write
56B0000
heap
page read and write
51A0000
heap
page read and write
4F6A000
heap
page read and write
3692000
heap
page read and write
26CB000
heap
page read and write
A1E000
stack
page read and write
888F000
stack
page read and write
3639000
heap
page read and write
26B6000
heap
page read and write
3360000
heap
page read and write
4F8F000
stack
page read and write
481B000
stack
page read and write
26D1000
heap
page read and write
32AB000
stack
page read and write
8DD1000
heap
page read and write
2661000
heap
page read and write
6F9E0000
unkown
page readonly
8DEF000
stack
page read and write
40D0000
heap
page read and write
267E000
heap
page read and write
862F000
stack
page read and write
26A5000
heap
page read and write
2F40000
heap
page read and write
35DF000
stack
page read and write
3697000
heap
page read and write
4B14000
heap
page read and write
95FE000
stack
page read and write
247000
stack
page read and write
4F70000
heap
page read and write
884E000
stack
page read and write
60F0000
trusted library allocation
page read and write
3150000
heap
page read and write
4870000
heap
page read and write
88D0000
heap
page read and write
2F0D000
heap
page read and write
366C000
heap
page read and write
2D10000
heap
page read and write
8C2F000
stack
page read and write
26C2000
heap
page read and write
273B000
heap
page read and write
4D4B000
stack
page read and write
8486000
heap
page read and write
8F2F000
stack
page read and write
9270000
heap
page read and write
8F50000
remote allocation
page read and write
3635000
heap
page read and write
938E000
stack
page read and write
2C69000
heap
page read and write
920D000
heap
page read and write
4CB9000
heap
page read and write
3683000
heap
page read and write
2CC6000
heap
page read and write
2F5C000
heap
page read and write
8450000
heap
page read and write
3676000
heap
page read and write
8AD2000
heap
page read and write
49D0000
heap
page read and write
2ED2000
heap
page read and write
2717000
heap
page read and write
363D000
heap
page read and write
280000
heap
page read and write
518D000
stack
page read and write
23D6000
heap
page read and write
953C000
stack
page read and write
267A000
heap
page read and write
8E3E000
stack
page read and write
2CA6000
heap
page read and write
2AD0000
heap
page read and write
8EEE000
stack
page read and write
9284000
heap
page read and write
3310000
heap
page read and write
8D53000
heap
page read and write
366C000
heap
page read and write
2E6A000
heap
page read and write
47D4000
heap
page read and write
3665000
heap
page read and write
5A80000
trusted library allocation
page read and write
29E0000
heap
page read and write
365F000
stack
page read and write
465F000
stack
page read and write
2F25000
heap
page read and write
26DA000
heap
page read and write
52C0000
heap
page read and write
91FC000
stack
page read and write
467E000
stack
page read and write
2EDA000
heap
page read and write
4D0F000
stack
page read and write
2CD4000
heap
page read and write
21B000
stack
page read and write
92D0000
remote allocation
page read and write
36CB000
heap
page read and write
3629000
heap
page read and write
2652000
heap
page read and write
3320000
heap
page read and write
369B000
heap
page read and write
3686000
heap
page read and write
6840000
trusted library allocation
page read and write
2EBB000
heap
page read and write
2706000
heap
page read and write
46FB000
stack
page read and write
8D4F000
stack
page read and write
2EC2000
heap
page read and write
367C000
heap
page read and write
4CB0000
heap
page read and write
8E20000
remote allocation
page read and write
8880000
heap
page read and write
2B0000
heap
page read and write
85BE000
stack
page read and write
2686000
heap
page read and write
5BC0000
trusted library allocation
page read and write
A5E000
stack
page read and write
48BB000
stack
page read and write
485D000
stack
page read and write
8B5C000
heap
page read and write
2C9A000
heap
page read and write
4684000
heap
page read and write
3686000
heap
page read and write
8AB0000
heap
page read and write
88BF000
stack
page read and write
48FE000
stack
page read and write
6FA03000
unkown
page read and write
2EC7000
heap
page read and write
8F1F000
stack
page read and write
27E5000
heap
page read and write
2F13000
heap
page read and write
4E0D000
stack
page read and write
921F000
heap
page read and write
2735000
heap
page read and write
6270000
trusted library allocation
page read and write
2C9E000
heap
page read and write
326C000
stack
page read and write
84B0000
heap
page read and write
3692000
heap
page read and write
95C000
stack
page read and write
29F0000
heap
page read and write
2C3A000
heap
page read and write
844B000
heap
page read and write
471C000
stack
page read and write
8C6E000
stack
page read and write
55EB000
stack
page read and write
2676000
heap
page read and write
5680000
trusted library allocation
page read and write
8810000
remote allocation
page read and write
853E000
stack
page read and write
47BD000
stack
page read and write
2CA4000
heap
page read and write
4F4E000
stack
page read and write
92D0000
remote allocation
page read and write
4930000
heap
page read and write
6FA03000
unkown
page read and write
508D000
stack
page read and write
2C10000
heap
page read and write
4B10000
heap
page read and write
922D000
heap
page read and write
9060000
heap
page read and write
8BC0000
heap
page read and write
52B9000
heap
page read and write
2D10000
heap
page read and write
4E80000
heap
page read and write
3614000
heap
page read and write
4A9E000
stack
page read and write
51BA000
heap
page read and write
846B000
heap
page read and write
88BE000
heap
page read and write
8E20000
remote allocation
page read and write
3631000
heap
page read and write
AAF000
heap
page read and write
552D000
stack
page read and write
6040000
trusted library allocation
page read and write
9289000
heap
page read and write
268A000
heap
page read and write
9207000
heap
page read and write
2767000
stack
page read and write
2610000
heap
page read and write
85EE000
stack
page read and write
266A000
heap
page read and write
3642000
heap
page read and write
3635000
heap
page read and write
87BD000
stack
page read and write
2C82000
heap
page read and write
238F000
stack
page read and write
2C16000
heap
page read and write
3683000
heap
page read and write
475C000
stack
page read and write
3660000
heap
page read and write
4B1E000
stack
page read and write
8EDE000
stack
page read and write
8499000
heap
page read and write
841B000
heap
page read and write
8E20000
remote allocation
page read and write
2CEF000
heap
page read and write
359E000
stack
page read and write
27D0000
heap
page read and write
846E000
heap
page read and write
2C79000
heap
page read and write
26EF000
heap
page read and write
2C75000
heap
page read and write
3695000
heap
page read and write
2997000
stack
page read and write
369B000
heap
page read and write
48A0000
heap
page read and write
9284000
heap
page read and write
4100000
heap
page read and write
6F9E0000
unkown
page readonly
4ADF000
stack
page read and write
E6F000
stack
page read and write
27A0000
heap
page read and write
2CC2000
heap
page read and write
2CFB000
heap
page read and write
263F000
stack
page read and write
8B02000
heap
page read and write
56F1000
heap
page read and write
2CA7000
heap
page read and write
9270000
heap
page read and write
847F000
heap
page read and write
A80000
heap
page read and write
8D6B000
heap
page read and write
26DB000
heap
page read and write
504D000
stack
page read and write
52B0000
heap
page read and write
4E00000
trusted library allocation
page read and write
4AC0000
heap
page read and write
27B0000
heap
page read and write
8B57000
heap
page read and write
6F9FB000
unkown
page readonly
3642000
heap
page read and write
4750000
heap
page read and write
8EAF000
stack
page read and write
2EB3000
heap
page read and write
2CF2000
heap
page read and write
5320000
heap
page read and write
2E80000
heap
page read and write
2CA9000
heap
page read and write
8D0E000
stack
page read and write
8481000
heap
page read and write
91F3000
heap
page read and write
35D0000
heap
page read and write
6FA03000
unkown
page read and write
2680000
heap
page read and write
8840000
remote allocation
page read and write
2F17000
heap
page read and write
2EF7000
heap
page read and write
4F49000
heap
page read and write
2F22000
heap
page read and write
87FE000
stack
page read and write
267A000
heap
page read and write
8423000
heap
page read and write
2F07000
heap
page read and write
6F9FB000
unkown
page readonly
2CB6000
heap
page read and write
6370000
trusted library allocation
page read and write
365C000
heap
page read and write
2723000
heap
page read and write
32B7000
stack
page read and write
488A000
heap
page read and write
3273000
stack
page read and write
957C000
stack
page read and write
878E000
stack
page read and write
47C0000
heap
page read and write
3695000
heap
page read and write
477D000
stack
page read and write
542F000
stack
page read and write
2F7000
stack
page read and write
4900000
heap
page read and write
35DA000
heap
page read and write
2C60000
heap
page read and write
2F90000
heap
page read and write
8840000
remote allocation
page read and write
5A50000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
2EB7000
heap
page read and write
8D71000
heap
page read and write
5640000
trusted library allocation
page read and write
1DC000
stack
page read and write
8CAF000
stack
page read and write
8D82000
heap
page read and write
4D8C000
stack
page read and write
2CBD000
heap
page read and write
2682000
heap
page read and write
4610000
heap
page read and write
9270000
heap
page read and write
8DAE000
stack
page read and write
26A9000
heap
page read and write
26D2000
heap
page read and write
2EFC000
heap
page read and write
2C81000
heap
page read and write
91D0000
heap
page read and write
6F9FB000
unkown
page readonly
2672000
heap
page read and write
3156000
heap
page read and write
367C000
heap
page read and write
4860000
trusted library allocation
page read and write
2B3000
stack
page read and write
3485000
heap
page read and write
2CE7000
heap
page read and write
9670000
remote allocation
page read and write
8840000
remote allocation
page read and write
2FE0000
heap
page read and write
64F0000
trusted library allocation
page read and write
2D0B000
heap
page read and write
9670000
remote allocation
page read and write
363D000
heap
page read and write
339A000
heap
page read and write
3400000
heap
page read and write
32E000
stack
page read and write
4F0E000
stack
page read and write
ABD000
heap
page read and write
2E0000
heap
page read and write
2EE0000
heap
page read and write
473C000
stack
page read and write
2953000
stack
page read and write
922E000
heap
page read and write
56B9000
heap
page read and write
2C8A000
heap
page read and write
4F40000
heap
page read and write
2C10000
heap
page read and write
6F9E1000
unkown
page execute read
891D000
heap
page read and write
49C9000
heap
page read and write
6F9E0000
unkown
page readonly
27A5000
heap
page read and write
29F5000
heap
page read and write
546E000
stack
page read and write
2C96000
heap
page read and write
9C0000
heap
page read and write
8DE4000
heap
page read and write
2BD3000
stack
page read and write
4D30000
heap
page read and write
53EE000
stack
page read and write
562D000
stack
page read and write
26D7000
heap
page read and write
6FA05000
unkown
page readonly
4B9B000
stack
page read and write
4DCC000
stack
page read and write
23DE000
stack
page read and write
2670000
heap
page read and write
2C70000
heap
page read and write
4F20000
trusted library allocation
page read and write
491A000
heap
page read and write
2C30000
heap
page read and write
8438000
heap
page read and write
2FE5000
heap
page read and write
2CD1000
heap
page read and write
2723000
stack
page read and write
3621000
heap
page read and write
49C0000
heap
page read and write
927F000
heap
page read and write
9281000
heap
page read and write
2CDC000
heap
page read and write
54EE000
stack
page read and write
4104000
heap
page read and write
8AEE000
heap
page read and write
2C92000
heap
page read and write
4970000
trusted library allocation
page read and write
2CFE000
heap
page read and write
4879000
heap
page read and write
2689000
heap
page read and write
8F50000
remote allocation
page read and write
51D2000
heap
page read and write
AAB000
heap
page read and write
2CC8000
heap
page read and write
2380000
heap
page read and write
3436000
heap
page read and write
92D0000
remote allocation
page read and write
8E6E000
stack
page read and write
2CF5000
heap
page read and write
8DDF000
heap
page read and write
2CE3000
heap
page read and write
4550000
heap
page read and write
8810000
remote allocation
page read and write
26D3000
heap
page read and write
2A67000
heap
page read and write
2ECB000
heap
page read and write
26BD000
heap
page read and write
4D00000
heap
page read and write
9670000
remote allocation
page read and write
2F2B000
heap
page read and write
2C86000
heap
page read and write
3665000
heap
page read and write
4BDD000
stack
page read and write
8E7F000
stack
page read and write
6F9E1000
unkown
page execute read
2C0000
heap
page read and write
5BF0000
trusted library allocation
page read and write
3480000
heap
page read and write
365C000
heap
page read and write
D6F000
stack
page read and write
8430000
heap
page read and write
54AF000
stack
page read and write
2DF0000
heap
page read and write
6380000
trusted library allocation
page read and write
290000
heap
page read and write
6990000
trusted library allocation
page read and write
4184000
heap
page read and write
2AD5000
heap
page read and write
2CDA000
heap
page read and write
3390000
heap
page read and write
36CB000
heap
page read and write
3625000
heap
page read and write
8D30000
heap
page read and write
27E0000
heap
page read and write
921F000
heap
page read and write
84B7000
heap
page read and write
2D2C000
heap
page read and write
2EF9000
heap
page read and write
514B000
stack
page read and write
8AEA000
heap
page read and write
2F80000
heap
page read and write
843D000
heap
page read and write
857F000
stack
page read and write
892F000
heap
page read and write
4140000
heap
page read and write
93CF000
stack
page read and write
4F80000
heap
page read and write
AA0000
heap
page read and write
2A60000
heap
page read and write
2E87000
heap
page read and write
85FF000
stack
page read and write
3621000
heap
page read and write
3629000
heap
page read and write
9285000
heap
page read and write
4F50000
heap
page read and write
85C000
stack
page read and write
4CCE000
stack
page read and write
4F74000
heap
page read and write
87CE000
stack
page read and write
930E000
stack
page read and write
8400000
heap
page read and write
6F9E1000
unkown
page execute read
6FA05000
unkown
page readonly
26B4000
heap
page read and write
203000
stack
page read and write
5EC0000
trusted library allocation
page read and write
2D0E000
heap
page read and write
88B8000
heap
page read and write
3645000
heap
page read and write
8469000
heap
page read and write
2CAA000
heap
page read and write
3645000
heap
page read and write
927E000
heap
page read and write
26C2000
heap
page read and write
8F50000
remote allocation
page read and write
4D1A000
heap
page read and write
4B5E000
stack
page read and write
3631000
heap
page read and write
925E000
stack
page read and write
361E000
stack
page read and write
461E000
stack
page read and write
91BC000
stack
page read and write
3676000
heap
page read and write
261A000
heap
page read and write
4FCD000
stack
page read and write
8A7F000
stack
page read and write
270A000
heap
page read and write
934F000
stack
page read and write
26E3000
heap
page read and write
4C9B000
stack
page read and write
3613000
heap
page read and write
46BF000
stack
page read and write
56C0000
heap
page read and write
6FA05000
unkown
page readonly
8933000
heap
page read and write
2CC5000
heap
page read and write
271C000
heap
page read and write
47D0000
heap
page read and write
3697000
heap
page read and write
36B0000
heap
page read and write
270B000
heap
page read and write
49B0000
trusted library allocation
page read and write
8A3E000
stack
page read and write
46DF000
stack
page read and write
27E0000
heap
page read and write
8B4B000
heap
page read and write
5ED0000
trusted library allocation
page read and write
887E000
stack
page read and write
8BEE000
stack
page read and write
4870000
heap
page read and write
2E60000
heap
page read and write
91EB000
heap
page read and write
3320000
heap
page read and write
2666000
heap
page read and write
89FF000
stack
page read and write
88A3000
heap
page read and write
2ECE000
heap
page read and write
856E000
stack
page read and write
276B000
heap
page read and write
8453000
heap
page read and write
2726000
heap
page read and write
89BE000
stack
page read and write
56DA000
heap
page read and write
920D000
heap
page read and write
2390000
heap
page read and write
85AF000
stack
page read and write
36B0000
heap
page read and write
469E000
stack
page read and write
8810000
remote allocation
page read and write
2C1A000
heap
page read and write
9D0000
heap
page read and write
3625000
heap
page read and write
23D0000
heap
page read and write
3639000
heap
page read and write
4CFE000
stack
page read and write
There are 507 hidden memdumps, click here to show them.