IOC Report
LLD5HDX0PS.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\LLD5HDX0PS.dll,mydllmain
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\LLD5HDX0PS.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/aclog.txt
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/aclog.txt
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/regit.tmp
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/regit.tmp
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/aclog.txt
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/regit.tmp
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\LLD5HDX0PS.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\LLD5HDX0PS.dll",#1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://rammenale.com/for2/aclogID
unknown
malicious
https://rammenale.com/for2/regit.tmpsoft
unknown
malicious
https://rammenale.com/fo
unknown
malicious
https://rammenale.com/for2/regit.tmp%S
unknown
malicious
https://rammenale.com/for2/aclog
unknown
malicious
https://rammenale.com/for2/regit.tmp
131.153.206.231
malicious
https://rammenale.com/_T
unknown
https://rammenale.com/for2/regit.tmpgQ
unknown
http://www.Dc.
unknown
https://rammenale.com/for2/regit.tmp4z
unknown
https://rammenale.com/for2/regit.tmp4w
unknown
https://rammenale.com/-H
unknown
https://rammenale.com/for2/regit.tmpmbt
unknown
https://rammenale.com/for2/regit.tmp4m
unknown
https://rammenale.com/for2/regit.tmpnf
unknown
https://rammenale.com/for2/regit.tmp44uz
unknown
https://rammenale.com/for2/regit.tmp?J
unknown
https://rammenale.com/for2/regit.tmp%f
unknown
https://rammenale.com/for2/regit.tmpOJ
unknown
https://rammenale.com/for2/aclog.txt6634-1003
unknown
https://rammenale.com/for2/aclog.txt6634-1003.mun
unknown
https://rammenale.com/for2/regit.tmp4F
unknown
https://rammenale.com/for2/regit.tmp4D
unknown
https://rammenale.com/for2/regit.tmph
unknown
https://rammenale.com/for2/regit.tmpP
unknown
https://rammenale.com/for2/regit.tmpK
unknown
https://rammenale.com/for2/aclog.txtC:
unknown
https://rammenale.com/for2/regit.tmpuS
unknown
https://rammenale.com/for2/regit.tmpS
unknown
https://rammenale.com/for2/aclog.txtl
unknown
https://rammenale.com/for2/aclog.txtsoft
unknown
https://rammenale.com/for2/aclog.txtg
unknown
https://rammenale.com/for2/regit.tmp4d
unknown
https://rammenale.com/for2/regit.tmpG
unknown
https://rammenale.com/7
unknown
https://rammenale.com/for2/aclog.txtu
unknown
https://rammenale.com/for2/aclog.txts
unknown
https://rammenale.com/for2/aclog.txtr
unknown
https://rammenale.com/for2/aclog.txtq
unknown
https://rammenale.com/for2/regit.tmpE
unknown
https://rammenale.com/for2/regit.tmp0
unknown
https://rammenale.com/for2/regit.tmp1
unknown
https://rammenale.com/for2/regit.tmp3w
unknown
https://rammenale.com/for2/aclog.txtz
unknown
https://rammenale.com/for2/regit.tmp8
unknown
https://rammenale.com/for2/regit.tmp:
unknown
https://rammenale.com/for2/regit.tmp3
unknown
https://rammenale.com/for2/regit.tmp4I
unknown
https://rammenale.com/for2/aclog.txt4#
unknown
https://rammenale.com/for2/regit.tmp4
unknown
https://rammenale.com/for2/regit.tmpent
unknown
https://rammenale.com/for2/aclog.txtx4C
unknown
https://rammenale.com/for2/aclog.txtJ
unknown
https://rammenale.com/for2/aclog.txtI
unknown
https://rammenale.com/for2/aclog.txtfs:
unknown
https://rammenale.com/for2/aclog.txtM3
unknown
https://rammenale.com/for2/regit.tmprI3-
unknown
https://rammenale.com/for2/aclog.txtT
unknown
https://rammenale.com/for2/aclog.txt44
unknown
https://rammenale.com/for2/regit.tmp&bt
unknown
https://rammenale.com/for2/aclog.txtP
unknown
https://rammenale.com/for2/regit.tmpentfc
unknown
https://rammenale.com/for2/aclog.txt4G
unknown
https://rammenale.com/for2/regit.tmp0s
unknown
https://rammenale.com/for2/regit.tmpkbu
unknown
https://rammenale.com/for2/regM
unknown
https://rammenale.com/for2/regit.tmp(f
unknown
https://rammenale.com/for2/regit.tmpkJ
unknown
https://rammenale.com/for2/aclog.txtf
unknown
https://rammenale.com/for2/aclog.txtd
unknown
https://rammenale.com/for2/regit.tmpWJz
unknown
https://rammenale.com/for2/regit.tmpsC:
unknown
https://rammenale.com/for2/aclog.txt_
unknown
https://rammenale.com/for2/aclog.txt4X
unknown
https://rammenale.com/for2/aclog.txt4W
unknown
https://rammenale.com/for2/regit.tmp6634-1003Vbt
unknown
https://rammenale.com/for2/aclog.txt)
unknown
https://rammenale.com/for2/aclog.txtent
unknown
https://rammenale.com/for2/regit.tmp4$
unknown
https://rammenale.com/for2/regit.tmp~
unknown
https://rammenale.com/for2/aclog.txt4P
unknown
https://rammenale.com/for2/aclog.txt4
unknown
https://rammenale.com/for2/aclog.txt2
unknown
https://rammenale.com/for2/regit.tmplS
unknown
https://rammenale.com/for2/aclog.txt4h
unknown
https://rammenale.com/for2/regit.tmpp
unknown
https://rammenale.com/for2/regit.tmpq
unknown
https://rammenale.com/for2/aclog.txt:
unknown
https://rammenale.com/for2/regit.tmpk
unknown
https://rammenale.com/for2/aclog.txt9
unknown
https://rammenale.com/for2/regit.tmpl
unknown
https://rammenale.com/for2/regit.tmpm
unknown
https://rammenale.com/for2/regit.tmpBJj
unknown
https://rammenale.com/for2/aclog.txtF2
unknown
https://rammenale.com/for2/aclogDevice
unknown
https://rammenale.com/for2/aclog.txtC
unknown
https://rammenale.com/for2/regit.tmpz
unknown
https://rammenale.com/for2/aclog.txtA
unknown
https://rammenale.com/for2/regit.tmpC:
unknown
https://rammenale.com/for2/regit.tmpu
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
rammenale.com
131.153.206.231
malicious

IPs

IP
Domain
Country
Malicious
131.153.206.231
rammenale.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C42000
heap
page read and write
65C0000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
4830000
heap
page read and write
4D19000
heap
page read and write
5FA0000
trusted library allocation
page read and write
4DBA000
heap
page read and write
D5B000
heap
page read and write
CE8000
heap
page read and write
C4A000
heap
page read and write
7B4C000
heap
page read and write
3340000
heap
page read and write
920000
heap
page read and write
75E000
heap
page read and write
CF7000
heap
page read and write
B25000
heap
page read and write
A94000
heap
page read and write
8F7B000
heap
page read and write
356E000
heap
page read and write
B20000
heap
page read and write
6120000
trusted library allocation
page read and write
6FE60000
unkown
page readonly
ADA000
heap
page read and write
6C0000
heap
page read and write
35FE000
heap
page read and write
C3B000
heap
page read and write
8BF0000
remote allocation
page read and write
4800000
trusted library allocation
page read and write
C8F000
heap
page read and write
8FFD000
heap
page read and write
5620000
heap
page read and write
8164000
heap
page read and write
D2B000
heap
page read and write
483B000
stack
page read and write
E07000
stack
page read and write
8105000
heap
page read and write
8F5C000
heap
page read and write
6FE86000
unkown
page execute and read and write
DDE000
stack
page read and write
5439000
heap
page read and write
CFF000
heap
page read and write
563A000
heap
page read and write
8F65000
heap
page read and write
3056000
heap
page read and write
3572000
heap
page read and write
5B7000
heap
page read and write
77C000
heap
page read and write
6BF0B000
unkown
page execute and read and write
529C000
stack
page read and write
9350000
remote allocation
page read and write
145F000
stack
page read and write
35C4000
heap
page read and write
779000
heap
page read and write
729000
heap
page read and write
891E000
stack
page read and write
7B02000
heap
page read and write
1160000
heap
page read and write
8EBE000
stack
page read and write
A77000
heap
page read and write
DC3000
stack
page read and write
AA3000
heap
page read and write
34C7000
heap
page read and write
32A0000
heap
page read and write
535B000
stack
page read and write
B20000
heap
page read and write
4A9B000
stack
page read and write
E7E000
stack
page read and write
C9A000
heap
page read and write
9CE000
stack
page read and write
797000
heap
page read and write
3305000
heap
page read and write
7E5E000
stack
page read and write
91F1000
heap
page read and write
712000
heap
page read and write
DDF000
stack
page read and write
6FE8E000
unkown
page read and write
34FE000
stack
page read and write
884C000
heap
page read and write
785000
heap
page read and write
8C2E000
stack
page read and write
35AF000
heap
page read and write
82AE000
stack
page read and write
B3C000
stack
page read and write
472C000
stack
page read and write
D46000
heap
page read and write
8833000
heap
page read and write
34FB000
heap
page read and write
5E30000
trusted library allocation
page read and write
5280000
heap
page read and write
8FB1000
heap
page read and write
34A9000
heap
page read and write
CB8000
heap
page read and write
7B31000
heap
page read and write
7B7000
stack
page read and write
359D000
heap
page read and write
34E2000
heap
page read and write
6FE8E000
unkown
page read and write
6BEE1000
unkown
page execute and read and write
D26000
heap
page read and write
921C000
heap
page read and write
5930000
trusted library allocation
page read and write
C85000
heap
page read and write
51DE000
stack
page read and write
4854000
heap
page read and write
738000
heap
page read and write
725000
heap
page read and write
4FA0000
heap
page read and write
8AF2000
heap
page read and write
8F7E000
heap
page read and write
116F000
heap
page read and write
8AA9000
heap
page read and write
938E000
stack
page read and write
53BE000
stack
page read and write
3487000
heap
page read and write
D9E000
stack
page read and write
2F5E000
stack
page read and write
D37000
heap
page read and write
32F0000
heap
page read and write
D55000
heap
page read and write
47E0000
heap
page read and write
895F000
stack
page read and write
54FC000
stack
page read and write
95B0000
remote allocation
page read and write
87FB000
heap
page read and write
BB0000
heap
page read and write
505000
heap
page read and write
32A7000
heap
page read and write
8E3F000
stack
page read and write
348B000
heap
page read and write
5440000
heap
page read and write
4ECD000
stack
page read and write
8500000
remote allocation
page read and write
8BEF000
stack
page read and write
5F40000
trusted library allocation
page read and write
AAC000
heap
page read and write
C24000
heap
page read and write
8AAE000
heap
page read and write
3500000
heap
page read and write
863000
stack
page read and write
3496000
heap
page read and write
4D4C000
stack
page read and write
C99000
heap
page read and write
3700000
heap
page read and write
940000
heap
page read and write
356A000
heap
page read and write
6960000
trusted library allocation
page read and write
C71000
heap
page read and write
2F70000
heap
page read and write
32F0000
heap
page read and write
A74000
heap
page read and write
CD4000
heap
page read and write
939F000
stack
page read and write
5430000
heap
page read and write
8B6E000
stack
page read and write
6CA000
heap
page read and write
881B000
heap
page read and write
4B5D000
stack
page read and write
950000
heap
page read and write
4DCD000
stack
page read and write
8802000
heap
page read and write
8F96000
heap
page read and write
4D0C000
stack
page read and write
7B3000
heap
page read and write
A46000
heap
page read and write
930C000
stack
page read and write
7EE0000
remote allocation
page read and write
6FE8D000
unkown
page execute and write copy
67F0000
trusted library allocation
page read and write
8F62000
heap
page read and write
E5C000
stack
page read and write
91C2000
heap
page read and write
D70000
heap
page read and write
9B5000
heap
page read and write
C4E000
heap
page read and write
484A000
heap
page read and write
8E80000
remote allocation
page read and write
913F000
stack
page read and write
4EE0000
trusted library allocation
page read and write
9350000
remote allocation
page read and write
4D5B000
stack
page read and write
D03000
heap
page read and write
3050000
heap
page read and write
4D9D000
stack
page read and write
8500000
remote allocation
page read and write
35C7000
heap
page read and write
72D000
heap
page read and write
52F0000
heap
page read and write
C37000
heap
page read and write
34A6000
heap
page read and write
4D19000
heap
page read and write
8EFF000
stack
page read and write
D4C000
stack
page read and write
5652000
heap
page read and write
2F6A000
heap
page read and write
95B0000
remote allocation
page read and write
92CB000
stack
page read and write
6230000
trusted library allocation
page read and write
4C5C000
stack
page read and write
93CF000
stack
page read and write
734000
heap
page read and write
357F000
heap
page read and write
6FE86000
unkown
page execute and read and write
C58000
heap
page read and write
8BAE000
stack
page read and write
560D000
stack
page read and write
BB0000
heap
page read and write
3430000
heap
page read and write
7AD5000
heap
page read and write
8AC4000
heap
page read and write
962F000
stack
page read and write
4D10000
heap
page read and write
3483000
heap
page read and write
848C000
stack
page read and write
8FC4000
heap
page read and write
6FE8D000
unkown
page execute and write copy
8863000
heap
page read and write
34DC000
heap
page read and write
9B0000
heap
page read and write
3030000
heap
page read and write
35B9000
heap
page read and write
8A7000
stack
page read and write
7EE0000
remote allocation
page read and write
6FE61000
unkown
page execute and read and write
4A1E000
stack
page read and write
34C4000
heap
page read and write
A85000
heap
page read and write
4820000
heap
page read and write
35A8000
heap
page read and write
7F5F000
stack
page read and write
7B3D000
heap
page read and write
CF3000
heap
page read and write
34AF000
heap
page read and write
A3B000
heap
page read and write
8128000
heap
page read and write
CFB000
heap
page read and write
4D8E000
stack
page read and write
349E000
heap
page read and write
4610000
heap
page read and write
76A000
heap
page read and write
5471000
heap
page read and write
C00000
heap
page read and write
3300000
heap
page read and write
826F000
stack
page read and write
721000
heap
page read and write
4E8C000
stack
page read and write
764000
heap
page read and write
A42000
heap
page read and write
C90000
heap
page read and write
753000
heap
page read and write
90FE000
stack
page read and write
33A0000
heap
page read and write
A20000
heap
page read and write
4D3A000
heap
page read and write
4E0000
heap
page read and write
810D000
heap
page read and write
8E80000
remote allocation
page read and write
91A0000
heap
page read and write
34D5000
heap
page read and write
2EDF000
stack
page read and write
3492000
heap
page read and write
D10000
heap
page read and write
D50000
heap
page read and write
7CCF000
stack
page read and write
4CE0000
trusted library allocation
page read and write
91DA000
heap
page read and write
B7C000
stack
page read and write
3578000
heap
page read and write
47BE000
stack
page read and write
7C8E000
stack
page read and write
935E000
stack
page read and write
C00000
heap
page read and write
822E000
stack
page read and write
B50000
heap
page read and write
33E0000
heap
page read and write
BF0000
heap
page read and write
53FF000
stack
page read and write
3706000
heap
page read and write
352C000
heap
page read and write
4D10000
heap
page read and write
197000
stack
page read and write
6FE60000
unkown
page readonly
7C0E000
stack
page read and write
6BF06000
unkown
page execute and read and write
C8B000
heap
page read and write
8DB000
stack
page read and write
89DF000
stack
page read and write
CE4000
heap
page read and write
857F000
stack
page read and write
89C000
stack
page read and write
C26000
heap
page read and write
907E000
stack
page read and write
A90000
heap
page read and write
BF5000
heap
page read and write
ABE000
heap
page read and write
4F90000
heap
page read and write
53B0000
trusted library allocation
page read and write
543D000
stack
page read and write
3566000
heap
page read and write
3510000
heap
page read and write
153000
stack
page read and write
4570000
heap
page read and write
35CE000
heap
page read and write
7F1E000
stack
page read and write
D8C000
heap
page read and write
349A000
heap
page read and write
816B000
heap
page read and write
343A000
heap
page read and write
2F60000
heap
page read and write
34E6000
heap
page read and write
47FF000
stack
page read and write
4A5F000
stack
page read and write
87E0000
heap
page read and write
7B53000
heap
page read and write
77E000
heap
page read and write
8FCB000
heap
page read and write
9221000
heap
page read and write
4614000
heap
page read and write
AA0000
heap
page read and write
91FC000
heap
page read and write
4B1D000
stack
page read and write
45E0000
heap
page read and write
33A5000
heap
page read and write
4C8E000
stack
page read and write
73E000
heap
page read and write
6FE61000
unkown
page execute and read and write
3562000
heap
page read and write
853E000
stack
page read and write
3087000
heap
page read and write
116B000
heap
page read and write
539E000
stack
page read and write
4ADD000
stack
page read and write
6FE8B000
unkown
page execute and read and write
9E0000
heap
page read and write
7AE5000
heap
page read and write
782000
heap
page read and write
A8B000
heap
page read and write
C0A000
heap
page read and write
8ADF000
heap
page read and write
466C000
stack
page read and write
8A70000
heap
page read and write
885D000
heap
page read and write
C55000
heap
page read and write
34A2000
heap
page read and write
4C1D000
stack
page read and write
8C6F000
stack
page read and write
7AEC000
heap
page read and write
C5F000
heap
page read and write
359A000
heap
page read and write
4E30000
heap
page read and write
750000
heap
page read and write
BFE000
stack
page read and write
34CB000
heap
page read and write
3253000
stack
page read and write
E7E000
stack
page read and write
D51000
heap
page read and write
B00000
heap
page read and write
462E000
stack
page read and write
8E80000
remote allocation
page read and write
D42000
heap
page read and write
B30000
heap
page read and write
4BDD000
stack
page read and write
4DA0000
heap
page read and write
8C2E000
stack
page read and write
519F000
stack
page read and write
545A000
heap
page read and write
476D000
stack
page read and write
3080000
heap
page read and write
35CA000
heap
page read and write
4F20000
trusted library allocation
page read and write
952D000
stack
page read and write
E70000
heap
page read and write
8123000
heap
page read and write
8AF7000
heap
page read and write
8817000
heap
page read and write
AB7000
stack
page read and write
8151000
heap
page read and write
6FE8B000
unkown
page execute and read and write
4D20000
heap
page read and write
76D000
heap
page read and write
54BC000
stack
page read and write
8F40000
heap
page read and write
32FF000
stack
page read and write
8DFE000
stack
page read and write
7B1D000
heap
page read and write
4C5E000
stack
page read and write
3575000
heap
page read and write
3597000
heap
page read and write
350A000
heap
page read and write
C7F000
heap
page read and write
82EF000
stack
page read and write
32F4000
heap
page read and write
C9C000
heap
page read and write
4850000
heap
page read and write
B9C000
stack
page read and write
91C0000
heap
page read and write
A52000
heap
page read and write
6BF0E000
unkown
page read and write
92DE000
stack
page read and write
BE0000
heap
page read and write
CA3000
heap
page read and write
91D7000
heap
page read and write
8500000
remote allocation
page read and write
D3F000
stack
page read and write
34B0000
heap
page read and write
4F99000
heap
page read and write
A33000
heap
page read and write
3557000
heap
page read and write
A4E000
heap
page read and write
5720000
trusted library allocation
page read and write
D3C000
heap
page read and write
D0A000
heap
page read and write
55C9000
heap
page read and write
C52000
heap
page read and write
5B0000
heap
page read and write
355B000
heap
page read and write
34FE000
heap
page read and write
D60000
heap
page read and write
8C6F000
stack
page read and write
6BF0D000
unkown
page execute and write copy
55C0000
heap
page read and write
3310000
heap
page read and write
4600000
trusted library allocation
page read and write
84CC000
stack
page read and write
6700000
trusted library allocation
page read and write
4D52000
heap
page read and write
7E9F000
stack
page read and write
400000
heap
page read and write
4BC0000
heap
page read and write
C10000
trusted library allocation
page read and write
5E20000
trusted library allocation
page read and write
46F0000
heap
page read and write
547E000
stack
page read and write
3553000
heap
page read and write
E1C000
stack
page read and write
E00000
heap
page read and write
8BF0000
remote allocation
page read and write
4CCF000
stack
page read and write
9209000
heap
page read and write
813B000
heap
page read and write
931F000
stack
page read and write
500000
heap
page read and write
9350000
remote allocation
page read and write
A36000
heap
page read and write
899E000
stack
page read and write
7EE0000
remote allocation
page read and write
CDD000
heap
page read and write
BEA000
heap
page read and write
90BF000
stack
page read and write
3060000
heap
page read and write
2FA0000
heap
page read and write
135F000
stack
page read and write
3297000
stack
page read and write
5F30000
trusted library allocation
page read and write
47E4000
heap
page read and write
C20000
heap
page read and write
8A93000
heap
page read and write
117D000
heap
page read and write
4C1B000
stack
page read and write
525E000
stack
page read and write
C46000
heap
page read and write
6BEE0000
unkown
page readonly
956E000
stack
page read and write
95EE000
stack
page read and write
4E34000
heap
page read and write
4FBA000
heap
page read and write
8BF0000
remote allocation
page read and write
925A000
heap
page read and write
C33000
heap
page read and write
CEC000
heap
page read and write
34F5000
heap
page read and write
95B0000
remote allocation
page read and write
A4A000
heap
page read and write
7C4F000
stack
page read and write
AA9000
heap
page read and write
34F2000
heap
page read and write
7B07000
heap
page read and write
55BC000
stack
page read and write
7BD000
heap
page read and write
C20000
heap
page read and write
35B5000
heap
page read and write
C10000
heap
page read and write
4FD0000
heap
page read and write
731000
heap
page read and write
67E0000
trusted library allocation
page read and write
71A000
heap
page read and write
773000
stack
page read and write
521E000
stack
page read and write
9EA000
heap
page read and write
BF0000
heap
page read and write
A73000
stack
page read and write
8BAE000
stack
page read and write
2EDF000
stack
page read and write
4829000
heap
page read and write
910000
heap
page read and write
There are 484 hidden memdumps, click here to show them.