IOC Report
RPHSNqfBjbKzV.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\RPHSNqfBjbKzV.dll,#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll",#1
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll",#1

Memdumps

Base Address
Regiontype
Protect
Malicious
286C000
heap
page read and write
289F000
heap
page read and write
2D90000
heap
page read and write
2E36000
heap
page read and write
2DBB000
heap
page read and write
34BA000
heap
page read and write
2830000
heap
page read and write
2D1E000
stack
page read and write
2D5F000
stack
page read and write
4FED000
direct allocation
page readonly
2FC0000
heap
page read and write
2C5E000
stack
page read and write
252B000
stack
page read and write
7E0000
heap
page read and write
5ADD000
direct allocation
page readonly
2DC6000
heap
page read and write
640000
heap
page read and write
2FEC000
stack
page read and write
2590000
heap
page read and write
32DE000
stack
page read and write
720000
heap
page read and write
7FF000
heap
page read and write
2DFF000
heap
page read and write
4EFA000
direct allocation
page read and write
34B0000
heap
page read and write
2850000
heap
page read and write
2BB0000
heap
page read and write
536F000
direct allocation
page execute and read and write
35B0000
heap
page read and write
3690000
heap
page read and write
4A20000
direct allocation
page read and write
353F000
heap
page read and write
34D2000
heap
page read and write
4A21000
direct allocation
page execute read
4FEF000
direct allocation
page execute and read and write
345E000
stack
page read and write
610000
heap
page read and write
34DC000
heap
page read and write
2DB6000
heap
page read and write
2DCC000
heap
page read and write
2FAB000
stack
page read and write
2B8E000
stack
page read and write
2DB1000
heap
page read and write
2B00000
heap
page read and write
5511000
direct allocation
page execute read
2D9A000
heap
page read and write
34D1000
heap
page read and write
7AE000
stack
page read and write
2E2E000
heap
page read and write
2FE6000
stack
page read and write
34D7000
heap
page read and write
22B0000
heap
page read and write
4B7A000
direct allocation
page read and write
2866000
heap
page read and write
566A000
direct allocation
page read and write
3520000
heap
page read and write
2B10000
heap
page read and write
2E1E000
heap
page read and write
2DBF000
heap
page read and write
24EB000
stack
page read and write
2A5B000
stack
page read and write
2CCF000
stack
page read and write
285F000
heap
page read and write
536D000
direct allocation
page readonly
2DB0000
heap
page read and write
7FB000
heap
page read and write
42BF000
stack
page read and write
9EF000
stack
page read and write
7F0000
heap
page read and write
2525000
stack
page read and write
296E000
stack
page read and write
3537000
heap
page read and write
AEF000
stack
page read and write
283A000
heap
page read and write
3300000
heap
page read and write
4FF0000
direct allocation
page read and write
341F000
stack
page read and write
34EC000
heap
page read and write
34DF000
heap
page read and write
2856000
heap
page read and write
2C60000
heap
page read and write
354F000
heap
page read and write
3260000
heap
page read and write
4DA0000
direct allocation
page read and write
2E16000
heap
page read and write
349E000
stack
page read and write
285B000
heap
page read and write
76E000
stack
page read and write
4340000
heap
page read and write
3557000
heap
page read and write
29B0000
heap
page read and write
34E6000
heap
page read and write
25A0000
heap
page read and write
2A9C000
stack
page read and write
3250000
heap
page read and write
2851000
heap
page read and write
4DA1000
direct allocation
page execute read
3010000
heap
page read and write
5370000
direct allocation
page read and write
29AF000
stack
page read and write
5ADF000
direct allocation
page execute and read and write
5AE0000
direct allocation
page read and write
2A96000
stack
page read and write
3CC000
stack
page read and write
80D000
heap
page read and write
5510000
direct allocation
page read and write
2CC000
stack
page read and write
There are 97 hidden memdumps, click here to show them.