IOC Report
XY2I8rWLkM.exe

loading gif

Files

File Path
Type
Category
Malicious
XY2I8rWLkM.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\ffrrdds\logs.dat
data
modified
malicious
C:\Users\Public\Libraries\Ocihlomc
data
dropped
malicious
C:\Users\Public\Libraries\Ocihlomc.PIF
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\easinvoker.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\netutils.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\Public\Ocihlomc.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Ocihlomc.PIF">), ASCII text, with CRLF line terminators
dropped
malicious
\Device\ConDrv
ISO-8859 text, with CRLF line terminators
dropped
malicious
C:\Users\Public\Libraries\Null
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Libraries\OcihlomcO.bat
Unicode text, UTF-16, little-endian text, with very long lines (15012), with no line terminators
dropped
C:\Users\Public\Libraries\aaa.bat
DOS batch file, ASCII text, with very long lines (468), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\json[1].json
JSON data
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\XY2I8rWLkM.exe
"C:\Users\user\Desktop\XY2I8rWLkM.exe"
malicious
C:\Windows\SysWOW64\extrac32.exe
C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\user\Desktop\XY2I8rWLkM.exe C:\\Users\\Public\\Libraries\\Ocihlomc.PIF
malicious
C:\Windows\SysWOW64\colorcpl.exe
C:\Windows\System32\colorcpl.exe
malicious
C:\Users\Public\Libraries\Ocihlomc.PIF
"C:\Users\Public\Libraries\Ocihlomc.PIF"
malicious
C:\Windows\SysWOW64\SndVol.exe
C:\Windows\System32\SndVol.exe
malicious
C:\Users\Public\Libraries\Ocihlomc.PIF
"C:\Users\Public\Libraries\Ocihlomc.PIF"
malicious
C:\Windows\SysWOW64\colorcpl.exe
C:\Windows\System32\colorcpl.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\OcihlomcO.bat" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
jantis.duckdns.org
malicious
http://geoplugin.net/json.gp
178.237.33.50
malicious
http://geoplugin.net/json.gp/C
unknown
malicious
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
https://gjc1pa.dm.files.1drv.com/
unknown
https://gjc1pa.dm.files.1drv.com/y4m5jEZDAORJUhy5vxdvGivD8AK7KXuBMHd6mI9R-9NoISk9eoRi5CGeKvx95WShCc-
unknown
https://sectigo.com/CPS0
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown
https://gjc1pa.dm.files.1drv.com/y4mpj9fRwfOnuyzM7YwI58jRvZ-dYfMjomP1KUnTARA567zRfUcLOtOoq9VQbjgVxqr
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://geoplugin.net/#Y
unknown
http://geoplugin.net/json.gp~6
unknown
http://geoplugin.net/
unknown
http://geoplugin.net/json.gpc6
unknown
https://onedrive.live.com/J
unknown
https://onedrive.live.com/download?resid=38773C188FECDED2%21107&authkey=!APdTZ0yd8fEkIVs
13.107.139.11
https://gjc1pa.dm.files.1drv.com:443/y4m5jEZDAORJUhy5vxdvGivD8AK7KXuBMHd6mI9R-9NoISk9eoRi5CGeKvx95WS
unknown
https://live.com/
unknown
http://geoplugin.net/json.gpJ6
unknown
http://geoplugin.net/json.gpX
unknown
https://onedrive.live.com/download?resid=38773C188FECDED2%21107&authkey=
unknown
http://geoplugin.net/json.gpm6
unknown
http://www.pmail.com
unknown
http://ocsp.sectigo.com0C
unknown
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
jantis.duckdns.org
103.186.117.171
malicious
dual-spov-0006.spov-msedge.net
13.107.139.11
geoplugin.net
178.237.33.50
onedrive.live.com
unknown
gjc1pa.dm.files.1drv.com
unknown

IPs

IP
Domain
Country
Malicious
103.186.117.171
jantis.duckdns.org
unknown
malicious
13.107.139.11
dual-spov-0006.spov-msedge.net
United States
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Ocihlomc
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-TALGAI
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-TALGAI
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-TALGAI
time
malicious
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%systemroot%\system32\colorui.dll,-1400
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ICM\ProfileAssociations\Print\Fax
UsePerUserProfiles

Memdumps

Base Address
Regiontype
Protect
Malicious
28A1000
direct allocation
page execute read
malicious
407000
heap
page read and write
malicious
4660000
direct allocation
page execute and read and write
malicious
2AE1000
direct allocation
page execute read
malicious
7AB000
heap
page read and write
malicious
1C630000
direct allocation
page execute and read and write
malicious
29B1000
direct allocation
page execute read
malicious
4830000
remote allocation
page execute and read and write
malicious
66E0000
remote allocation
page execute and read and write
malicious
228A000
direct allocation
page read and write
malicious
7FC10000
direct allocation
page read and write
malicious
185BF000
stack
page read and write
7F9F0000
direct allocation
page read and write
7AB000
heap
page read and write
1F0000
heap
page read and write
64E000
unkown
page read and write
7EC40000
direct allocation
page read and write
145C2000
heap
page read and write
78A000
heap
page read and write
4820000
trusted library allocation
page read and write
7B5000
heap
page read and write
19D000
stack
page read and write
5AC0000
heap
page read and write
1436E000
stack
page read and write
6D7000
heap
page read and write
7E560000
direct allocation
page read and write
1857E000
stack
page read and write
7BC000
heap
page read and write
145CD000
heap
page read and write
2DF0000
heap
page read and write
1446E000
stack
page read and write
29DB000
direct allocation
page read and write
3352000
heap
page read and write
2EB000
stack
page read and write
29EC000
direct allocation
page read and write
2394000
direct allocation
page read and write
144AE000
stack
page read and write
7FE2D000
direct allocation
page read and write
492D000
stack
page read and write
52D000
unkown
page write copy
13D5F000
direct allocation
page read and write
7FD5D000
direct allocation
page read and write
28A0000
direct allocation
page readonly
7A0000
heap
page read and write
CA8000
direct allocation
page read and write
1473F000
stack
page read and write
496F000
stack
page read and write
3F7000
heap
page read and write
4E00000
heap
page read and write
89E000
stack
page read and write
13D91000
direct allocation
page read and write
67E000
stack
page read and write
13D58000
direct allocation
page read and write
1C6A8000
direct allocation
page execute and read and write
7ED30000
direct allocation
page read and write
258C000
stack
page read and write
7F9F0000
direct allocation
page read and write
CE0000
heap
page read and write
99F000
stack
page read and write
7E440000
direct allocation
page read and write
2370000
direct allocation
page read and write
7E690000
direct allocation
page read and write
7EC30000
direct allocation
page read and write
2660000
heap
page read and write
529000
unkown
page read and write
270F000
direct allocation
page read and write
141CF000
stack
page read and write
6D0000
heap
page read and write
2810000
heap
page read and write
3C0000
heap
page read and write
9A3000
heap
page read and write
262E000
stack
page read and write
45D000
unkown
page read and write
48EF000
stack
page read and write
65E0000
heap
page read and write
7FCF0000
direct allocation
page read and write
600000
heap
page read and write
7F5000
heap
page read and write
448000
heap
page read and write
2748000
direct allocation
page read and write
7ED80000
direct allocation
page read and write
7E760000
direct allocation
page read and write
1409F000
stack
page read and write
D84000
heap
page read and write
E4C000
stack
page read and write
475000
heap
page read and write
23A3000
direct allocation
page read and write
C81000
direct allocation
page read and write
49D000
stack
page read and write
2FB9000
stack
page read and write
7EFDB000
direct allocation
page read and write
186A0000
heap
page read and write
9A000
stack
page read and write
7E720000
direct allocation
page read and write
529000
unkown
page read and write
1487D000
stack
page read and write
777000
heap
page read and write
9A000
stack
page read and write
675000
stack
page read and write
23AA000
direct allocation
page read and write
47F000
heap
page read and write
43F0000
heap
page read and write
13C48000
direct allocation
page read and write
B6F000
stack
page read and write
8EF000
stack
page read and write
8CF000
heap
page read and write
C7A000
direct allocation
page read and write
7E71F000
direct allocation
page read and write
22EC000
direct allocation
page read and write
356F000
stack
page read and write
273A000
direct allocation
page read and write
7E71F000
direct allocation
page read and write
7FD10000
direct allocation
page read and write
47EF000
stack
page read and write
2A20000
heap
page read and write
7E340000
direct allocation
page read and write
3FD000
heap
page read and write
2378000
direct allocation
page read and write
144AE000
stack
page read and write
32AE000
stack
page read and write
7ED10000
direct allocation
page read and write
14EAF000
heap
page read and write
50C000
unkown
page write copy
371B000
heap
page read and write
7ED00000
direct allocation
page read and write
7FD80000
direct allocation
page read and write
737000
heap
page read and write
7EC90000
direct allocation
page read and write
46D8000
direct allocation
page execute and read and write
7F9F0000
direct allocation
page read and write
7E0000
heap
page read and write
4C5000
heap
page read and write
991000
heap
page read and write
13BC7000
direct allocation
page read and write
400000
unkown
page readonly
7AB000
heap
page read and write
3320000
heap
page read and write
87E000
heap
page read and write
401000
unkown
page execute read
76A000
heap
page read and write
410000
heap
page read and write
47AE000
stack
page read and write
4400000
heap
page read and write
7A9000
heap
page read and write
C32000
direct allocation
page read and write
1C6A4000
direct allocation
page execute and read and write
29CE000
stack
page read and write
13F3F000
stack
page read and write
13D83000
direct allocation
page read and write
7FAF1000
direct allocation
page read and write
720000
heap
page read and write
958000
heap
page read and write
56E000
unkown
page readonly
C40000
direct allocation
page read and write
2F30000
heap
page read and write
2CEE000
unkown
page read and write
2733000
direct allocation
page read and write
13C40000
direct allocation
page read and write
7E790000
direct allocation
page read and write
13D8A000
direct allocation
page read and write
7F070000
direct allocation
page read and write
CD0000
heap
page read and write
7E6C0000
direct allocation
page read and write
1431F000
stack
page read and write
140DE000
stack
page read and write
8B0000
heap
page read and write
2673000
direct allocation
page read and write
7EC80000
direct allocation
page read and write
52C0000
trusted library allocation
page read and write
700000
heap
page read and write
532000
unkown
page readonly
77E000
stack
page read and write
50F000
stack
page read and write
186B0000
heap
page read and write
2362000
direct allocation
page read and write
C59000
direct allocation
page read and write
14FA0000
trusted library allocation
page read and write
7EAFF000
direct allocation
page read and write
C84000
direct allocation
page read and write
32F0000
heap
page read and write
7E669000
direct allocation
page read and write
7E4AF000
direct allocation
page read and write
23B1000
direct allocation
page read and write
7E7000
heap
page read and write
25FE000
stack
page read and write
7EA70000
direct allocation
page read and write
47F000
heap
page read and write
C88000
direct allocation
page read and write
239C000
direct allocation
page read and write
39E000
stack
page read and write
13D4A000
direct allocation
page read and write
7B5000
heap
page read and write
7E71F000
direct allocation
page read and write
7E2B0000
direct allocation
page read and write
7E0000
heap
page read and write
52B000
unkown
page read and write
2A5000
stack
page read and write
7E4F0000
direct allocation
page read and write
3337000
heap
page read and write
7E5F0000
direct allocation
page read and write
2716000
direct allocation
page read and write
DCE000
stack
page read and write
28CB000
direct allocation
page read and write
E0F000
stack
page read and write
465B000
stack
page read and write
46A000
heap
page read and write
14E95000
heap
page read and write
13CCC000
stack
page read and write
2FFC000
stack
page read and write
13C73000
direct allocation
page read and write
2741000
direct allocation
page read and write
2724000
direct allocation
page read and write
2DEF000
stack
page read and write
C73000
direct allocation
page read and write
2AC6000
heap
page read and write
14A1E000
heap
page read and write
19D000
stack
page read and write
42E000
heap
page read and write
13C88000
direct allocation
page read and write
3717000
heap
page read and write
1408F000
stack
page read and write
45D000
unkown
page read and write
294E000
stack
page read and write
7E570000
direct allocation
page read and write
7E6D0000
direct allocation
page read and write
7E790000
direct allocation
page read and write
2B0B000
direct allocation
page read and write
87A000
heap
page read and write
6D5000
heap
page read and write
7ED4F000
direct allocation
page read and write
7E3C0000
direct allocation
page read and write
C8C000
direct allocation
page read and write
7E600000
direct allocation
page read and write
4294000
heap
page read and write
8AF000
stack
page read and write
13C7A000
direct allocation
page read and write
13CC3000
direct allocation
page read and write
C64000
direct allocation
page read and write
410000
heap
page read and write
7E670000
direct allocation
page read and write
950000
heap
page read and write
7FAFA000
direct allocation
page read and write
7ECC0000
direct allocation
page read and write
52B000
unkown
page read and write
448000
heap
page read and write
2AC0000
heap
page read and write
146C0000
trusted library allocation
page read and write
3A0000
heap
page read and write
13D98000
direct allocation
page read and write
3300000
heap
page read and write
920000
direct allocation
page execute and read and write
14C5A000
heap
page read and write
45F000
heap
page read and write
475000
heap
page read and write
13B67000
direct allocation
page read and write
14EA1000
heap
page read and write
13C6C000
direct allocation
page read and write
14C50000
heap
page read and write
4290000
heap
page read and write
770000
heap
page read and write
7E5000
heap
page read and write
3352000
heap
page read and write
7EB30000
direct allocation
page read and write
7C0000
heap
page read and write
4D80000
heap
page read and write
46D4000
direct allocation
page execute and read and write
3FA000
heap
page read and write
7EEB3000
direct allocation
page read and write
76E000
stack
page read and write
2793000
heap
page read and write
145C0000
heap
page read and write
7EB00000
direct allocation
page read and write
238D000
direct allocation
page read and write
48AC000
stack
page read and write
C39000
direct allocation
page read and write
C5D000
direct allocation
page read and write
13E8A000
stack
page read and write
271D000
direct allocation
page read and write
A6F000
stack
page read and write
529000
unkown
page read and write
14A19000
heap
page read and write
145F0000
remote allocation
page read and write
D80000
heap
page read and write
730000
heap
page read and write
2AB0000
heap
page read and write
5DC0000
trusted library allocation
page read and write
7ED7F000
direct allocation
page read and write
96D000
heap
page read and write
7E470000
direct allocation
page read and write
14EA0000
heap
page read and write
145C1000
heap
page read and write
23E0000
heap
page read and write
145C1000
heap
page read and write
7E6C0000
direct allocation
page read and write
65C0000
heap
page read and write
7EFB5000
direct allocation
page read and write
13C56000
direct allocation
page read and write
7EED9000
direct allocation
page read and write
40A000
heap
page read and write
2453000
heap
page read and write
2B1C000
direct allocation
page read and write
45D000
unkown
page read and write
13DCA000
stack
page read and write
810000
direct allocation
page execute and read and write
68E000
stack
page read and write
1421E000
stack
page read and write
7E5CF000
direct allocation
page read and write
2B41000
direct allocation
page read and write
6BE000
stack
page read and write
1421E000
stack
page read and write
13F9F000
stack
page read and write
7ED80000
direct allocation
page read and write
1F0000
heap
page read and write
13F7E000
stack
page read and write
1C5AE000
stack
page read and write
352D000
stack
page read and write
C52000
direct allocation
page read and write
3341000
heap
page read and write
594000
unkown
page readonly
1431F000
stack
page read and write
3260000
heap
page read and write
2B10000
heap
page read and write
2600000
heap
page read and write
2A18000
heap
page read and write
45D000
unkown
page write copy
C93000
direct allocation
page read and write
C48000
direct allocation
page read and write
145F0000
remote allocation
page read and write
13E9A000
stack
page read and write
234F000
direct allocation
page read and write
418000
heap
page read and write
151C0000
direct allocation
page execute and read and write
59C000
stack
page read and write
145AF000
stack
page read and write
7E4000
heap
page read and write
7EC40000
direct allocation
page read and write
13F8F000
stack
page read and write
23B8000
direct allocation
page read and write
89A000
heap
page read and write
1F0000
heap
page read and write
2450000
heap
page read and write
475000
heap
page read and write
2790000
heap
page read and write
7E1E0000
direct allocation
page read and write
9DE000
stack
page read and write
486F000
stack
page read and write
9A000
stack
page read and write
45F000
heap
page read and write
28F0000
heap
page read and write
7B5000
heap
page read and write
140CE000
stack
page read and write
760000
heap
page read and write
13D66000
direct allocation
page read and write
25CD000
stack
page read and write
2410000
direct allocation
page execute and read and write
25BC000
stack
page read and write
1477E000
stack
page read and write
13D23000
direct allocation
page read and write
870000
heap
page read and write
3328000
heap
page read and write
C6C000
direct allocation
page read and write
800000
heap
page read and write
1407F000
stack
page read and write
C60000
direct allocation
page read and write
13C81000
direct allocation
page read and write
476B000
stack
page read and write
14FA0000
direct allocation
page execute and read and write
14C5C000
heap
page read and write
4C0000
heap
page read and write
1436E000
stack
page read and write
1446E000
stack
page read and write
1463E000
stack
page read and write
13D74000
direct allocation
page read and write
298E000
stack
page read and write
145AF000
stack
page read and write
2A4E000
heap
page read and write
710000
heap
page read and write
145C0000
heap
page read and write
ADF000
stack
page read and write
4E04000
heap
page read and write
461C000
stack
page read and write
76E000
heap
page read and write
146C0000
trusted library allocation
page read and write
1421E000
stack
page read and write
780000
heap
page read and write
7DA000
heap
page read and write
14907000
heap
page read and write
7E4D0000
direct allocation
page read and write
13B50000
direct allocation
page read and write
13C5D000
direct allocation
page read and write
7E6D0000
direct allocation
page read and write
3352000
heap
page read and write
13E3E000
stack
page read and write
4D70000
heap
page read and write
7E53F000
direct allocation
page read and write
451000
heap
page read and write
32EE000
stack
page read and write
CA1000
direct allocation
page read and write
13C64000
direct allocation
page read and write
7E790000
direct allocation
page read and write
7EBD0000
direct allocation
page read and write
7E6D0000
direct allocation
page read and write
141BF000
stack
page read and write
25AC000
stack
page read and write
C9A000
direct allocation
page read and write
C7D000
direct allocation
page read and write
7E370000
direct allocation
page read and write
7FC80000
direct allocation
page read and write
333E000
heap
page read and write
8C0000
heap
page read and write
13D6D000
direct allocation
page read and write
2ACA000
heap
page read and write
2369000
direct allocation
page read and write
7EE58000
direct allocation
page read and write
C38000
direct allocation
page read and write
350000
heap
page read and write
2900000
heap
page read and write
4270000
heap
page read and write
1502D000
heap
page read and write
7ECC0000
direct allocation
page read and write
C28000
direct allocation
page read and write
E8D000
stack
page read and write
6C0000
heap
page read and write
910000
heap
page read and write
25EE000
stack
page read and write
630000
heap
page read and write
7ECEF000
direct allocation
page read and write
482E000
stack
page read and write
73E000
stack
page read and write
145F0000
remote allocation
page read and write
145AD000
stack
page read and write
7E720000
direct allocation
page read and write
7EC40000
direct allocation
page read and write
3C8000
heap
page read and write
1C56C000
stack
page read and write
7E6C0000
direct allocation
page read and write
7E720000
direct allocation
page read and write
1446E000
stack
page read and write
141DF000
stack
page read and write
472B000
stack
page read and write
C68000
direct allocation
page read and write
278E000
stack
page read and write
3E4000
heap
page read and write
3337000
heap
page read and write
23D0000
heap
page read and write
2663000
heap
page read and write
C48000
direct allocation
page read and write
451000
heap
page read and write
144AE000
stack
page read and write
7E470000
direct allocation
page read and write
1436E000
stack
page read and write
1431F000
stack
page read and write
6BC000
stack
page read and write
2A10000
heap
page read and write
145D0000
heap
page read and write
7EA60000
direct allocation
page read and write
3710000
heap
page read and write
C18000
direct allocation
page read and write
14EA5000
heap
page read and write
7EF000
heap
page read and write
23F0000
heap
page read and write
B4F000
stack
page read and write
13C4F000
direct allocation
page read and write
47F000
heap
page read and write
19D000
stack
page read and write
792000
heap
page read and write
2A0E000
stack
page read and write
2A11000
direct allocation
page read and write
140BE000
stack
page read and write
4420000
heap
page read and write
2A27000
heap
page read and write
7EC40000
direct allocation
page read and write
690000
heap
page read and write
735000
heap
page read and write
14E1D000
direct allocation
page read and write
7E710000
direct allocation
page read and write
7EC40000
direct allocation
page read and write
There are 467 hidden memdumps, click here to show them.