IOC Report
En3ZIyuYdw.exe

loading gif

Files

File Path
Type
Category
Malicious
En3ZIyuYdw.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\En3ZIyuYdw.dll"
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\En3ZIyuYdw.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\En3ZIyuYdw.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\En3ZIyuYdw.dll,DllRegisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\LkpZARPPMYxrpnAus\oSMG.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\QkeveKELwVTIid\eYjpj.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\CVFdhpNOtsemq\TpsMttdDUpxciwO.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\Alnqcua\qiwFWDzKBdg.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\LkpZARPPMYxrpnAus\oSMG.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\RGgdaHRy\SOHUjYiDXi.dll"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\En3ZIyuYdw.dll",#1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://172.105.115.71:8080/E
unknown
https://172.105.115.71:8080/gumktuwcdwjgjgt/xmwkrcvtq/hnafdgsuhec/
unknown
https://172.105.115.71:8080/gumktuwcdwjgjgt/xmwkrcvtq/hnafdgsuhec/T
unknown

IPs

IP
Domain
Country
Malicious
115.178.55.22
unknown
Indonesia
malicious
172.105.115.71
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
640000
direct allocation
page execute and read and write
malicious
1280000
direct allocation
page execute and read and write
malicious
1E98A250000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
20D28BC0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
1E4C44E0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
1E98A387000
heap
page read and write
9F9000
stack
page read and write
7FFA0AEFE000
unkown
page read and write
98E000
heap
page read and write
1E98A37F000
heap
page read and write
2488000
heap
page read and write
12C0000
heap
page readonly
11A9000
heap
page read and write
1475000
heap
page read and write
2D11000
heap
page read and write
DE9000
heap
page read and write
2A50000
remote allocation
page read and write
2CF1000
heap
page read and write
2733000
heap
page read and write
D7D000
heap
page read and write
940000
heap
page read and write
18002D000
direct allocation
page readonly
D79000
heap
page read and write
950000
heap
page read and write
717000
heap
page read and write
1FDF000
stack
page read and write
B9C000
heap
page read and write
7FFA0AF02000
unkown
page readonly
728000
heap
page read and write
1E98A220000
heap
page read and write
AD0000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
D70000
heap
page read and write
20D28C1C000
heap
page read and write
20D28B50000
heap
page read and write
7FFA0AE80000
unkown
page readonly
1E98A367000
heap
page read and write
1198000
heap
page read and write
2C5E000
stack
page read and write
5E0000
heap
page read and write
12CFB7F000
stack
page read and write
914000
heap
page read and write
2A50000
remote allocation
page read and write
1167000
heap
page read and write
180000000
direct allocation
page read and write
715000
heap
page read and write
2CF1000
heap
page read and write
B43000
heap
page read and write
12CFBFE000
stack
page read and write
7FFA0AF05000
unkown
page readonly
DF5000
heap
page read and write
9E0000
remote allocation
page read and write
2D11000
heap
page read and write
18002B000
direct allocation
page readonly
20DE000
stack
page read and write
8DC000
heap
page read and write
18002B000
direct allocation
page readonly
20D28C5A000
heap
page read and write
18002D000
direct allocation
page readonly
2A50000
remote allocation
page read and write
2930000
trusted library allocation
page read and write
705000
heap
page read and write
DF5000
heap
page read and write
2140000
heap
page read and write
26AD000
stack
page read and write
146D000
heap
page read and write
DF5000
heap
page read and write
180000000
direct allocation
page read and write
7FFA0AF05000
unkown
page readonly
70E000
heap
page read and write
1E4C4568000
heap
page read and write
18002C000
direct allocation
page read and write
2130000
heap
page read and write
1184000
heap
page read and write
6F7000
heap
page read and write
D7D000
heap
page read and write
8BF000
heap
page read and write
7FFA0AE80000
unkown
page readonly
E12000
heap
page read and write
7FFA0AEB8000
unkown
page readonly
1E98A280000
direct allocation
page execute and read and write
3D0000
heap
page read and write
D4564FE000
stack
page read and write
2419000
heap
page read and write
61FF000
stack
page read and write
D455FEC000
stack
page read and write
20D28C48000
heap
page read and write
7FFA0AF05000
unkown
page readonly
13D0000
heap
page read and write
985000
heap
page read and write
97B000
heap
page read and write
11BB000
heap
page read and write
18002C000
direct allocation
page read and write
7FFA0AE81000
unkown
page execute read
8BE000
heap
page read and write
145F000
heap
page read and write
1635000
heap
page read and write
7FFA0AF05000
unkown
page readonly
DFB000
stack
page read and write
1E98A2D0000
trusted library allocation
page read and write
18002B000
direct allocation
page readonly
18002C000
direct allocation
page read and write
2CC8000
heap
page read and write
1E4C4330000
heap
page read and write
20D28F80000
heap
page read and write
E12000
heap
page read and write
7FFA0AEFE000
unkown
page read and write
8DC000
heap
page read and write
1475000
heap
page read and write
20D28BF7000
heap
page read and write
233E000
stack
page read and write
18002C000
direct allocation
page read and write
D50000
heap
page read and write
8E1000
heap
page read and write
DED000
heap
page read and write
7FFA0AF07000
unkown
page readonly
210000
heap
page read and write
20D28AE0000
heap
page read and write
427EFC000
stack
page read and write
670000
direct allocation
page execute and read and write
1198000
heap
page read and write
96F000
heap
page read and write
8FE000
heap
page read and write
6F7000
heap
page read and write
1E4C45B9000
heap
page read and write
1464000
heap
page read and write
D4562FE000
stack
page read and write
1E98A2A0000
heap
page read and write
1E4C4510000
direct allocation
page execute and read and write
2BC0000
heap
page read and write
8DE000
heap
page read and write
57E0000
trusted library allocation
page read and write
1100000
heap
page read and write
960000
heap
page read and write
D45637E000
stack
page read and write
8E0000
heap
page read and write
118F000
heap
page read and write
1E4C5E00000
heap
page read and write
7FFA0AE80000
unkown
page readonly
1E98A3A1000
heap
page read and write
1630000
heap
page read and write
98E000
heap
page read and write
73A000
heap
page read and write
7FFA0AF07000
unkown
page readonly
8F8000
heap
page read and write
4282F9000
stack
page read and write
1186000
heap
page read and write
18002C000
direct allocation
page read and write
98A000
heap
page read and write
880000
remote allocation
page read and write
1E4C5FD0000
trusted library allocation
page read and write
8B8D000
stack
page read and write
1070000
heap
page read and write
DFF000
heap
page read and write
18002D000
direct allocation
page readonly
205F000
stack
page read and write
7FFA0AE81000
unkown
page execute read
26C3000
heap
page read and write
D20000
heap
page read and write
1E4C457F000
heap
page read and write
1178000
heap
page read and write
2C20000
trusted library allocation
page read and write
20D2A780000
trusted library allocation
page read and write
8CF000
heap
page read and write
288E000
stack
page read and write
1E4C4520000
heap
page readonly
1E98A2F0000
heap
page read and write
940000
heap
page read and write
1E4C6030000
heap
page read and write
1167000
heap
page read and write
D85000
heap
page read and write
1E98A36D000
heap
page read and write
717000
heap
page read and write
7FFA0AF07000
unkown
page readonly
D7D000
heap
page read and write
DE0000
heap
page read and write
26C0000
heap
page read and write
1448000
heap
page read and write
1290000
remote allocation
page read and write
20D28F60000
heap
page readonly
690000
heap
page read and write
980000
heap
page read and write
1E4C45CB000
heap
page read and write
D00000
heap
page read and write
98A000
heap
page read and write
1475000
heap
page read and write
5C0000
heap
page read and write
600000
heap
page read and write
2492000
heap
page read and write
1370000
heap
page read and write
180000000
direct allocation
page read and write
DED000
heap
page read and write
7FFA0AEB8000
unkown
page readonly
9A1000
heap
page read and write
7FFA0AE81000
unkown
page execute read
7FFA0AEFE000
unkown
page read and write
20D2A810000
heap
page read and write
698000
heap
page read and write
2A10000
heap
page read and write
1E98A3B3000
heap
page read and write
D40000
heap
page read and write
1E98A353000
heap
page read and write
71F000
heap
page read and write
880000
remote allocation
page read and write
1E4C45B4000
heap
page read and write
4D0000
heap
page read and write
5790000
trusted library allocation
page read and write
8C09000
stack
page read and write
4281FE000
stack
page read and write
12CFA7C000
stack
page read and write
B40000
heap
page read and write
12CFD7E000
stack
page read and write
110B000
heap
page read and write
7FFA0AEB8000
unkown
page readonly
7FFA0AF07000
unkown
page readonly
1E98A2A5000
heap
page read and write
18002D000
direct allocation
page readonly
1E98BBE0000
heap
page read and write
2CC8000
heap
page read and write
DED000
heap
page read and write
1167000
heap
page read and write
1E98A367000
heap
page read and write
20D28C20000
heap
page read and write
1E98A36B000
heap
page read and write
D2C000
heap
page read and write
20D28BF0000
heap
page read and write
D25000
heap
page read and write
1390000
heap
page read and write
D85000
heap
page read and write
12B0000
direct allocation
page execute and read and write
E10000
heap
page read and write
12CFAFF000
stack
page read and write
B90000
heap
page read and write
728000
heap
page read and write
8B0F000
stack
page read and write
15BE000
stack
page read and write
8BE000
heap
page read and write
6F7000
heap
page read and write
5B0000
remote allocation
page read and write
427FFF000
stack
page read and write
7FFA0AF02000
unkown
page readonly
D45647C000
stack
page read and write
974000
heap
page read and write
25E0000
trusted library allocation
page read and write
8C8E000
stack
page read and write
180000000
direct allocation
page read and write
20D28C1F000
heap
page read and write
107C000
heap
page read and write
1E4C4490000
heap
page read and write
708000
heap
page read and write
2730000
heap
page read and write
1075000
heap
page read and write
B95000
heap
page read and write
7FFA0AEFE000
unkown
page read and write
12F5000
heap
page read and write
15C0000
heap
page read and write
270F000
stack
page read and write
1270000
heap
page read and write
97D000
heap
page read and write
20D28C1C000
heap
page read and write
8E0000
heap
page read and write
74B000
heap
page read and write
1E4C4550000
heap
page read and write
C7A000
stack
page read and write
8BE000
heap
page read and write
1E98A2B0000
heap
page read and write
18002B000
direct allocation
page readonly
D50000
heap
page read and write
905000
heap
page read and write
976000
heap
page read and write
90D000
heap
page read and write
945000
heap
page read and write
6F7000
heap
page read and write
2930000
trusted library allocation
page read and write
146D000
heap
page read and write
1E98A340000
heap
page read and write
4280FF000
stack
page read and write
986000
heap
page read and write
7FFA0AEB8000
unkown
page readonly
7FFA0AF02000
unkown
page readonly
9A1000
heap
page read and write
22B7000
stack
page read and write
1130000
heap
page read and write
DA0000
heap
page read and write
1167000
heap
page read and write
DF5000
heap
page read and write
1E4C4590000
heap
page read and write
6F7000
heap
page read and write
20E0000
trusted library allocation
page read and write
DC8000
heap
page read and write
901000
heap
page read and write
D4563F7000
stack
page read and write
2B1F000
stack
page read and write
960000
heap
page read and write
8FE000
heap
page read and write
E12000
heap
page read and write
960000
heap
page read and write
20D28F85000
heap
page read and write
7FFA0AF02000
unkown
page readonly
1200000
heap
page read and write
589000
stack
page read and write
7FFA0AE80000
unkown
page readonly
1167000
heap
page read and write
976000
heap
page read and write
6E9000
heap
page read and write
1220000
heap
page read and write
1E98A290000
trusted library allocation
page read and write
7FFA0AEFE000
unkown
page read and write
5A30000
trusted library allocation
page read and write
6F7000
heap
page read and write
2440000
heap
page read and write
24DA000
heap
page read and write
908000
heap
page read and write
1E4C4470000
heap
page read and write
12CFC79000
stack
page read and write
2461000
heap
page read and write
56DE000
stack
page read and write
1167000
heap
page read and write
9E0000
remote allocation
page read and write
163C000
heap
page read and write
4283FE000
stack
page read and write
ACE000
stack
page read and write
D75000
heap
page read and write
D8B000
heap
page read and write
DF5000
heap
page read and write
1E4C45A5000
heap
page read and write
1E98A3A1000
heap
page read and write
20D28C17000
heap
page read and write
2E82000
heap
page read and write
12F0000
heap
page read and write
D45627F000
stack
page read and write
20D28B70000
heap
page read and write
FB0000
heap
page read and write
1E4C457F000
heap
page read and write
1E98A0E0000
heap
page read and write
18002B000
direct allocation
page readonly
20D28C17000
heap
page read and write
97D000
heap
page read and write
20D28C48000
heap
page read and write
97B000
heap
page read and write
7FFA0AEB8000
unkown
page readonly
26FE000
stack
page read and write
277B000
stack
page read and write
D58000
heap
page read and write
8F8000
heap
page read and write
20D28C0E000
heap
page read and write
958000
heap
page read and write
DC0000
heap
page read and write
12D0000
trusted library allocation
page read and write
3090000
heap
page read and write
7FFA0AF02000
unkown
page readonly
8CC000
heap
page read and write
8C4000
heap
page read and write
98E000
heap
page read and write
DE5000
heap
page read and write
7FFA0AF05000
unkown
page readonly
98E000
heap
page read and write
7FFA0AE81000
unkown
page execute read
2CB000
stack
page read and write
117E000
heap
page read and write
680000
heap
page readonly
DED000
heap
page read and write
2B20000
heap
page read and write
DE5000
heap
page read and write
8FE000
heap
page read and write
C20000
remote allocation
page read and write
976000
heap
page read and write
DF5000
heap
page read and write
1290000
remote allocation
page read and write
1E4C5E2C000
heap
page read and write
1E98A34D000
heap
page read and write
1E4C5FD0000
trusted library allocation
page read and write
905000
heap
page read and write
1E98A380000
heap
page read and write
D7D000
heap
page read and write
13D3000
heap
page read and write
25E0000
trusted library allocation
page read and write
7FFA0AF07000
unkown
page readonly
1E98BC0C000
heap
page read and write
6C8000
heap
page read and write
1476000
heap
page read and write
6200000
trusted library allocation
page read and write
DFB000
heap
page read and write
D30000
heap
page read and write
96F000
heap
page read and write
8CB000
heap
page read and write
97B000
heap
page read and write
146D000
heap
page read and write
960000
heap
page read and write
90A000
heap
page read and write
D75000
heap
page read and write
1175000
heap
page read and write
18002D000
direct allocation
page readonly
1E4C4560000
heap
page read and write
960000
heap
page read and write
127A000
stack
page read and write
1E4C4555000
heap
page read and write
1E98A375000
heap
page read and write
617E000
stack
page read and write
97D000
heap
page read and write
20D2A5A0000
heap
page read and write
DA0000
heap
page read and write
1E4C457F000
heap
page read and write
20D2A780000
trusted library allocation
page read and write
5B0000
remote allocation
page read and write
8DA000
heap
page read and write
20D28C1F000
heap
page read and write
7FFA0AE80000
unkown
page readonly
20D2A5CC000
heap
page read and write
5F90000
heap
page read and write
180000000
direct allocation
page read and write
1E98A367000
heap
page read and write
D70000
heap
page read and write
20D28C0E000
heap
page read and write
6C2000
heap
page read and write
2CF0000
heap
page read and write
985000
heap
page read and write
1E4C45B9000
heap
page read and write
7FFA0AE81000
unkown
page execute read
1186000
heap
page read and write
C20000
remote allocation
page read and write
240C000
heap
page read and write
12CFCFE000
stack
page read and write
24F0000
heap
page read and write
1E98A373000
heap
page read and write
1440000
heap
page read and write
4380000
heap
page read and write
D45657C000
stack
page read and write
1E98BC0C000
heap
page read and write
20D28C28000
heap
page read and write
20D28F50000
direct allocation
page execute and read and write
8CF000
heap
page read and write
D8F000
heap
page read and write
1E4C45A9000
heap
page read and write
985000
heap
page read and write
98E000
heap
page read and write
920000
trusted library allocation
page read and write
There are 433 hidden memdumps, click here to show them.