IOC Report
UNUy8dUYWp.exe

loading gif

Files

File Path
Type
Category
Malicious
UNUy8dUYWp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\UNUy8dUYWp.dll"
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\UNUy8dUYWp.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\UNUy8dUYWp.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\UNUy8dUYWp.dll,DllRegisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZWpHraPiSSirRmt\eJPBXUgBzVlFM.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\HqxIOWhu\iwDMK.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\LhPRdzdtIG\UwTqVItszcvDL.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\OSbbRH\JNviIfIAbu.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\ZWpHraPiSSirRmt\eJPBXUgBzVlFM.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\XkUZzl\jVHLVoJmMjstBzLj.dll"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\UNUy8dUYWp.dll",#1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://172.105.115.71:8080/
unknown
https://172.105.115.71:8080/ifjgeqljeeoagd/80/
unknown
https://172.105.115.71:8080/ifjgeqljeeoagd/
unknown

IPs

IP
Domain
Country
Malicious
172.105.115.71
unknown
United States
malicious
188.165.79.151
unknown
France
malicious
196.44.98.190
unknown
Ghana
malicious
174.138.33.49
unknown
United States
malicious
36.67.23.59
unknown
Indonesia
malicious
103.41.204.169
unknown
Indonesia
malicious
85.214.67.203
unknown
Germany
malicious
83.229.80.93
unknown
United Kingdom
malicious
198.199.70.22
unknown
United States
malicious
93.104.209.107
unknown
Germany
malicious
186.250.48.5
unknown
Brazil
malicious
209.239.112.82
unknown
United States
malicious
175.126.176.79
unknown
Korea Republic of
malicious
128.199.242.164
unknown
United Kingdom
malicious
178.238.225.252
unknown
Germany
malicious
46.101.98.60
unknown
Netherlands
malicious
190.145.8.4
unknown
Colombia
malicious
82.98.180.154
unknown
Spain
malicious
103.71.99.57
unknown
India
malicious
87.106.97.83
unknown
Germany
malicious
103.254.12.236
unknown
Viet Nam
malicious
103.85.95.4
unknown
Indonesia
malicious
202.134.4.210
unknown
Indonesia
malicious
165.22.254.236
unknown
United States
malicious
78.47.204.80
unknown
Germany
malicious
118.98.72.86
unknown
Indonesia
malicious
139.59.80.108
unknown
Singapore
malicious
104.244.79.94
unknown
United States
malicious
37.44.244.177
unknown
Germany
malicious
51.75.33.122
unknown
France
malicious
160.16.143.191
unknown
Japan
malicious
103.56.149.105
unknown
Indonesia
malicious
85.25.120.45
unknown
Germany
malicious
139.196.72.155
unknown
China
malicious
115.178.55.22
unknown
Indonesia
malicious
103.126.216.86
unknown
Bangladesh
malicious
128.199.217.206
unknown
United Kingdom
malicious
114.79.130.68
unknown
India
malicious
103.224.241.74
unknown
India
malicious
210.57.209.142
unknown
Indonesia
malicious
202.28.34.99
unknown
Thailand
malicious
80.211.107.116
unknown
Italy
malicious
54.37.228.122
unknown
France
malicious
218.38.121.17
unknown
Korea Republic of
malicious
185.148.169.10
unknown
Germany
malicious
195.77.239.39
unknown
Spain
malicious
178.62.112.199
unknown
European Union
malicious
62.171.178.147
unknown
United Kingdom
malicious
64.227.55.231
unknown
United States
malicious
There are 39 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
eJPBXUgBzVlFM.dll
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
B00000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
2D40000
direct allocation
page execute and read and write
malicious
CF0000
direct allocation
page execute and read and write
malicious
239F3680000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
18426F90000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
1A64A260000
direct allocation
page execute and read and write
malicious
239F370F000
heap
page read and write
18428B60000
trusted library allocation
page read and write
94F000
heap
page read and write
9315C7E000
stack
page read and write
180000000
direct allocation
page read and write
9315B7E000
stack
page read and write
96D000
heap
page read and write
18428950000
heap
page read and write
9E0000
heap
page read and write
21B0000
heap
page read and write
239F3707000
heap
page read and write
B8D000
heap
page read and write
18002D000
direct allocation
page readonly
93157BC000
stack
page read and write
1AF035D0000
heap
page read and write
239F5115000
heap
page read and write
2698000
heap
page read and write
52A0000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
BC5000
heap
page read and write
C2E000
heap
page read and write
BAB000
heap
page read and write
37A97F9000
stack
page read and write
7FF87C2E0000
unkown
page readonly
7FF87C365000
unkown
page readonly
E27000
heap
page read and write
8EC000
heap
page read and write
7FD000
heap
page read and write
539000
stack
page read and write
E7B000
heap
page read and write
980000
heap
page read and write
E3A6AF9000
stack
page read and write
A00000
heap
page read and write
3A0000
remote allocation
page read and write
9DF000
heap
page read and write
3A0000
remote allocation
page read and write
1AF036EF000
heap
page read and write
BB1000
heap
page read and write
1A64A0D9000
heap
page read and write
E58000
heap
page read and write
239F3716000
heap
page read and write
1AF039E5000
heap
page read and write
A80000
remote allocation
page read and write
1349000
heap
page read and write
2D3F000
stack
page read and write
745000
heap
page read and write
DCB000
heap
page read and write
18426EB0000
heap
page read and write
239F3726000
heap
page read and write
940000
heap
page read and write
1301000
heap
page read and write
9EE000
heap
page read and write
7FF87C367000
unkown
page readonly
948000
heap
page read and write
1337000
heap
page read and write
BD1000
heap
page read and write
BD2000
heap
page read and write
97B000
stack
page read and write
27B0000
heap
page read and write
12D0000
heap
page read and write
C2E000
heap
page read and write
299E000
stack
page read and write
750000
heap
page read and write
97C000
heap
page read and write
F60000
heap
page read and write
7FF87C2E1000
unkown
page execute read
2EF9000
heap
page read and write
9315BF9000
stack
page read and write
7B3000
heap
page read and write
1A64A0C5000
heap
page read and write
56D0000
trusted library allocation
page read and write
E58000
heap
page read and write
1A64A050000
heap
page read and write
B6E000
heap
page read and write
7FF87C2E1000
unkown
page execute read
94E000
stack
page read and write
7FF87C35E000
unkown
page read and write
570000
heap
page read and write
1A64A0A8000
heap
page read and write
5C0000
heap
page read and write
37A000
stack
page read and write
3B3E000
stack
page read and write
7FF87C318000
unkown
page readonly
2363000
heap
page read and write
2D80000
heap
page readonly
7FF87C362000
unkown
page readonly
27DE000
stack
page read and write
BBE000
heap
page read and write
E30000
trusted library allocation
page read and write
1A64A058000
heap
page read and write
7FF87C35E000
unkown
page read and write
2780000
remote allocation
page read and write
1A64A076000
heap
page read and write
1A64A0A8000
heap
page read and write
18428B40000
heap
page read and write
239F5110000
heap
page read and write
18426FFF000
heap
page read and write
560000
remote allocation
page read and write
2650000
heap
page read and write
5C5000
heap
page read and write
1A64BA8D000
heap
page read and write
7FF87C365000
unkown
page readonly
9E5000
heap
page read and write
2780000
remote allocation
page read and write
5B10000
heap
page read and write
BAC000
heap
page read and write
18002D000
direct allocation
page readonly
E27000
heap
page read and write
12FD000
heap
page read and write
C27000
heap
page read and write
469207F000
stack
page read and write
1A64A0C7000
heap
page read and write
7FF87C2E0000
unkown
page readonly
1A64A020000
heap
page read and write
7FF87C2E1000
unkown
page execute read
7FF87C35E000
unkown
page read and write
1A64A0B8000
heap
page read and write
E3A69FD000
stack
page read and write
1AF039E9000
heap
page read and write
BC5000
heap
page read and write
1A64BB90000
trusted library allocation
page read and write
E3A67FE000
stack
page read and write
B6F000
heap
page read and write
D40000
trusted library allocation
page read and write
1A64A0BE000
heap
page read and write
1AF03910000
trusted library allocation
page read and write
12D8000
heap
page read and write
239F370C000
heap
page read and write
239F3741000
heap
page read and write
800000
heap
page read and write
B8E000
heap
page read and write
480000
heap
page read and write
965000
heap
page read and write
7FF87C35E000
unkown
page read and write
E44000
heap
page read and write
D50000
heap
page read and write
E27000
heap
page read and write
2CBF000
stack
page read and write
A11000
heap
page read and write
7FF87C2E0000
unkown
page readonly
1842897C000
heap
page read and write
95D000
heap
page read and write
18426FEE000
heap
page read and write
95D000
heap
page read and write
2CFC000
stack
page read and write
7FF87C362000
unkown
page readonly
2770000
trusted library allocation
page read and write
37A93DB000
stack
page read and write
E27000
heap
page read and write
955000
heap
page read and write
18002C000
direct allocation
page read and write
7D0000
heap
page read and write
9FC000
heap
page read and write
26A2000
heap
page read and write
7FF87C35E000
unkown
page read and write
8E0000
heap
page read and write
1A64A0D0000
heap
page read and write
18426FE0000
heap
page read and write
2E10000
trusted library allocation
page read and write
180000000
direct allocation
page read and write
25F0000
heap
page read and write
18426FE9000
heap
page read and write
E3A66FE000
stack
page read and write
7FF87C367000
unkown
page readonly
276C000
stack
page read and write
131C000
heap
page read and write
18002B000
direct allocation
page readonly
1AF03970000
trusted library allocation
page read and write
BD2000
heap
page read and write
239F4F80000
heap
page read and write
2ED0000
heap
page read and write
E4F000
heap
page read and write
965000
heap
page read and write
7FF87C362000
unkown
page readonly
9EE000
heap
page read and write
2F19000
heap
page read and write
E10000
heap
page readonly
18428A50000
heap
page readonly
BB1000
heap
page read and write
7FF87C318000
unkown
page readonly
BA8000
heap
page read and write
12FD000
heap
page read and write
B95000
heap
page read and write
18002C000
direct allocation
page read and write
7FF87C2E1000
unkown
page execute read
93B000
heap
page read and write
C32000
heap
page read and write
BD2000
heap
page read and write
24E0000
heap
page read and write
2D7F000
stack
page read and write
1AF03640000
heap
page read and write
239F371C000
heap
page read and write
1A64A087000
heap
page read and write
26A2000
heap
page read and write
DE5000
heap
page read and write
BAB000
heap
page read and write
18428B60000
trusted library allocation
page read and write
E46000
heap
page read and write
2698000
heap
page read and write
1A64A075000
heap
page read and write
239F3753000
heap
page read and write
18427036000
heap
page read and write
2E40000
heap
page read and write
965000
heap
page read and write
26A2000
heap
page read and write
E27000
heap
page read and write
DC0000
heap
page read and write
8F0000
heap
page read and write
239F370F000
heap
page read and write
805000
heap
page read and write
7FF87C2E0000
unkown
page readonly
18427010000
heap
page read and write
B88000
heap
page read and write
2651000
heap
page read and write
12FD000
heap
page read and write
7FF87C2E0000
unkown
page readonly
564E000
stack
page read and write
9F6000
heap
page read and write
820000
heap
page read and write
18426F40000
heap
page read and write
283F000
stack
page read and write
B40000
heap
page read and write
26C6000
heap
page read and write
2270000
heap
page read and write
18002D000
direct allocation
page readonly
239F4FAC000
heap
page read and write
1A64A2B0000
heap
page read and write
979000
heap
page read and write
7FF87C367000
unkown
page readonly
9C8000
heap
page read and write
239F3741000
heap
page read and write
9C0000
heap
page read and write
BA8000
heap
page read and write
96D000
heap
page read and write
560000
remote allocation
page read and write
224F000
stack
page read and write
397D000
stack
page read and write
B7F000
heap
page read and write
1A64A290000
direct allocation
page execute and read and write
18002D000
direct allocation
page readonly
4691CCC000
stack
page read and write
18002C000
direct allocation
page read and write
D60000
trusted library allocation
page read and write
3D0000
heap
page read and write
DF0000
heap
page read and write
127B000
stack
page read and write
1AF03660000
heap
page read and write
8C0000
heap
page read and write
E40000
heap
page read and write
23B0000
heap
page read and write
E45000
heap
page read and write
308A000
heap
page read and write
976000
heap
page read and write
2330000
heap
page read and write
18426F20000
heap
page read and write
18002D000
direct allocation
page readonly
261C000
heap
page read and write
B30000
direct allocation
page execute and read and write
7FF87C318000
unkown
page readonly
1A64A0A8000
heap
page read and write
7FD000
heap
page read and write
1337000
heap
page read and write
B7E000
heap
page read and write
1AF036A0000
heap
page read and write
BD2000
heap
page read and write
239F371C000
heap
page read and write
7F5000
heap
page read and write
96D000
heap
page read and write
BCB000
heap
page read and write
1A64A07B000
heap
page read and write
37A9779000
stack
page read and write
930000
heap
page read and write
23B3000
heap
page read and write
510000
remote allocation
page read and write
5C0000
heap
page read and write
1AF039E0000
heap
page read and write
960000
heap
page read and write
1A64A06E000
heap
page read and write
1AF044E0000
trusted library allocation
page read and write
BBE000
heap
page read and write
5310000
trusted library allocation
page read and write
180000000
direct allocation
page read and write
B7A000
heap
page read and write
18002B000
direct allocation
page readonly
1AF036EF000
heap
page read and write
1AF035E0000
trusted library allocation
page read and write
969000
heap
page read and write
239F5080000
trusted library allocation
page read and write
18002C000
direct allocation
page read and write
337E000
stack
page read and write
7FF87C318000
unkown
page readonly
130B000
heap
page read and write
2ED0000
heap
page read and write
966000
heap
page read and write
2E30000
heap
page read and write
18426FD5000
heap
page read and write
26B7000
heap
page read and write
7FF87C365000
unkown
page readonly
283E000
stack
page read and write
18427014000
heap
page read and write
BB0000
heap
page read and write
26DF000
stack
page read and write
9E5000
heap
page read and write
B86000
heap
page read and write
B85000
heap
page read and write
1AF039D0000
trusted library allocation
page read and write
2F19000
heap
page read and write
26A7000
heap
page read and write
18002D000
direct allocation
page readonly
18002B000
direct allocation
page readonly
2A19000
stack
page read and write
2FB7000
stack
page read and write
275E000
stack
page read and write
239F3715000
heap
page read and write
5B0000
remote allocation
page read and write
E27000
heap
page read and write
9F6000
heap
page read and write
805000
heap
page read and write
BC5000
heap
page read and write
1A64A07E000
heap
page read and write
7EF000
heap
page read and write
1306000
heap
page read and write
9F6000
heap
page read and write
805000
heap
page read and write
33FF000
stack
page read and write
2E7F000
stack
page read and write
18427039000
heap
page read and write
7FF87C365000
unkown
page readonly
A90000
heap
page read and write
1A64A0A8000
heap
page read and write
4D0000
heap
page read and write
7FF87C35E000
unkown
page read and write
74C000
heap
page read and write
1A64BA60000
heap
page read and write
BC5000
heap
page read and write
18002B000
direct allocation
page readonly
D20000
direct allocation
page execute and read and write
1AF03950000
trusted library allocation
page read and write
1A64BB90000
trusted library allocation
page read and write
95D000
heap
page read and write
4E9000
stack
page read and write
2C7D000
stack
page read and write
B8D000
heap
page read and write
2810000
heap
page read and write
9F6000
heap
page read and write
239F3717000
heap
page read and write
239F36E0000
heap
page read and write
1AF03980000
trusted library allocation
page read and write
1AF038A0000
trusted library allocation
page read and write
9F6000
heap
page read and write
D55000
heap
page read and write
239F36ED000
heap
page read and write
2360000
heap
page read and write
D30000
heap
page readonly
2E80000
heap
page read and write
132C000
heap
page read and write
46920F7000
stack
page read and write
37A98F9000
stack
page read and write
56CF000
stack
page read and write
18426FC0000
direct allocation
page execute and read and write
430000
heap
page read and write
2E6C000
heap
page read and write
9EE000
heap
page read and write
8FC000
heap
page read and write
239F3707000
heap
page read and write
7FF87C367000
unkown
page readonly
2671000
heap
page read and write
BBE000
heap
page read and write
7FF87C362000
unkown
page readonly
5600000
trusted library allocation
page read and write
18426FFF000
heap
page read and write
E3A68FB000
stack
page read and write
5B0000
remote allocation
page read and write
26A8000
heap
page read and write
239F3510000
heap
page read and write
1A649FB0000
heap
page read and write
E3A637C000
stack
page read and write
5AA0000
heap
page read and write
1A64A2B5000
heap
page read and write
1AF036E7000
heap
page read and write
239F3707000
heap
page read and write
A11000
heap
page read and write
BBA000
heap
page read and write
2770000
trusted library allocation
page read and write
353B000
stack
page read and write
469217C000
stack
page read and write
B4B000
heap
page read and write
26B8000
heap
page read and write
BAB000
heap
page read and write
1A64A0C7000
heap
page read and write
548E000
stack
page read and write
2E0E000
stack
page read and write
7FF87C2E1000
unkown
page execute read
BB0000
heap
page read and write
239F4FAC000
heap
page read and write
7FF87C367000
unkown
page readonly
1A64A0EA000
heap
page read and write
B7C000
heap
page read and write
2EF8000
heap
page read and write
283B000
stack
page read and write
18002B000
direct allocation
page readonly
B95000
heap
page read and write
B88000
heap
page read and write
180000000
direct allocation
page read and write
B7E000
heap
page read and write
7FF87C318000
unkown
page readonly
1A64A2A0000
heap
page readonly
BBE000
heap
page read and write
8F5000
heap
page read and write
7DB000
heap
page read and write
A7B000
stack
page read and write
58A000
stack
page read and write
B93000
heap
page read and write
975000
heap
page read and write
7FF87C365000
unkown
page readonly
7FD000
heap
page read and write
2D70000
direct allocation
page execute and read and write
FD0000
heap
page read and write
37A987E000
stack
page read and write
2820000
heap
page read and write
A80000
remote allocation
page read and write
9315A7F000
stack
page read and write
1A64A07B000
heap
page read and write
BC8000
heap
page read and write
B6E000
heap
page read and write
510000
remote allocation
page read and write
26B7000
heap
page read and write
9315AFF000
stack
page read and write
1A64A0B5000
heap
page read and write
C31000
heap
page read and write
239F50E0000
heap
page read and write
AB0000
heap
page read and write
1AF03960000
heap
page readonly
7FF87C2E1000
unkown
page execute read
5CC000
heap
page read and write
9B0000
heap
page read and write
1A64A220000
heap
page read and write
469227B000
stack
page read and write
9D0000
heap
page read and write
1AF038B0000
trusted library allocation
page read and write
180000000
direct allocation
page read and write
239F3714000
heap
page read and write
B95000
heap
page read and write
7FF87C2E0000
unkown
page readonly
5E0000
heap
page read and write
E20000
trusted library allocation
page read and write
1AF039F0000
trusted library allocation
page read and write
7FF87C365000
unkown
page readonly
975000
heap
page read and write
18002C000
direct allocation
page read and write
130E000
heap
page read and write
18427039000
heap
page read and write
239F36F3000
heap
page read and write
BC5000
heap
page read and write
B8D000
heap
page read and write
B95000
heap
page read and write
BB1000
heap
page read and write
E46000
heap
page read and write
2C0000
heap
page read and write
2273000
heap
page read and write
991000
heap
page read and write
28BE000
stack
page read and write
1A64A07F000
heap
page read and write
965000
heap
page read and write
8E5000
heap
page read and write
7FF87C367000
unkown
page readonly
239F36B0000
direct allocation
page execute and read and write
18426FD0000
heap
page read and write
1A64BBC0000
heap
page read and write
7A0000
heap
page read and write
FF0000
heap
page read and write
18426FFF000
heap
page read and write
E38000
heap
page read and write
2780000
remote allocation
page read and write
18002C000
direct allocation
page read and write
8A0000
heap
page read and write
1AF036EF000
heap
page read and write
E3E000
heap
page read and write
E69000
heap
page read and write
9F6000
heap
page read and write
3B0000
heap
page read and write
7FF87C362000
unkown
page readonly
9EE000
heap
page read and write
FF5000
heap
page read and write
4691DCE000
stack
page read and write
1842704B000
heap
page read and write
E35000
heap
page read and write
590000
heap
page read and write
180000000
direct allocation
page read and write
2BFC000
stack
page read and write
740000
heap
page read and write
9EA000
heap
page read and write
806000
heap
page read and write
26A2000
heap
page read and write
4691D4E000
stack
page read and write
975000
heap
page read and write
7FF87C318000
unkown
page readonly
B6E000
heap
page read and write
BAB000
heap
page read and write
7B0000
heap
page read and write
239F3714000
heap
page read and write
B85000
heap
page read and write
239F5080000
trusted library allocation
page read and write
1A64A0A8000
heap
page read and write
2629000
heap
page read and write
BBE000
heap
page read and write
239F3650000
heap
page read and write
7FF87C362000
unkown
page readonly
1280000
heap
page read and write
239F36C0000
heap
page read and write
34BE000
stack
page read and write
BD2000
heap
page read and write
2EF9000
heap
page read and write
46921FE000
stack
page read and write
18002B000
direct allocation
page readonly
There are 517 hidden memdumps, click here to show them.