IOC Report
DVvzRulsoR.exe

loading gif

Files

File Path
Type
Category
Malicious
DVvzRulsoR.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\DVvzRulsoR.dll"
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\DVvzRulsoR.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\DVvzRulsoR.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\DVvzRulsoR.dll,DllRegisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XbzeDYiEMjhuDu\OFkfcZsheb.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\OjshMzvO\drOxhskRmolSyam.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XvLyRsZAjXO\BWic.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\HAZEhjzZpU\MdCGCivK.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\XbzeDYiEMjhuDu\OFkfcZsheb.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\PbznyUjcmjZG\mlrNU.dll"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\DVvzRulsoR.dll",#1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://172.105.115.71:8080/dwhiakgtheb/puspmvuhrxeol/
unknown
https://172.105.115.71:8080/s.dll
unknown

IPs

IP
Domain
Country
Malicious
172.105.115.71
unknown
United States
malicious
188.165.79.151
unknown
France
malicious
196.44.98.190
unknown
Ghana
malicious
174.138.33.49
unknown
United States
malicious
36.67.23.59
unknown
Indonesia
malicious
103.41.204.169
unknown
Indonesia
malicious
85.214.67.203
unknown
Germany
malicious
83.229.80.93
unknown
United Kingdom
malicious
198.199.70.22
unknown
United States
malicious
93.104.209.107
unknown
Germany
malicious
186.250.48.5
unknown
Brazil
malicious
209.239.112.82
unknown
United States
malicious
175.126.176.79
unknown
Korea Republic of
malicious
128.199.242.164
unknown
United Kingdom
malicious
178.238.225.252
unknown
Germany
malicious
46.101.98.60
unknown
Netherlands
malicious
190.145.8.4
unknown
Colombia
malicious
82.98.180.154
unknown
Spain
malicious
103.71.99.57
unknown
India
malicious
87.106.97.83
unknown
Germany
malicious
103.254.12.236
unknown
Viet Nam
malicious
103.85.95.4
unknown
Indonesia
malicious
202.134.4.210
unknown
Indonesia
malicious
165.22.254.236
unknown
United States
malicious
78.47.204.80
unknown
Germany
malicious
118.98.72.86
unknown
Indonesia
malicious
139.59.80.108
unknown
Singapore
malicious
104.244.79.94
unknown
United States
malicious
37.44.244.177
unknown
Germany
malicious
51.75.33.122
unknown
France
malicious
160.16.143.191
unknown
Japan
malicious
103.56.149.105
unknown
Indonesia
malicious
85.25.120.45
unknown
Germany
malicious
139.196.72.155
unknown
China
malicious
115.178.55.22
unknown
Indonesia
malicious
103.126.216.86
unknown
Bangladesh
malicious
128.199.217.206
unknown
United Kingdom
malicious
114.79.130.68
unknown
India
malicious
103.224.241.74
unknown
India
malicious
210.57.209.142
unknown
Indonesia
malicious
202.28.34.99
unknown
Thailand
malicious
80.211.107.116
unknown
Italy
malicious
54.37.228.122
unknown
France
malicious
218.38.121.17
unknown
Korea Republic of
malicious
185.148.169.10
unknown
Germany
malicious
195.77.239.39
unknown
Spain
malicious
178.62.112.199
unknown
European Union
malicious
62.171.178.147
unknown
United Kingdom
malicious
64.227.55.231
unknown
United States
malicious
There are 39 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
OFkfcZsheb.dll
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
180001000
direct allocation
page execute read
malicious
1D380100000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
2190000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
2A20000
direct allocation
page execute and read and write
malicious
20F583F0000
direct allocation
page execute and read and write
malicious
970000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
1D0BF950000
direct allocation
page execute and read and write
malicious
20F584BC000
heap
page read and write
A17000
heap
page read and write
F7D000
heap
page read and write
1220000
heap
page read and write
E4E000
heap
page read and write
12A1000
heap
page read and write
869000
heap
page read and write
1D0BDFC3000
heap
page read and write
29D3000
heap
page read and write
FAD000
heap
page read and write
7FFA09577000
unkown
page readonly
4530000
heap
page read and write
7FFA09575000
unkown
page readonly
20F5A070000
heap
page read and write
E28000
heap
page read and write
F0A000
heap
page read and write
1D3FC940000
heap
page read and write
1D0BE003000
heap
page read and write
1286000
heap
page read and write
2959000
heap
page read and write
1D3FC8B0000
heap
page read and write
83C000
heap
page read and write
18002C000
direct allocation
page read and write
C4BF0FF000
stack
page read and write
ECA000
heap
page read and write
3130000
heap
page read and write
380000
heap
page read and write
1170000
heap
page read and write
20F584B0000
heap
page read and write
F0A000
heap
page read and write
DB3000
heap
page read and write
F49000
heap
page read and write
273E000
stack
page read and write
2E79000
heap
page read and write
E15000
heap
page read and write
58DCAFE000
stack
page read and write
F2D000
heap
page read and write
1D0BDFB7000
heap
page read and write
20F58497000
heap
page read and write
20F58380000
heap
page read and write
5EB000
stack
page read and write
29D7000
heap
page read and write
E80000
remote allocation
page read and write
1270000
heap
page read and write
3D0F000
stack
page read and write
1D0BDFBE000
heap
page read and write
20F58501000
heap
page read and write
F5A000
heap
page read and write
F57000
heap
page read and write
A6B000
heap
page read and write
AEF000
heap
page read and write
A59000
heap
page read and write
2A60000
trusted library allocation
page read and write
128E000
heap
page read and write
AFD000
heap
page read and write
1D0BF87C000
heap
page read and write
29C9000
heap
page read and write
8A0B000
stack
page read and write
2DD0000
remote allocation
page read and write
7FFA09575000
unkown
page readonly
1D380300000
heap
page read and write
8A8C000
stack
page read and write
58DC7CC000
stack
page read and write
29D3000
heap
page read and write
22E0000
trusted library allocation
page read and write
A48000
heap
page read and write
F47000
heap
page read and write
F57000
heap
page read and write
58DCCF9000
stack
page read and write
7FFA09577000
unkown
page readonly
2E99000
heap
page read and write
E40000
heap
page read and write
F0E000
heap
page read and write
7FFA09577000
unkown
page readonly
18002C000
direct allocation
page read and write
F2D000
heap
page read and write
1D3FCB35000
heap
page read and write
29D3000
heap
page read and write
F29000
heap
page read and write
E10000
heap
page read and write
7ED000
heap
page read and write
81D000
heap
page read and write
F29000
heap
page read and write
20F58430000
heap
page readonly
F14000
heap
page read and write
F51000
heap
page read and write
A36000
heap
page read and write
20F586E5000
heap
page read and write
F57000
heap
page read and write
30B000
stack
page read and write
10D0000
direct allocation
page execute and read and write
EF9000
stack
page read and write
898E000
stack
page read and write
84BE000
stack
page read and write
F2D000
heap
page read and write
360000
heap
page read and write
BD0000
remote allocation
page read and write
29D4000
heap
page read and write
7FFA09577000
unkown
page readonly
7FFA09575000
unkown
page readonly
29DB000
heap
page read and write
1D0BDFF2000
heap
page read and write
12A1000
heap
page read and write
E1C000
heap
page read and write
F14000
heap
page read and write
8B8C000
stack
page read and write
7FFA094F1000
unkown
page execute read
F04000
heap
page read and write
20F584CA000
heap
page read and write
7FFA09577000
unkown
page readonly
F1A000
heap
page read and write
EF2000
heap
page read and write
29A2000
heap
page read and write
821000
heap
page read and write
84B000
heap
page read and write
1D3FC95F000
heap
page read and write
5CE0000
trusted library allocation
page read and write
AD8000
heap
page read and write
127A000
heap
page read and write
E00000
heap
page read and write
180000000
direct allocation
page read and write
20F584EA000
heap
page read and write
81D000
heap
page read and write
22C0000
trusted library allocation
page read and write
E7B000
stack
page read and write
1D0BF87C000
heap
page read and write
F57000
heap
page read and write
C4BF279000
stack
page read and write
20F584EA000
heap
page read and write
F07000
heap
page read and write
F47000
heap
page read and write
F09000
heap
page read and write
F09000
heap
page read and write
5980000
heap
page read and write
20F584EA000
heap
page read and write
7C0000
heap
page read and write
18002B000
direct allocation
page readonly
A48000
heap
page read and write
18002D000
direct allocation
page readonly
1D0BDE40000
heap
page read and write
2DD0000
remote allocation
page read and write
530000
heap
page read and write
F0E000
heap
page read and write
22D0000
heap
page readonly
40FE000
stack
page read and write
8309AFB000
stack
page read and write
8439000
stack
page read and write
7FFA09572000
unkown
page readonly
F47000
heap
page read and write
1D0BFA20000
heap
page read and write
7F5000
heap
page read and write
127E000
heap
page read and write
20F584B7000
heap
page read and write
58DCBFE000
stack
page read and write
1D0BF990000
heap
page read and write
18002D000
direct allocation
page readonly
7FFA094F0000
unkown
page readonly
7FFA09572000
unkown
page readonly
2350000
heap
page read and write
1D0BDFCD000
heap
page read and write
7FFA09528000
unkown
page readonly
3002000
heap
page read and write
7FFA094F1000
unkown
page execute read
1D3FCB30000
heap
page read and write
1D3FC770000
heap
page read and write
7DF000
heap
page read and write
1D380130000
direct allocation
page execute and read and write
A25000
heap
page read and write
340000
heap
page read and write
F47000
heap
page read and write
1D0BDFB7000
heap
page read and write
20F584B7000
heap
page read and write
1D0BDFB7000
heap
page read and write
7FFA09572000
unkown
page readonly
F0A000
heap
page read and write
29D7000
heap
page read and write
7E4000
heap
page read and write
A17000
heap
page read and write
20F586E0000
heap
page read and write
F20000
remote allocation
page read and write
7FFA0956E000
unkown
page read and write
2090000
heap
page read and write
142C000
heap
page read and write
2C93000
heap
page read and write
830987F000
stack
page read and write
B05000
heap
page read and write
5CDE000
stack
page read and write
AFD000
heap
page read and write
180000000
direct allocation
page read and write
857000
heap
page read and write
1D0BDF9D000
heap
page read and write
C4BF2FE000
stack
page read and write
18002B000
direct allocation
page readonly
F29000
heap
page read and write
7F0000
heap
page read and write
21A0000
heap
page read and write
7FFA0956E000
unkown
page read and write
7FFA09528000
unkown
page readonly
1425000
heap
page read and write
F29000
heap
page read and write
F0F000
heap
page read and write
F4A000
heap
page read and write
B05000
heap
page read and write
83095BE000
stack
page read and write
FB2000
heap
page read and write
7FFA09577000
unkown
page readonly
1D0BDFBB000
heap
page read and write
FA6000
heap
page read and write
9BB000
heap
page read and write
223E000
stack
page read and write
A2E000
heap
page read and write
20F58512000
heap
page read and write
7BC000
heap
page read and write
E57000
heap
page read and write
1420000
heap
page read and write
2E00000
heap
page read and write
7E0000
remote allocation
page read and write
508E000
stack
page read and write
18002D000
direct allocation
page readonly
29DB000
heap
page read and write
29D7000
heap
page read and write
F57000
heap
page read and write
1250000
heap
page read and write
29DA000
heap
page read and write
8309A7E000
stack
page read and write
2A60000
trusted library allocation
page read and write
27BB000
stack
page read and write
3E0000
heap
page readonly
7FFA09572000
unkown
page readonly
F47000
heap
page read and write
7B0000
heap
page read and write
180000000
direct allocation
page read and write
F94000
heap
page read and write
180000000
direct allocation
page read and write
2340000
heap
page read and write
F2D000
heap
page read and write
1D380240000
trusted library allocation
page read and write
F34000
heap
page read and write
7FFA0956E000
unkown
page read and write
82B000
heap
page read and write
20BC000
heap
page read and write
A80000
heap
page read and write
3F0000
remote allocation
page read and write
F29000
heap
page read and write
1286000
heap
page read and write
2DB0000
trusted library allocation
page read and write
5180000
trusted library allocation
page read and write
E4E000
heap
page read and write
21A3000
heap
page read and write
A3F000
heap
page read and write
2E99000
heap
page read and write
20F58240000
heap
page read and write
6F0000
heap
page read and write
20F584FB000
heap
page read and write
2C90000
heap
page read and write
935000
heap
page read and write
1D380000000
heap
page read and write
7F8000
heap
page read and write
EC0000
heap
page read and write
20F58470000
trusted library allocation
page read and write
7FFA09575000
unkown
page readonly
1D3FC8D0000
heap
page read and write
BA9000
stack
page read and write
20F58509000
heap
page read and write
18002C000
direct allocation
page read and write
7FFA09528000
unkown
page readonly
7FFA094F1000
unkown
page execute read
E45000
heap
page read and write
3C0000
direct allocation
page execute and read and write
E80000
remote allocation
page read and write
310000
heap
page read and write
AFD000
heap
page read and write
C4BF17E000
stack
page read and write
7FFA094F0000
unkown
page readonly
910000
heap
page read and write
58DCEFE000
stack
page read and write
1286000
heap
page read and write
7FFA0956E000
unkown
page read and write
C4BF1FE000
stack
page read and write
1D3FC999000
heap
page read and write
11A0000
heap
page read and write
250000
heap
page read and write
397D000
stack
page read and write
1D3FC970000
heap
page read and write
7ED000
heap
page read and write
AD0000
heap
page read and write
29D7000
heap
page read and write
1275000
heap
page read and write
F8E000
heap
page read and write
1D0BDF90000
heap
page read and write
D3D000
stack
page read and write
E53000
heap
page read and write
180000000
direct allocation
page read and write
1D0BF850000
heap
page read and write
AF0000
heap
page read and write
EFF000
heap
page read and write
2DD0000
remote allocation
page read and write
E4E000
heap
page read and write
9D5000
heap
page read and write
18002C000
direct allocation
page read and write
6D0000
heap
page read and write
83098FC000
stack
page read and write
20F58420000
direct allocation
page execute and read and write
7FFA094F1000
unkown
page execute read
1D0BDFD7000
heap
page read and write
2920000
heap
page read and write
E40000
heap
page read and write
F34000
heap
page read and write
F19000
heap
page read and write
DB0000
heap
page read and write
1275000
heap
page read and write
1D3FC9AB000
heap
page read and write
F37000
heap
page read and write
83BE000
stack
page read and write
C4BEDCC000
stack
page read and write
EFF000
heap
page read and write
3CA000
stack
page read and write
20F5852D000
heap
page read and write
7FFA094F1000
unkown
page execute read
F0E000
heap
page read and write
C4BF07E000
stack
page read and write
20F585BC000
heap
page read and write
AF4000
heap
page read and write
1D0BE090000
heap
page read and write
2920000
heap
page read and write
8F0000
heap
page read and write
56A0000
trusted library allocation
page read and write
1D3FC994000
heap
page read and write
1D380140000
heap
page readonly
7B5000
heap
page read and write
1D0BDFC5000
heap
page read and write
F49000
heap
page read and write
B06000
heap
page read and write
18002B000
direct allocation
page readonly
7FFA09575000
unkown
page readonly
180000000
direct allocation
page read and write
2E50000
heap
page read and write
127E000
heap
page read and write
1286000
heap
page read and write
20F58490000
heap
page read and write
F30000
heap
page read and write
1287000
heap
page read and write
1D3FC983000
heap
page read and write
A17000
heap
page read and write
1D3FC95F000
heap
page read and write
2923000
heap
page read and write
510E000
stack
page read and write
1090000
heap
page read and write
83099FE000
stack
page read and write
1D0BFA80000
heap
page read and write
E56000
heap
page read and write
A17000
heap
page read and write
126F000
heap
page read and write
7ED000
heap
page read and write
1D3FC999000
heap
page read and write
31CE000
stack
page read and write
22B7000
stack
page read and write
1D0BF9B0000
trusted library allocation
page read and write
11AC000
heap
page read and write
E56000
heap
page read and write
29D3000
heap
page read and write
F20000
remote allocation
page read and write
1D0BDFF2000
heap
page read and write
5C5E000
stack
page read and write
F94000
heap
page read and write
A17000
heap
page read and write
7FFA094F0000
unkown
page readonly
20F583A0000
heap
page read and write
F8F000
heap
page read and write
29D4000
heap
page read and write
E20000
heap
page read and write
F40000
heap
page read and write
A28000
heap
page read and write
9B0000
heap
page read and write
1258000
heap
page read and write
9A0000
direct allocation
page execute and read and write
830953C000
stack
page read and write
1D3FC95F000
heap
page read and write
1D0BF980000
direct allocation
page execute and read and write
F50000
heap
page read and write
11A5000
heap
page read and write
8B0D000
stack
page read and write
29C9000
heap
page read and write
18002C000
direct allocation
page read and write
58DCFFE000
stack
page read and write
13FE000
stack
page read and write
2A50000
heap
page readonly
58DCDFE000
stack
page read and write
780000
heap
page read and write
8C0F000
stack
page read and write
18002B000
direct allocation
page readonly
7E0000
remote allocation
page read and write
7FFA094F0000
unkown
page readonly
2AC0000
heap
page read and write
930000
heap
page read and write
7FFA09528000
unkown
page readonly
2E50000
heap
page read and write
7FFA09575000
unkown
page readonly
BA0000
heap
page read and write
6430000
heap
page read and write
7FFA0956E000
unkown
page read and write
20F58590000
heap
page read and write
FAD000
heap
page read and write
20F584EA000
heap
page read and write
3D0000
heap
page read and write
7FFA09528000
unkown
page readonly
E56000
heap
page read and write
3D8F000
stack
page read and write
18002B000
direct allocation
page readonly
2E78000
heap
page read and write
5EA0000
heap
page read and write
F4D000
heap
page read and write
F47000
heap
page read and write
29DB000
heap
page read and write
1D0BDFA3000
heap
page read and write
1D3FC948000
heap
page read and write
F5A000
heap
page read and write
F6C000
heap
page read and write
2DB0000
trusted library allocation
page read and write
22CE000
stack
page read and write
BD0000
remote allocation
page read and write
EE5000
heap
page read and write
7FFA094F0000
unkown
page readonly
2980000
heap
page read and write
22E0000
trusted library allocation
page read and write
127E000
heap
page read and write
1175000
heap
page read and write
20F5851B000
heap
page read and write
F35000
heap
page read and write
20F58509000
heap
page read and write
74F000
stack
page read and write
10E0000
heap
page read and write
1D0BFA85000
heap
page read and write
29FB000
heap
page read and write
5C30000
trusted library allocation
page read and write
81D000
heap
page read and write
7FFA09572000
unkown
page readonly
E56000
heap
page read and write
7C8000
heap
page read and write
29A0000
heap
page read and write
3F0000
trusted library allocation
page read and write
857000
heap
page read and write
A34000
heap
page read and write
12A9000
heap
page read and write
A36000
heap
page read and write
7FFA0956E000
unkown
page read and write
1D380240000
trusted library allocation
page read and write
1200000
heap
page read and write
7FFA094F0000
unkown
page readonly
EFB000
heap
page read and write
7F5000
heap
page read and write
7F6000
heap
page read and write
385000
heap
page read and write
18002B000
direct allocation
page readonly
833E000
stack
page read and write
E4A000
heap
page read and write
F8F000
heap
page read and write
20F584EA000
heap
page read and write
18002C000
direct allocation
page read and write
7FFA09572000
unkown
page readonly
F29000
heap
page read and write
127E000
heap
page read and write
8309976000
stack
page read and write
F94000
heap
page read and write
B05000
heap
page read and write
9E0000
heap
page read and write
E90000
heap
page read and write
20F584F8000
heap
page read and write
BE0000
heap
page read and write
18002D000
direct allocation
page readonly
1D0BF9B0000
trusted library allocation
page read and write
A7A000
stack
page read and write
20F58690000
trusted library allocation
page read and write
FB3000
heap
page read and write
F3A000
heap
page read and write
D70000
heap
page read and write
C4BF37E000
stack
page read and write
780000
heap
page read and write
18002D000
direct allocation
page readonly
20F58508000
heap
page read and write
7FFA094F1000
unkown
page execute read
3F0000
remote allocation
page read and write
18002D000
direct allocation
page readonly
F2D000
heap
page read and write
AA0000
heap
page read and write
7CF000
stack
page read and write
F0E000
heap
page read and write
29C9000
heap
page read and write
F35000
heap
page read and write
29DA000
heap
page read and write
26BE000
stack
page read and write
7F5000
heap
page read and write
839000
heap
page read and write
29DD000
heap
page read and write
F0E000
heap
page read and write
1D38002C000
heap
page read and write
7FFA09528000
unkown
page readonly
F14000
heap
page read and write
1D3FC94E000
heap
page read and write
A17000
heap
page read and write
There are 502 hidden memdumps, click here to show them.