IOC Report
UC2DFXQIBiE2kQ.dll

loading gif

Files

File Path
Type
Category
Malicious
UC2DFXQIBiE2kQ.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,ACeujVZMknFDjv
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,AHuDGMflBfPryOEYjuTfbzJdEM
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\MHtsbrv\IoiBQ.dll"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,ATjQPkInxPUGuUu
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\MHtsbrv\IoiBQ.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\VADoV\ahExZn.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\IUvcffQnjRFArsrM\JZgYREHBQT.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\IUvcffQnjRFArsrM\JZgYREHBQT.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\ZamKJmwegN\JeCOx.dll"
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://172.105.115.71:8080/
unknown
https://172.105.115.71:8080/sznnz/
unknown
https://112.105.115.71:8080/
unknown
https://172.105.115.71:8080/lskyxdliqorbrr/wjoazpr/kccttvfhu/
unknown
https://172.105.115.71:8080/lskyxdliqorbrr/wjoazpr/kccttvfhu/dll
unknown

Domains

Name
IP
Malicious
c-0001.c-msedge.net
13.107.4.50
windowsupdatebg.s.llnwi.net
41.63.96.128

IPs

IP
Domain
Country
Malicious
172.105.115.71
unknown
United States
malicious
188.165.79.151
unknown
France
malicious
196.44.98.190
unknown
Ghana
malicious
174.138.33.49
unknown
United States
malicious
36.67.23.59
unknown
Indonesia
malicious
103.41.204.169
unknown
Indonesia
malicious
85.214.67.203
unknown
Germany
malicious
83.229.80.93
unknown
United Kingdom
malicious
198.199.70.22
unknown
United States
malicious
93.104.209.107
unknown
Germany
malicious
186.250.48.5
unknown
Brazil
malicious
209.239.112.82
unknown
United States
malicious
175.126.176.79
unknown
Korea Republic of
malicious
128.199.242.164
unknown
United Kingdom
malicious
178.238.225.252
unknown
Germany
malicious
46.101.98.60
unknown
Netherlands
malicious
190.145.8.4
unknown
Colombia
malicious
82.98.180.154
unknown
Spain
malicious
103.71.99.57
unknown
India
malicious
87.106.97.83
unknown
Germany
malicious
103.254.12.236
unknown
Viet Nam
malicious
103.85.95.4
unknown
Indonesia
malicious
202.134.4.210
unknown
Indonesia
malicious
165.22.254.236
unknown
United States
malicious
78.47.204.80
unknown
Germany
malicious
118.98.72.86
unknown
Indonesia
malicious
139.59.80.108
unknown
Singapore
malicious
104.244.79.94
unknown
United States
malicious
37.44.244.177
unknown
Germany
malicious
51.75.33.122
unknown
France
malicious
160.16.143.191
unknown
Japan
malicious
103.56.149.105
unknown
Indonesia
malicious
85.25.120.45
unknown
Germany
malicious
139.196.72.155
unknown
China
malicious
115.178.55.22
unknown
Indonesia
malicious
103.126.216.86
unknown
Bangladesh
malicious
128.199.217.206
unknown
United Kingdom
malicious
114.79.130.68
unknown
India
malicious
103.224.241.74
unknown
India
malicious
210.57.209.142
unknown
Indonesia
malicious
202.28.34.99
unknown
Thailand
malicious
80.211.107.116
unknown
Italy
malicious
54.37.228.122
unknown
France
malicious
218.38.121.17
unknown
Korea Republic of
malicious
185.148.169.10
unknown
Germany
malicious
195.77.239.39
unknown
Spain
malicious
178.62.112.199
unknown
European Union
malicious
62.171.178.147
unknown
United Kingdom
malicious
64.227.55.231
unknown
United States
malicious
There are 39 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
IoiBQ.dll
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
JZgYREHBQT.dll
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2D41000
direct allocation
page execute read
malicious
2371000
direct allocation
page execute read
malicious
2D10000
direct allocation
page execute and read and write
malicious
1FA0A8D1000
direct allocation
page execute read
malicious
F51000
direct allocation
page execute read
malicious
F00000
direct allocation
page execute and read and write
malicious
1FA0A880000
direct allocation
page execute and read and write
malicious
2D49CBA1000
direct allocation
page execute read
malicious
2220000
direct allocation
page execute and read and write
malicious
2112E630000
direct allocation
page execute and read and write
malicious
2112E661000
direct allocation
page execute read
malicious
2D49C940000
direct allocation
page execute and read and write
malicious
1FA0A966000
heap
page read and write
1FA0A8B0000
heap
page read and write
DD6000
heap
page read and write
82D000
heap
page read and write
4C0000
heap
page read and write
DCE000
heap
page read and write
DE7000
heap
page read and write
1FA0A900000
heap
page read and write
10F0000
heap
page read and write
2270000
heap
page read and write
E00000
heap
page read and write
13D7000
heap
page read and write
2112E660000
direct allocation
page read and write
E04000
heap
page read and write
27E9000
heap
page read and write
DED000
heap
page read and write
2906A8C1000
heap
page read and write
1146000
heap
page read and write
139E000
stack
page read and write
2906A8C1000
heap
page read and write
C679E8B000
stack
page read and write
2906AB20000
heap
page read and write
1415000
heap
page read and write
221C4E80000
heap
page read and write
2906DD03000
heap
page read and write
2112CBF9000
heap
page read and write
221C5BF0000
trusted library allocation
page read and write
E70000
heap
page read and write
28AC000
stack
page read and write
DBE000
heap
page read and write
DD4000
heap
page read and write
2112E68B000
direct allocation
page readonly
F50000
direct allocation
page read and write
DAD000
heap
page read and write
2D6D000
stack
page read and write
3021000
heap
page read and write
2C70000
trusted library allocation
page read and write
FC5000
heap
page read and write
1FA0A6D0000
heap
page read and write
13A9000
heap
page read and write
2112CBAE000
heap
page read and write
DF4000
heap
page read and write
DC6000
heap
page read and write
239D000
direct allocation
page readonly
1150000
heap
page read and write
F7C000
direct allocation
page read and write
DF4000
heap
page read and write
2F80000
heap
page read and write
5B0000
heap
page read and write
E52000
heap
page read and write
2906A8A9000
heap
page read and write
180001000
unkown
page execute read
E90000
heap
page read and write
1FA0A8D0000
direct allocation
page read and write
DC9000
heap
page read and write
DC9000
heap
page read and write
10C0000
remote allocation
page read and write
1146000
heap
page read and write
2906A8C3000
heap
page read and write
180000000
unkown
page readonly
2D6D000
direct allocation
page readonly
82D000
heap
page read and write
2EAF000
stack
page read and write
1135000
heap
page read and write
DE0000
heap
page read and write
2CED000
stack
page read and write
C679F8E000
stack
page read and write
2112CC2A000
heap
page read and write
F4B000
stack
page read and write
2112CC16000
heap
page read and write
57B000
stack
page read and write
221C4F0A000
heap
page read and write
2250000
direct allocation
page execute and read and write
2906A8CC000
heap
page read and write
2112CC18000
heap
page read and write
2112CBBF000
heap
page read and write
C679F0E000
stack
page read and write
134F000
stack
page read and write
1130000
heap
page read and write
27EC000
heap
page read and write
2D49CC05000
heap
page read and write
DDC000
heap
page read and write
2906A8BD000
heap
page read and write
6F57B4E000
stack
page read and write
DBA000
heap
page read and write
FA64B5C000
stack
page read and write
1FA0A99B000
heap
page read and write
867000
heap
page read and write
905EBAF000
stack
page read and write
221C50F5000
heap
page read and write
2E7E000
stack
page read and write
2D49C8D0000
heap
page read and write
E74000
heap
page read and write
FA64E7F000
stack
page read and write
B7C36FD000
stack
page read and write
139D000
heap
page read and write
113E000
heap
page read and write
1FA0A8FB000
direct allocation
page readonly
2906A8B9000
heap
page read and write
18004C000
unkown
page readonly
2DFF000
stack
page read and write
DED000
heap
page read and write
27E9000
heap
page read and write
229C000
heap
page read and write
27D8000
heap
page read and write
E52000
heap
page read and write
23A0000
heap
page readonly
2790000
heap
page read and write
2112CB20000
heap
page read and write
1FA0C2A0000
heap
page readonly
DAD000
heap
page read and write
221C4F15000
heap
page read and write
1FA0A976000
heap
page read and write
E52000
heap
page read and write
221C50D0000
heap
page readonly
2906DD00000
heap
page read and write
2516979000
stack
page read and write
E04000
heap
page read and write
2769000
heap
page read and write
1FA0A8B5000
heap
page read and write
180001000
unkown
page execute read
10D0000
heap
page read and write
83E000
heap
page read and write
10C0000
remote allocation
page read and write
27E9000
heap
page read and write
2D70000
heap
page readonly
1161000
heap
page read and write
82E000
heap
page read and write
2C3C000
heap
page read and write
1FA0A908000
heap
page read and write
13E9000
heap
page read and write
18004C000
unkown
page readonly
DBE000
heap
page read and write
2D49CA0B000
heap
page read and write
2D80000
trusted library allocation
page read and write
13C7000
heap
page read and write
3049000
heap
page read and write
31BF000
heap
page read and write
113E000
heap
page read and write
27D8000
heap
page read and write
1FA0A958000
heap
page read and write
DE7000
heap
page read and write
113A000
heap
page read and write
83B000
heap
page read and write
DD6000
heap
page read and write
2906A8B9000
heap
page read and write
2D49C980000
heap
page readonly
2FD8000
heap
page read and write
221C4F0C000
heap
page read and write
27B1000
heap
page read and write
8D7E000
stack
page read and write
221C4EC0000
heap
page read and write
F85000
heap
page read and write
E52000
heap
page read and write
2FB1000
heap
page read and write
13AB000
heap
page read and write
1FA0C460000
heap
page read and write
2730000
heap
page read and write
1F423000000
heap
page read and write
1FA0A958000
heap
page read and write
2112CBF9000
heap
page read and write
E07000
heap
page read and write
113E000
heap
page read and write
845F000
stack
page read and write
1099000
stack
page read and write
D60000
direct allocation
page execute and read and write
13D0000
heap
page read and write
B85000
heap
page read and write
2112E530000
heap
page read and write
DCC000
heap
page read and write
DC6000
heap
page read and write
2260000
heap
page read and write
3049000
heap
page read and write
2D49CAA0000
heap
page read and write
1110000
heap
page read and write
2112CBF9000
heap
page read and write
82D000
heap
page read and write
180001000
unkown
page execute read
F80000
heap
page read and write
2906A8CC000
heap
page read and write
2906A8C1000
heap
page read and write
2D40000
direct allocation
page read and write
2112CBF9000
heap
page read and write
8B0000
heap
page read and write
6F57ACC000
stack
page read and write
2906A8D1000
heap
page read and write
E0A000
heap
page read and write
2D90000
remote allocation
page read and write
251687E000
stack
page read and write
2D49C790000
heap
page read and write
DED000
heap
page read and write
1FA0A958000
heap
page read and write
DC6000
heap
page read and write
FA0000
heap
page read and write
2112CB40000
heap
page read and write
180098000
unkown
page read and write
E04000
heap
page read and write
DF9000
heap
page read and write
239C000
direct allocation
page read and write
139D000
heap
page read and write
FA64BDF000
stack
page read and write
2906E510000
heap
page read and write
83DE000
stack
page read and write
221C5E00000
trusted library allocation
page read and write
221F000
stack
page read and write
E70000
heap
page read and write
2D49CBCD000
direct allocation
page readonly
2112CBF9000
heap
page read and write
2D49C9BF000
heap
page read and write
1161000
heap
page read and write
DCD000
heap
page read and write
990000
remote allocation
page read and write
18004C000
unkown
page readonly
84DC000
stack
page read and write
E52000
heap
page read and write
2112CAB0000
heap
page read and write
2906A8A0000
heap
page read and write
2112E55C000
heap
page read and write
221C5E50000
trusted library allocation
page read and write
221C5100000
trusted library allocation
page read and write
DB0000
heap
page read and write
1FA0A830000
heap
page read and write
2FF9000
heap
page read and write
2906AB25000
heap
page read and write
2906A8C3000
heap
page read and write
F80000
heap
page read and write
2D49C9BF000
heap
page read and write
25168F9000
stack
page read and write
8C7E000
stack
page read and write
2112CC0A000
heap
page read and write
221C4EC8000
heap
page read and write
82DC000
stack
page read and write
DF5000
heap
page read and write
1FA0A810000
heap
page read and write
2D49CC00000
heap
page read and write
221C4F2B000
heap
page read and write
2906AB2B000
heap
page read and write
9A0000
heap
page read and write
2D49CBA0000
direct allocation
page read and write
F7D000
direct allocation
page readonly
905EB2F000
stack
page read and write
221C4F0C000
heap
page read and write
27FB000
heap
page read and write
2C10000
heap
page read and write
139F000
heap
page read and write
B80000
heap
page read and write
2D90000
remote allocation
page read and write
2906A8BE000
heap
page read and write
800000
heap
page read and write
2112CF10000
heap
page read and write
2FB0000
heap
page read and write
1FA0A8C0000
direct allocation
page execute and read and write
808000
heap
page read and write
FC0000
heap
page read and write
5D0000
heap
page read and write
E52000
heap
page read and write
180000000
unkown
page readonly
221C4D40000
heap
page read and write
2906A850000
heap
page read and write
E0B000
heap
page read and write
2112CC18000
heap
page read and write
DDD000
heap
page read and write
2906A7C0000
heap
page read and write
221C4F0E000
heap
page read and write
2516779000
stack
page read and write
DED000
heap
page read and write
DBB000
heap
page read and write
E0E000
heap
page read and write
2D49C970000
direct allocation
page execute and read and write
18009B000
unkown
page readonly
1410000
heap
page read and write
2906A8D8000
heap
page read and write
3020000
heap
page read and write
D8B000
heap
page read and write
2112CBA0000
heap
page read and write
D70000
heap
page readonly
221C50F0000
heap
page read and write
2906DD10000
trusted library allocation
page read and write
DAD000
heap
page read and write
8356000
stack
page read and write
905EAAC000
stack
page read and write
3020000
heap
page read and write
2D49C9F9000
heap
page read and write
1FA0A978000
heap
page read and write
2906A8C1000
heap
page read and write
DF0000
heap
page read and write
114C000
heap
page read and write
25163BB000
stack
page read and write
1FA0C1A0000
heap
page read and write
E04000
heap
page read and write
2112E730000
heap
page read and write
DC3000
heap
page read and write
27FD000
heap
page read and write
141C000
heap
page read and write
857000
heap
page read and write
1F423100000
heap
page read and write
2906AA90000
heap
page read and write
E7C000
heap
page read and write
1FA0A8FD000
direct allocation
page readonly
DD6000
heap
page read and write
1FA0A969000
heap
page read and write
DCD000
heap
page read and write
D80000
heap
page read and write
137B000
heap
page read and write
DCD000
heap
page read and write
2906A8E5000
heap
page read and write
2D80000
trusted library allocation
page read and write
F30000
trusted library allocation
page read and write
2791000
heap
page read and write
221C5020000
trusted library allocation
page read and write
2D49C8F0000
heap
page read and write
2112CB90000
direct allocation
page execute and read and write
1360000
heap
page read and write
96B000
stack
page read and write
2D49C9F9000
heap
page read and write
25167F9000
stack
page read and write
1FA0A958000
heap
page read and write
23B0000
trusted library allocation
page read and write
2112CF00000
heap
page readonly
6F57BCF000
stack
page read and write
9C0000
heap
page read and write
2D49E550000
heap
page read and write
1FA0A958000
heap
page read and write
1F423008000
heap
page read and write
1135000
heap
page read and write
2D6B000
direct allocation
page readonly
2112CC0F000
heap
page read and write
2C70000
trusted library allocation
page read and write
1370000
heap
page read and write
2112CBAB000
heap
page read and write
2D70000
heap
page read and write
E70000
heap
page read and write
2D49CACC000
heap
page read and write
DC9000
heap
page read and write
E52000
heap
page read and write
3069000
heap
page read and write
2D49C9A8000
heap
page read and write
DD6000
heap
page read and write
E04000
heap
page read and write
1FA0C1CE000
heap
page read and write
275C000
heap
page read and write
221C5080000
trusted library allocation
page read and write
2D49CBCB000
direct allocation
page readonly
84C000
heap
page read and write
27F3000
heap
page read and write
E0A000
heap
page read and write
2906A830000
heap
page read and write
DD4000
heap
page read and write
1118000
heap
page read and write
F7B000
direct allocation
page readonly
180098000
unkown
page read and write
E75000
heap
page read and write
2112CC3B000
heap
page read and write
8CF7000
stack
page read and write
2112CC07000
heap
page read and write
221C4EA0000
heap
page read and write
8E7B000
stack
page read and write
1FA0A989000
heap
page read and write
2D49C9A0000
heap
page read and write
13D7000
heap
page read and write
E52000
heap
page read and write
2D6C000
direct allocation
page read and write
2D73000
heap
page read and write
2930000
trusted library allocation
page read and write
E0A000
heap
page read and write
82F000
heap
page read and write
8DFF000
stack
page read and write
DED000
heap
page read and write
825E000
stack
page read and write
113E000
heap
page read and write
E70000
heap
page read and write
221C50F9000
heap
page read and write
DC9000
heap
page read and write
2906A8C8000
heap
page read and write
292B000
stack
page read and write
2FAD000
stack
page read and write
221C5010000
trusted library allocation
page read and write
E70000
heap
page read and write
2D49C9BF000
heap
page read and write
DC7000
heap
page read and write
1FA0A978000
heap
page read and write
221C4F0C000
heap
page read and write
E6C000
heap
page read and write
1FA0A96F000
heap
page read and write
5F60000
trusted library allocation
page read and write
867000
heap
page read and write
DF5000
heap
page read and write
2E1B000
stack
page read and write
239B000
direct allocation
page readonly
2D90000
remote allocation
page read and write
23B0000
trusted library allocation
page read and write
8BFF000
stack
page read and write
221C4D50000
trusted library allocation
page read and write
221C50E0000
trusted library allocation
page read and write
2D49C9D0000
heap
page read and write
180098000
unkown
page read and write
1FA0A980000
heap
page read and write
27E9000
heap
page read and write
F40000
heap
page read and write
2112CF15000
heap
page read and write
2112CC21000
heap
page read and write
13BC000
heap
page read and write
879000
heap
page read and write
E04000
heap
page read and write
221C4F32000
heap
page read and write
1F423017000
heap
page read and write
18009B000
unkown
page readonly
2112E68D000
direct allocation
page readonly
DCD000
heap
page read and write
180000000
unkown
page readonly
2906A8D9000
heap
page read and write
139D000
heap
page read and write
1350000
direct allocation
page execute and read and write
E52000
heap
page read and write
2906A8DD000
heap
page read and write
DD6000
heap
page read and write
2370000
direct allocation
page read and write
1F422EB0000
heap
page read and write
990000
remote allocation
page read and write
18009B000
unkown
page readonly
221C50C0000
trusted library allocation
page read and write
There are 423 hidden memdumps, click here to show them.