IOC Report
c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll

loading gif

Files

File Path
Type
Category
Malicious
c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\2F60.tmp
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\AEC4.tmp
ASCII text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll"
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,FgnfMvSNFULXZx
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,KVpawdrrKTUjeZuk
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1
C:\Windows\System32\cmd.exe
cmd /c "echo Commands" >> C:\Users\user\AppData\Local\Temp\2F60.tmp
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c "dir" >> C:\Users\user\AppData\Local\Temp\2F60.tmp
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c "echo Commands" >> C:\Users\user~1\AppData\Local\Temp\AEC4.tmp
C:\Windows\System32\cmd.exe
cmd /c "dir" >> C:\Users\user~1\AppData\Local\Temp\AEC4.tmp
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://higmon.cyouhttps://prises.cyou
unknown
malicious
https://higmon.cyou/index.html
unknown
malicious
https://higmon.cyou
unknown
malicious
https://higmon.cyou/
unknown
malicious
https://higmon.cyou/index.htmlce
unknown
malicious
https://my.tealiumiq.com/urest/legacy/tagcompanion/getProfile?utid=
unknown
https://http://Mozilla/5.0
unknown
https://prises.cyou
unknown
https://higmon.cyou/index.html7b9a
unknown
https://higmon.cyouhttps://prises.cyouR
unknown

Domains

Name
IP
Malicious
higmon.cyou
45.8.147.179
malicious

IPs

IP
Domain
Country
Malicious
45.8.147.179
higmon.cyou
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1FF741F5000
heap
page read and write
1FF73EC0000
unkown
page readonly
1D86D010000
unkown
page read and write
2233FC25000
heap
page read and write
23124204000
heap
page read and write
71B000
stack
page read and write
E199AFF000
unkown
page read and write
1D86CFF0000
unkown
page readonly
20DA3AA2000
heap
page read and write
20DA1DD7000
heap
page read and write
E1997C8000
stack
page read and write
18000E000
direct allocation
page readonly
1D86D010000
unkown
page read and write
1FF73F40000
heap
page read and write
20D6AF50000
heap
page read and write
23122610000
heap
page read and write
1FF73ED0000
unkown
page readonly
20D6CA40000
heap
page read and write
23124010000
heap
page read and write
1FF73EE0000
unkown
page read and write
23122673000
heap
page read and write
770000
heap
page read and write
1D86D000000
unkown
page readonly
23124122000
heap
page read and write
2C3D000
stack
page read and write
1D86D3D0000
heap
page read and write
7F0000
remote allocation
page read and write
B34000
heap
page read and write
B2A000
heap
page read and write
5E5C59F000
stack
page read and write
2650000
heap
page read and write
2233E170000
heap
page read and write
20DA3AB1000
heap
page read and write
7C0000
direct allocation
page execute and read and write
ADF000
heap
page read and write
1D86D3D9000
heap
page read and write
20DA2060000
heap
page read and write
23122640000
direct allocation
page execute and read and write
2233E3B5000
heap
page read and write
8EBEEFF000
stack
page read and write
5E5C87F000
stack
page read and write
B2696FC000
stack
page read and write
1FF741F9000
heap
page read and write
180000000
direct allocation
page read and write
A98000
heap
page read and write
18000E000
direct allocation
page readonly
1D86D230000
heap
page read and write
1FF74200000
heap
page read and write
20DA1D10000
heap
page read and write
7FFA0AE61000
unkown
page execute read
2CBC000
stack
page read and write
20DA2065000
heap
page read and write
1D86D000000
unkown
page readonly
B06000
heap
page read and write
87156FD000
stack
page read and write
2233FDA0000
heap
page read and write
20DA1D30000
heap
page read and write
18000B000
direct allocation
page readonly
18000B000
direct allocation
page readonly
20D6AED0000
heap
page read and write
7FFA0AE60000
unkown
page readonly
1FF741F9000
heap
page read and write
2233E1FB000
heap
page read and write
1FF73E80000
heap
page read and write
180001000
direct allocation
page execute read
1FF73F99000
heap
page read and write
E40000
heap
page read and write
27E0000
heap
page read and write
231241F0000
heap
page read and write
20DA1DB0000
heap
page read and write
18000E000
direct allocation
page readonly
1FF73EF0000
heap
page read and write
660000
heap
page read and write
7FFA0AE62000
unkown
page readonly
B2F000
heap
page read and write
7FFA0AE63000
unkown
page write copy
7F0000
remote allocation
page read and write
246E000
heap
page read and write
2233FD91000
heap
page read and write
24950EA0000
heap
page read and write
23122660000
heap
page read and write
2233E1F0000
heap
page read and write
2233E3B0000
heap
page read and write
AE7000
heap
page read and write
23124120000
heap
page read and write
27E2000
heap
page read and write
1FF73ED0000
unkown
page readonly
2233E350000
heap
page read and write
87157FF000
unkown
page read and write
2233FDB4000
heap
page read and write
5E5C51C000
stack
page read and write
1D86D130000
heap
page read and write
B17000
heap
page read and write
20D6AEF0000
heap
page read and write
20DA3944000
heap
page read and write
7FFA0AEE5000
unkown
page readonly
750000
heap
page read and write
20D6AE60000
heap
page read and write
1D86CFB0000
heap
page read and write
23122668000
heap
page read and write
231241E0000
heap
page read and write
2664000
heap
page read and write
23123F0C000
heap
page read and write
20DA1CA0000
heap
page read and write
180001000
direct allocation
page execute read
1FF73F98000
heap
page read and write
24950D60000
heap
page read and write
20D6AF35000
heap
page read and write
249510E5000
heap
page read and write
7B42BEF000
stack
page read and write
231224D0000
heap
page read and write
20DA1DD0000
heap
page read and write
7B42E7F000
stack
page read and write
7A2B5AF000
stack
page read and write
E1997CC000
stack
page read and write
1FF73F60000
heap
page read and write
B269AFF000
stack
page read and write
1D86D0F0000
heap
page read and write
180001000
direct allocation
page execute read
23124131000
heap
page read and write
180001000
direct allocation
page execute read
1D86D3D9000
heap
page read and write
180000000
direct allocation
page read and write
20DA3AA0000
heap
page read and write
1D86D3D5000
heap
page read and write
2233E2F0000
direct allocation
page execute and read and write
2233FD80000
heap
page read and write
1FF741F0000
heap
page read and write
7A2B52C000
stack
page read and write
A90000
heap
page read and write
2233FD82000
heap
page read and write
20D6AF5B000
heap
page read and write
7B42B6C000
stack
page read and write
24951050000
heap
page read and write
27F1000
heap
page read and write
8EBEF7F000
stack
page read and write
20DA381F000
heap
page read and write
20DA1DC0000
direct allocation
page execute and read and write
20DA3930000
heap
page read and write
18000E000
direct allocation
page readonly
18000B000
direct allocation
page readonly
AE3000
heap
page read and write
18000B000
direct allocation
page readonly
B27000
heap
page read and write
266E000
heap
page read and write
27CC000
stack
page read and write
7F0000
remote allocation
page read and write
24950EA7000
heap
page read and write
180000000
direct allocation
page read and write
1FF73F98000
heap
page read and write
20DA1DDB000
heap
page read and write
B269BFE000
stack
page read and write
20D6AF30000
heap
page read and write
E45000
heap
page read and write
1FF73EE0000
unkown
page read and write
24950FC0000
heap
page read and write
8EBEE7C000
stack
page read and write
2233E010000
heap
page read and write
1FF73EC0000
unkown
page readonly
249510E0000
heap
page read and write
2233E150000
heap
page read and write
24950EAB000
heap
page read and write
2233E1F7000
heap
page read and write
7A2B87F000
stack
page read and write
24950FA0000
heap
page read and write
2312269C000
heap
page read and write
1D86CFF0000
unkown
page readonly
2640000
heap
page read and write
180000000
direct allocation
page read and write
There are 159 hidden memdumps, click here to show them.