IOC Report
8082-x64.dll.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\8082-x64.dll.dll"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\8082-x64.dll.dll",#1
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\8082-x64.dll.dll
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\8082-x64.dll.dll",#1
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\8082-x64.dll.dll,DllGetClassObject
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\8082-x64.dll.dll,DllMain
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\8082-x64.dll.dll,DllRegisterServer

URLs

Name
IP
Malicious
http://20.104.209.69:8082/broadcast
20.104.209.69
malicious
20.104.209.69
malicious
http://20.104.209.69:8082/1/events/com.amazon.csm.csa.prod
20.104.209.69
malicious
http://20.104.209.69:8082/broadcast?
unknown
http://20.104.209.69:8082/broadcastp
unknown
http://20.104.209.69:8082/broadcast((
unknown
https://www.amazon.com
unknown
http://20.104.209.69:8082/broadcast2
unknown
https://d22u79neyj432a.cloudfront.net/bfc50dfa-8e10-44b5-ae59-ac26bfc71489/54857e6d-c060-4b3c-914a-8
unknown

IPs

IP
Domain
Country
Malicious
20.104.209.69
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
26760590000
direct allocation
page execute read
malicious
49B000
stack
page read and write
22AC5EF0000
heap
page read and write
C1ED4F9000
stack
page read and write
22AC5EA0000
heap
page read and write
26760440000
heap
page read and write
267601E0000
heap
page read and write
26762550000
direct allocation
page read and write
25C5B950000
heap
page read and write
20408AF0000
heap
page read and write
D9C3C7C000
stack
page read and write
6A0000
heap
page read and write
26760402000
unkown
page read and write
25D6E575000
heap
page read and write
25C5D560000
heap
page read and write
25D70290000
heap
page read and write
267603A1000
direct allocation
page read and write
2120000
heap
page read and write
267605C1000
direct allocation
page read and write
1D0000
heap
page read and write
20408B70000
heap
page read and write
C4F90FF000
stack
page read and write
25D6E5F0000
heap
page read and write
20408880000
heap
page read and write
26760348000
unkown
page read and write
D9C3DFF000
stack
page read and write
C1ECFF5000
stack
page read and write
C1ED5FD000
stack
page read and write
26760400000
unkown
page read and write
26760460000
heap
page read and write
25D6E560000
heap
page read and write
25D6E5D0000
heap
page read and write
267603F8000
unkown
page read and write
22AC5CC0000
heap
page read and write
25D6E570000
heap
page read and write
26760320000
heap
page read and write
76E000
stack
page read and write
204089D0000
heap
page read and write
75ED37E000
stack
page read and write
25C5D2C0000
heap
page read and write
7739A7E000
stack
page read and write
25D6FFB0000
heap
page read and write
25D6E640000
heap
page read and write
267603C6000
unkown
page read and write
77398FF000
stack
page read and write
773987C000
stack
page read and write
22AC5E00000
heap
page read and write
2040A3D0000
heap
page read and write
204089D8000
heap
page read and write
C1ECFFC000
stack
page read and write
25C5B905000
heap
page read and write
2040A3E0000
heap
page read and write
25C5B957000
heap
page read and write
C1ED2FE000
stack
page read and write
2676041E000
unkown
page read and write
25C5B8B0000
heap
page read and write
2676041A000
direct allocation
page read and write
26760412000
direct allocation
page read and write
22AC5E20000
heap
page read and write
D9C3CFE000
stack
page read and write
D9C3E7F000
stack
page read and write
C1ECCFD000
stack
page read and write
C1ED3FE000
stack
page read and write
267603F8000
heap
page read and write
26760585000
heap
page read and write
4D8000
heap
page read and write
7C0000
heap
page read and write
26760580000
heap
page read and write
C4F917E000
stack
page read and write
26760597000
direct allocation
page read and write
267603A7000
direct allocation
page read and write
22AC77B0000
heap
page read and write
26762569000
direct allocation
page read and write
2676039B000
unkown
page read and write
20408B75000
heap
page read and write
25C5B890000
heap
page read and write
C4F8DDE000
stack
page read and write
26760353000
unkown
page read and write
773997E000
stack
page read and write
C1ED0FF000
stack
page read and write
22AC6190000
heap
page read and write
2676041A000
unkown
page read and write
25C5B900000
heap
page read and write
D9C3D7F000
stack
page read and write
25D6E649000
heap
page read and write
4D0000
heap
page read and write
75ED27E000
stack
page read and write
26760416000
unkown
page read and write
22AC5EF8000
heap
page read and write
267603FE000
unkown
page read and write
2676041E000
direct allocation
page read and write
26762550000
direct allocation
page read and write
C4F907F000
stack
page read and write
26762550000
direct allocation
page read and write
6C0000
heap
page read and write
26760428000
direct allocation
page read and write
267603A5000
unkown
page read and write
75ED2FE000
stack
page read and write
26760340000
unkown
page read and write
22AC6195000
heap
page read and write
C1ED1FE000
stack
page read and write
C4F8D5C000
stack
page read and write
267603C6000
direct allocation
page read and write
26760416000
direct allocation
page read and write
25C5B820000
heap
page read and write
267603FC000
unkown
page read and write
26762568000
direct allocation
page read and write
26762550000
direct allocation
page read and write
2676234E000
direct allocation
page read and write
75ECF8F000
stack
page read and write
7C5000
heap
page read and write
26762550000
direct allocation
page read and write
75ECF0C000
stack
page read and write
77399FF000
stack
page read and write
26760412000
unkown
page read and write
20408AD0000
heap
page read and write
There are 106 hidden memdumps, click here to show them.