IOC Report
aOHLlvfakv.dll

loading gif

Files

File Path
Type
Category
Malicious
aOHLlvfakv.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 62582 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\aOHLlvfakv.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\aOHLlvfakv.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\aOHLlvfakv.dll,DllRegisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\JAnzBeoSOFkqX\hUQcK.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\FAAMB\YSmuMEqbrrG.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\SAolKOHOGzImreJl\DHZYcsMibMOGCXWD.dll"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\aOHLlvfakv.dll,__CPPdebugHook
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\aOHLlvfakv.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\aOHLlvfakv.dll",#1

URLs

Name
IP
Malicious
https://164.90.222.65/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/
164.90.222.65
malicious
https://164.90.222.65/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/zxqya/
unknown
https://172.105.226.75:8080/$
unknown
https://66.228.32.31:7080/z
unknown
https://103.43.75.120:443/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/a/
unknown
https://103.43.75.120/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/
unknown
https://159.65.88.10:8080/
unknown
https://82.223.21.224:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/K
unknown
https://82.223.21.224:8080/
unknown
https://172.105.226.75:8080/
unknown
https://167.172.199.165:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/j
unknown
https://187.63.160.88:80/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/STEM327
unknown
https://183.111.227.137:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/327
unknown
https://187.63.160.88:80/
unknown
https://72.15.201.15:8080/
unknown
https://91.121.146.47:8080/
unknown
https://167.172.199.165:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/
unknown
https://103.132.242.26:8080/
unknown
https://103.43.75.120/0/
unknown
https://159.65.88.10:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/u
unknown
https://103.43.75.120/080/d
unknown
https://173.212.193.249:8080/ert
unknown
https://103.43.75.120/
unknown
https://172.105.226.75:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/S
unknown
https://173.212.193.249:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/j
unknown
https://183.111.227.137:8080/
unknown
https://66.228.32.31:7080/
unknown
https://103.43.75.120/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/xqya/
unknown
https://91.121.146.47:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/
unknown
https://167.172.199.165:8080/
unknown
https://173.212.193.249:8080/
unknown
https://66.228.32.31:7080/F
unknown
https://172.105.226.75:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/d
unknown
https://173.212.193.249:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/
unknown
https://172.105.226.75:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/
unknown
https://172.105.226.75:8080/icy)
unknown
https://103.43.75.120/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/k
unknown
https://91.121.146.47:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/I
unknown
There are 28 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
110.232.117.186
unknown
Australia
malicious
103.132.242.26
unknown
India
malicious
104.168.155.143
unknown
United States
malicious
79.137.35.198
unknown
France
malicious
115.68.227.76
unknown
Korea Republic of
malicious
163.44.196.120
unknown
Singapore
malicious
206.189.28.199
unknown
United States
malicious
107.170.39.149
unknown
United States
malicious
66.228.32.31
unknown
United States
malicious
185.4.135.165
unknown
Greece
malicious
197.242.150.244
unknown
South Africa
malicious
183.111.227.137
unknown
Korea Republic of
malicious
45.176.232.124
unknown
Colombia
malicious
169.57.156.166
unknown
United States
malicious
164.68.99.3
unknown
Germany
malicious
139.59.126.41
unknown
Singapore
malicious
167.172.253.162
unknown
United States
malicious
167.172.199.165
unknown
United States
malicious
202.129.205.3
unknown
Thailand
malicious
147.139.166.154
unknown
United States
malicious
153.92.5.27
unknown
Germany
malicious
159.65.88.10
unknown
United States
malicious
172.105.226.75
unknown
United States
malicious
101.50.0.91
unknown
Indonesia
malicious
164.90.222.65
unknown
United States
malicious
213.239.212.5
unknown
Germany
malicious
5.135.159.50
unknown
France
malicious
186.194.240.217
unknown
Brazil
malicious
119.59.103.152
unknown
Thailand
malicious
159.89.202.34
unknown
United States
malicious
91.121.146.47
unknown
France
malicious
160.16.142.56
unknown
Japan
malicious
201.94.166.162
unknown
Brazil
malicious
91.207.28.33
unknown
Kyrgyzstan
malicious
103.75.201.2
unknown
Thailand
malicious
103.43.75.120
unknown
Japan
malicious
188.44.20.25
unknown
Macedonia
malicious
45.235.8.30
unknown
Brazil
malicious
153.126.146.25
unknown
Japan
malicious
72.15.201.15
unknown
United States
malicious
187.63.160.88
unknown
Brazil
malicious
173.212.193.249
unknown
Germany
malicious
82.223.21.224
unknown
Spain
malicious
95.217.221.146
unknown
Germany
malicious
149.56.131.28
unknown
Canada
malicious
182.162.143.56
unknown
Korea Republic of
malicious
1.234.2.232
unknown
Korea Republic of
malicious
129.232.188.93
unknown
South Africa
malicious
94.23.45.86
unknown
France
malicious
There are 39 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
29592A20000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
6EB000
heap
page read and write
malicious
180001000
direct allocation
page execute read
malicious
2D30000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
A10000
direct allocation
page execute and read and write
malicious
25313BA0000
direct allocation
page execute and read and write
malicious
1475000
heap
page read and write
223B5960000
heap
page read and write
8E4000
heap
page read and write
28FC000
stack
page read and write
774000
heap
page read and write
E77C27D000
stack
page read and write
763000
heap
page read and write
73B000
heap
page read and write
77A000
heap
page read and write
2B2B000
heap
page read and write
295911B0000
heap
page read and write
2B29000
heap
page read and write
2B74000
heap
page read and write
297B000
stack
page read and write
223B59A4000
heap
page read and write
456000
unkown
page write copy
18002C000
direct allocation
page readonly
8C7000
heap
page read and write
29590FB8000
heap
page read and write
75D000
heap
page read and write
774000
heap
page read and write
401000
unkown
page execute read
400000
unkown
page readonly
6D0000
heap
page readonly
6FB4A7E000
stack
page read and write
29590FF7000
heap
page read and write
C0C000
heap
page read and write
2AFB000
heap
page read and write
8DC000
heap
page read and write
7C6000
heap
page read and write
29FF000
stack
page read and write
18002B000
direct allocation
page read and write
25312360000
heap
page read and write
2790000
heap
page read and write
295911B5000
heap
page read and write
58AE000
stack
page read and write
476000
unkown
page readonly
29592A10000
direct allocation
page execute and read and write
268E000
stack
page read and write
223B9010000
heap
page read and write
B6E000
stack
page read and write
2B74000
heap
page read and write
BEB000
heap
page read and write
2AFA000
heap
page read and write
2CC7000
heap
page read and write
453000
unkown
page write copy
2B00000
heap
page read and write
253121D7000
heap
page read and write
25313B90000
direct allocation
page execute and read and write
7C6000
heap
page read and write
727000
heap
page read and write
452000
unkown
page read and write
77A000
heap
page read and write
4640000
heap
page read and write
5BF0000
trusted library allocation
page read and write
18002A000
direct allocation
page readonly
74A000
heap
page read and write
24BC000
stack
page read and write
73B000
heap
page read and write
D1326FE000
stack
page read and write
733000
heap
page read and write
C0C000
heap
page read and write
C38000
heap
page read and write
29590FD8000
heap
page read and write
2A81000
heap
page read and write
C20000
heap
page read and write
A40000
trusted library allocation
page read and write
75D000
heap
page read and write
476000
unkown
page readonly
2CA1000
heap
page read and write
780000
heap
page read and write
8E1000
heap
page read and write
7C4000
heap
page read and write
29590EE0000
heap
page read and write
400000
unkown
page readonly
25312060000
heap
page read and write
44F000
unkown
page write copy
728000
heap
page read and write
BE0000
heap
page read and write
223B5790000
heap
page read and write
2286000
unkown
page write copy
774000
heap
page read and write
737000
heap
page read and write
2E6E000
stack
page read and write
2B2D000
heap
page read and write
2AC7000
heap
page read and write
400000
unkown
page readonly
73B000
heap
page read and write
2EB0000
heap
page read and write
12EB000
heap
page read and write
8BB000
heap
page read and write
907000
heap
page read and write
6FB48FE000
stack
page read and write
12E0000
heap
page read and write
DE5000
heap
page read and write
2C80000
heap
page read and write
77A000
heap
page read and write
A50000
trusted library allocation
page read and write
223B5B55000
heap
page read and write
298F000
stack
page read and write
482000
unkown
page readonly
223B5B50000
heap
page read and write
452000
unkown
page read and write
2D11000
heap
page read and write
75D000
heap
page read and write
23B0000
heap
page read and write
2780000
heap
page read and write
C2C000
heap
page read and write
774000
heap
page read and write
2CF1000
heap
page read and write
482000
unkown
page readonly
A70000
remote allocation
page read and write
25313B80000
direct allocation
page read and write
7BF65FF000
stack
page read and write
E77C07C000
stack
page read and write
455000
unkown
page read and write
920000
heap
page read and write
D13257B000
stack
page read and write
A40000
trusted library allocation
page read and write
18002B000
direct allocation
page read and write
2230000
unkown
page readonly
2B1D000
heap
page read and write
180000000
direct allocation
page read and write
456000
unkown
page write copy
2AA7000
heap
page read and write
C01000
heap
page read and write
E77C17E000
stack
page read and write
B50000
heap
page read and write
459000
unkown
page read and write
13E0000
heap
page read and write
8DC000
heap
page read and write
2B0B000
heap
page read and write
8B0000
heap
page read and write
2CC7000
heap
page read and write
2510000
heap
page read and write
370000
heap
page read and write
29592B80000
trusted library allocation
page read and write
290E000
stack
page read and write
6B0000
direct allocation
page read and write
223B7530000
heap
page read and write
8D1000
heap
page read and write
337E000
stack
page read and write
763000
heap
page read and write
455000
unkown
page read and write
456000
unkown
page write copy
2B34000
heap
page read and write
223B79E0000
heap
page read and write
737000
heap
page read and write
295911C0000
heap
page read and write
401000
unkown
page execute read
2B75000
heap
page read and write
820000
heap
page read and write
22A6000
unkown
page readonly
223B5A60000
heap
page read and write
1FBC7E00000
unclassified section
page readonly
A80000
heap
page read and write
2AEE000
heap
page read and write
7C4000
heap
page read and write
1FBC7D80000
heap
page read and write
8E4000
heap
page read and write
75D000
heap
page read and write
907000
heap
page read and write
2D20000
direct allocation
page execute and read and write
227F000
unkown
page write copy
72C000
heap
page read and write
253120D0000
heap
page read and write
2D0E000
stack
page read and write
2B1D000
heap
page read and write
C25000
heap
page read and write
2783000
heap
page read and write
4410000
heap
page read and write
2B00000
heap
page read and write
2FB8000
stack
page read and write
C15000
heap
page read and write
6C0000
direct allocation
page execute and read and write
5BDE000
stack
page read and write
72C000
heap
page read and write
180000000
direct allocation
page read and write
29592BD0000
heap
page read and write
7C6000
heap
page read and write
A85000
heap
page read and write
459000
unkown
page read and write
763000
heap
page read and write
18002C000
direct allocation
page readonly
7C6000
heap
page read and write
223B5984000
heap
page read and write
530000
heap
page read and write
5E9000
stack
page read and write
C15000
heap
page read and write
2D10000
direct allocation
page read and write
C12000
heap
page read and write
8B0000
heap
page read and write
77A000
heap
page read and write
44E000
unkown
page read and write
59B0000
trusted library allocation
page read and write
728000
heap
page read and write
735000
heap
page read and write
BC3000
heap
page read and write
6FB487A000
stack
page read and write
253121E0000
heap
page read and write
25312145000
heap
page read and write
763000
heap
page read and write
E77C37E000
stack
page read and write
2B1D000
heap
page read and write
2CC9000
heap
page read and write
277E000
stack
page read and write
737000
heap
page read and write
223B59A3000
heap
page read and write
C15000
heap
page read and write
8E8000
heap
page read and write
2DEE000
stack
page read and write
FAB000
stack
page read and write
2B63000
heap
page read and write
76C000
heap
page read and write
D13267E000
stack
page read and write
25313D20000
trusted library allocation
page read and write
DCE000
stack
page read and write
D13277B000
stack
page read and write
7C4000
heap
page read and write
E77C3FE000
stack
page read and write
401000
unkown
page execute read
18002A000
direct allocation
page readonly
8D6000
heap
page read and write
2AFB000
heap
page read and write
774000
heap
page read and write
BF7000
heap
page read and write
455000
unkown
page read and write
2B2F000
heap
page read and write
737000
heap
page read and write
2B1D000
heap
page read and write
180000000
direct allocation
page read and write
29592B80000
trusted library allocation
page read and write
67B000
stack
page read and write
77A000
heap
page read and write
1FBC7C80000
heap
page read and write
25313BD0000
heap
page readonly
BC0000
heap
page read and write
8E8000
heap
page read and write
7C4000
heap
page read and write
D13213C000
stack
page read and write
2360000
trusted library allocation
page read and write
223B58D0000
heap
page read and write
223B9020000
trusted library allocation
page read and write
223B5993000
heap
page read and write
E77C47B000
stack
page read and write
453000
unkown
page write copy
6FB4AFE000
stack
page read and write
18002C000
direct allocation
page readonly
7C4000
heap
page read and write
73B000
heap
page read and write
459000
unkown
page read and write
C1A000
heap
page read and write
18002B000
direct allocation
page read and write
223B598E000
heap
page read and write
A80000
heap
page read and write
DEC000
heap
page read and write
77A000
heap
page read and write
1FBC7DF0000
unclassified section
page readonly
18002B000
direct allocation
page read and write
25312140000
heap
page read and write
C07000
heap
page read and write
A70000
remote allocation
page read and write
1FBC7B40000
heap
page read and write
D13247E000
stack
page read and write
E77C1FE000
stack
page read and write
29590FF5000
heap
page read and write
18002A000
direct allocation
page readonly
DE0000
heap
page read and write
D1324FE000
stack
page read and write
779000
heap
page read and write
2AA8000
heap
page read and write
8D8000
heap
page read and write
1FBC7C98000
heap
page read and write
8DC000
heap
page read and write
2B00000
heap
page read and write
29590F70000
heap
page read and write
2A80000
heap
page read and write
2B5C000
heap
page read and write
8E4000
heap
page read and write
1480000
heap
page read and write
18002A000
direct allocation
page readonly
73B000
heap
page read and write
774000
heap
page read and write
25313C20000
heap
page read and write
EF0000
heap
page read and write
8E9000
heap
page read and write
8E5000
heap
page read and write
2E89000
heap
page read and write
774000
heap
page read and write
2282000
unkown
page read and write
2B0B000
heap
page read and write
2AEE000
heap
page read and write
2287000
unkown
page read and write
3FDE000
stack
page read and write
7DA000
heap
page read and write
25312205000
heap
page read and write
227E000
unkown
page read and write
7BF64FF000
stack
page read and write
7C6000
heap
page read and write
6E0000
heap
page read and write
78A000
heap
page read and write
223B5B5B000
heap
page read and write
25312190000
heap
page read and write
C38000
heap
page read and write
223B597A000
heap
page read and write
44E000
unkown
page read and write
C0C000
heap
page read and write
6FB497D000
stack
page read and write
180000000
direct allocation
page read and write
A70000
remote allocation
page read and write
2F3D000
stack
page read and write
2B0B000
heap
page read and write
2A7B000
stack
page read and write
C19000
heap
page read and write
C15000
heap
page read and write
E77C2F7000
stack
page read and write
223B9013000
heap
page read and write
A79000
stack
page read and write
223B596B000
heap
page read and write
476000
unkown
page readonly
2C7D000
stack
page read and write
72C000
heap
page read and write
907000
heap
page read and write
2531219B000
heap
page read and write
D1321BE000
stack
page read and write
CE0000
heap
page read and write
44E000
unkown
page read and write
25313C10000
trusted library allocation
page read and write
453000
unkown
page write copy
452000
unkown
page read and write
29591140000
heap
page read and write
2AF5000
heap
page read and write
7C4000
heap
page read and write
1470000
heap
page read and write
253121F4000
heap
page read and write
482000
unkown
page readonly
8E4000
heap
page read and write
253A000
stack
page read and write
44F000
unkown
page write copy
75D000
heap
page read and write
29592A50000
heap
page readonly
2B00000
heap
page read and write
733000
heap
page read and write
7BF61EC000
stack
page read and write
18002C000
direct allocation
page readonly
29592A00000
direct allocation
page read and write
7C6000
heap
page read and write
2B74000
heap
page read and write
22B2000
unkown
page readonly
29590F7B000
heap
page read and write
1FBC7C8D000
heap
page read and write
7C4000
heap
page read and write
2231000
unkown
page execute read
C08000
heap
page read and write
2E70000
trusted library allocation
page read and write
D1325F7000
stack
page read and write
763000
heap
page read and write
C38000
heap
page read and write
2C81000
heap
page read and write
2B4A000
heap
page read and write
2B77000
heap
page read and write
E77C0FE000
stack
page read and write
7C6000
heap
page read and write
6FB49FD000
stack
page read and write
223B597A000
heap
page read and write
75D000
heap
page read and write
2D60000
heap
page readonly
2E70000
trusted library allocation
page read and write
763000
heap
page read and write
44F000
unkown
page write copy
There are 369 hidden memdumps, click here to show them.