IOC Report
HeOkukP.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\HeOkukP.dll,#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\HeOkukP.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\HeOkukP.dll",#1
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\HeOkukP.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\HeOkukP.dll",#1

URLs

Name
IP
Malicious
http://www.rapidfilestorage.com/clrls/cl_rls.json
185.22.66.16
malicious
http://www.rapidfilestorage.com/clrls/cl_rls.jsonB
unknown
https://hg.mozilla.org/releases/mozilla-release
unknown
http://www.rapidfilestorage.com/clrls/cl_rls.jsonLz
unknown
https://crash-reports.mozilla.com/submit?id=
unknown
http://www.rapidfilestorage.com/clrls/cl_rls.json)
unknown
http://www.rapidfilestorage.com/clrls/cl_rls.json;
unknown
http://www.rapidfilestorage.com/clrls/cl_rls.jsond
unknown
http://www.rapidfilestorage.com/clrls/cl_rls.jsonu
unknown

Domains

Name
IP
Malicious
env-3936544.jcloud.kz
185.22.66.16
malicious
www.rapidfilestorage.com
unknown

IPs

IP
Domain
Country
Malicious
185.22.66.16
env-3936544.jcloud.kz
Kazakhstan
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4D0E000
stack
page read and write
2B53000
heap
page read and write
2B35000
heap
page read and write
3330000
heap
page read and write
33E0000
heap
page read and write
495C000
stack
page read and write
1017000
heap
page read and write
4A4D000
stack
page read and write
2B66000
heap
page read and write
25E0000
heap
page read and write
50CD000
direct allocation
page readonly
5210000
trusted library allocation
page read and write
5531000
direct allocation
page execute read
2963000
heap
page read and write
499E000
stack
page read and write
2800000
heap
page read and write
3300000
heap
page read and write
2B90000
heap
page read and write
33CA000
heap
page read and write
2976000
heap
page read and write
2B61000
heap
page read and write
2B3E000
heap
page read and write
49DF000
stack
page read and write
28D1000
heap
page read and write
3340000
heap
page read and write
2ADA000
heap
page read and write
538E000
stack
page read and write
44C0000
heap
page read and write
33B8000
heap
page read and write
4AB0000
direct allocation
page read and write
2B75000
heap
page read and write
3327000
heap
page read and write
2B47000
heap
page read and write
5B19000
heap
page read and write
5C10000
trusted library allocation
page read and write
2962000
heap
page read and write
25A0000
heap
page read and write
2945000
heap
page read and write
29FF000
stack
page read and write
50A0000
heap
page read and write
2970000
heap
page read and write
48DD000
stack
page read and write
48CE000
stack
page read and write
33B8000
heap
page read and write
5B10000
heap
page read and write
333A000
heap
page read and write
33D6000
heap
page read and write
33E0000
heap
page read and write
2A90000
heap
page read and write
4AB1000
direct allocation
page execute read
28D0000
heap
page read and write
2B5E000
heap
page read and write
33C5000
heap
page read and write
449E000
stack
page read and write
33B3000
heap
page read and write
2945000
heap
page read and write
2870000
heap
page read and write
5111000
heap
page read and write
28BA000
heap
page read and write
33E0000
heap
page read and write
2B75000
heap
page read and write
33BC000
heap
page read and write
294C000
heap
page read and write
3394000
heap
page read and write
549E000
stack
page read and write
50CF000
direct allocation
page execute and read and write
297D000
heap
page read and write
33D6000
heap
page read and write
3287000
heap
page read and write
5AFD000
direct allocation
page readonly
568A000
direct allocation
page read and write
54DD000
stack
page read and write
101D000
heap
page read and write
33C6000
heap
page read and write
53FE000
stack
page read and write
484D000
stack
page read and write
33D6000
heap
page read and write
28A7000
heap
page read and write
33B8000
heap
page read and write
255B000
stack
page read and write
4E90000
heap
page read and write
543F000
stack
page read and write
4D4E000
stack
page read and write
2590000
heap
page read and write
4EEE000
stack
page read and write
2ABE000
stack
page read and write
5080000
direct allocation
page read and write
339C000
heap
page read and write
2539000
stack
page read and write
2AA0000
heap
page read and write
3333000
heap
page read and write
4B00000
direct allocation
page read and write
100F000
heap
page read and write
28D4000
heap
page read and write
4430000
heap
page read and write
2971000
heap
page read and write
2B47000
heap
page read and write
2ACD000
heap
page read and write
2B53000
heap
page read and write
D90000
heap
page read and write
492E000
stack
page read and write
52CD000
stack
page read and write
332D000
heap
page read and write
2AE0000
heap
page read and write
296E000
heap
page read and write
2B57000
heap
page read and write
25E5000
heap
page read and write
2AC2000
heap
page read and write
C3C000
stack
page read and write
2935000
heap
page read and write
2B6D000
heap
page read and write
2B35000
heap
page read and write
4A7F000
stack
page read and write
295A000
heap
page read and write
4ABE000
stack
page read and write
33B3000
heap
page read and write
44DF000
stack
page read and write
2945000
heap
page read and write
2935000
heap
page read and write
2B5E000
heap
page read and write
2B58000
heap
page read and write
28D5000
heap
page read and write
28A7000
heap
page read and write
323A000
stack
page read and write
4AFF000
stack
page read and write
33BC000
heap
page read and write
33D6000
heap
page read and write
3270000
heap
page read and write
28B0000
heap
page read and write
4F40000
heap
page read and write
5111000
heap
page read and write
3394000
heap
page read and write
4A0F000
stack
page read and write
2B75000
heap
page read and write
33C9000
heap
page read and write
33B3000
heap
page read and write
530F000
stack
page read and write
5110000
heap
page read and write
E90000
heap
page read and write
E70000
heap
page read and write
24FB000
stack
page read and write
259A000
stack
page read and write
28DB000
heap
page read and write
339A000
heap
page read and write
33CB000
heap
page read and write
100B000
heap
page read and write
2935000
heap
page read and write
28E9000
heap
page read and write
446F000
stack
page read and write
50D0000
direct allocation
page read and write
287F000
stack
page read and write
4510000
heap
page read and write
2AC3000
heap
page read and write
2B68000
heap
page read and write
2B56000
heap
page read and write
507F000
direct allocation
page execute and read and write
491D000
stack
page read and write
2AAA000
heap
page read and write
2B3C000
heap
page read and write
44AD000
stack
page read and write
2B47000
heap
page read and write
2B67000
heap
page read and write
507D000
direct allocation
page readonly
2962000
heap
page read and write
11E0000
heap
page read and write
2977000
heap
page read and write
295A000
heap
page read and write
2B75000
heap
page read and write
3322000
heap
page read and write
28A5000
heap
page read and write
2B6A000
heap
page read and write
296E000
heap
page read and write
2ACF000
heap
page read and write
33C4000
heap
page read and write
2B53000
heap
page read and write
295A000
heap
page read and write
2B10000
heap
page read and write
4C5A000
direct allocation
page read and write
36B0000
heap
page read and write
51A0000
trusted library allocation
page read and write
488D000
stack
page read and write
489D000
stack
page read and write
5530000
direct allocation
page read and write
2B35000
heap
page read and write
3280000
heap
page read and write
295A000
heap
page read and write
2B63000
heap
page read and write
4A3E000
stack
page read and write
28EF000
heap
page read and write
2B47000
heap
page read and write
4D8F000
stack
page read and write
D3C000
stack
page read and write
2B69000
heap
page read and write
2B3E000
heap
page read and write
49CE000
stack
page read and write
33E0000
heap
page read and write
2978000
heap
page read and write
496F000
stack
page read and write
330A000
heap
page read and write
2A7F000
stack
page read and write
5AFF000
direct allocation
page execute and read and write
283E000
stack
page read and write
4A8C000
stack
page read and write
2968000
heap
page read and write
33B3000
heap
page read and write
25E7000
heap
page read and write
4B01000
direct allocation
page execute read
2AFF000
stack
page read and write
29BE000
stack
page read and write
534E000
stack
page read and write
50A1000
heap
page read and write
4C0A000
direct allocation
page read and write
2AD3000
heap
page read and write
3321000
heap
page read and write
3290000
heap
page read and write
2B53000
heap
page read and write
2B3E000
heap
page read and write
2967000
heap
page read and write
3326000
heap
page read and write
369E000
stack
page read and write
28E2000
heap
page read and write
2A3E000
stack
page read and write
2B8E000
stack
page read and write
5B00000
direct allocation
page read and write
28A7000
heap
page read and write
28DF000
heap
page read and write
2FCB000
stack
page read and write
28A0000
heap
page read and write
2810000
heap
page read and write
3285000
heap
page read and write
339A000
heap
page read and write
4F2F000
stack
page read and write
1000000
heap
page read and write
2962000
heap
page read and write
3394000
heap
page read and write
There are 225 hidden memdumps, click here to show them.