IOC Report
Plt3z2W7KQ

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\Plt3z2W7KQ.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\Plt3z2W7KQ.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\Plt3z2W7KQ.dll,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\Plt3z2W7KQ.dll,DllUnregisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XxAsGMCLqrlaY\QoxZfNcqe.dll"
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\Plt3z2W7KQ.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Plt3z2W7KQ.dll",#1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://23.239.0.12/ga
unknown
malicious
https://23.239.0.12/
23.239.0.12
malicious
https://23.239.0.12/dll90
unknown
malicious
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://www.tiktok.com/legal/report/feedback
unknown
http://help.disneyplus.com.
unknown
https://support.hotspotshield.com/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://disneyplus.com/legal.
unknown
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
23.239.0.12
unknown
United States
malicious
192.168.2.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1C929DA0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
770000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
1C271790000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
F10000
direct allocation
page execute and read and write
malicious
741607E000
stack
page read and write
233F7302000
heap
page read and write
1C928500000
heap
page read and write
7EEAB7F000
stack
page read and write
811000
heap
page read and write
1C928430000
heap
page read and write
1F17FA4B000
heap
page read and write
1AB5B27F000
heap
page read and write
233F7DB1000
heap
page read and write
233F7D70000
heap
page read and write
1C9284D5000
heap
page read and write
7ED88FB000
stack
page read and write
1033000
heap
page read and write
177E87F000
stack
page read and write
233F72AB000
heap
page read and write
233F7D7D000
heap
page read and write
233F7D8A000
heap
page read and write
233F7B10000
remote allocation
page read and write
233F7DA5000
heap
page read and write
233F7DB1000
heap
page read and write
1C928543000
heap
page read and write
233F7313000
heap
page read and write
4D4337E000
stack
page read and write
264CB677000
heap
page read and write
233F7D69000
heap
page read and write
7EEACFE000
stack
page read and write
1F17FFB0000
trusted library allocation
page read and write
233F7DBC000
heap
page read and write
18002F000
direct allocation
page readonly
233F7DAF000
heap
page read and write
264CB580000
heap
page read and write
1C271591000
heap
page read and write
2084E680000
heap
page read and write
273356D1000
heap
page read and write
2280000
heap
page read and write
27335660000
heap
page read and write
2084E9F5000
heap
page read and write
2DAC000
stack
page read and write
1AB5B1C0000
trusted library allocation
page read and write
1F17F8C0000
heap
page read and write
233F8202000
heap
page read and write
2084E9F0000
heap
page read and write
1F17FA49000
heap
page read and write
840000
heap
page read and write
264CBE90000
trusted library allocation
page read and write
1AB5B252000
heap
page read and write
233F7D6E000
heap
page read and write
1A6B7663000
heap
page read and write
2CFE07B000
stack
page read and write
233F7D0C000
heap
page read and write
1A6BB240000
heap
page read and write
16539628000
heap
page read and write
273356B7000
heap
page read and write
28EF000
stack
page read and write
273356B7000
heap
page read and write
1F17FA29000
heap
page read and write
233F7DAE000
heap
page read and write
1C9284D0000
heap
page read and write
233F7D9F000
heap
page read and write
233F7D83000
heap
page read and write
16539602000
heap
page read and write
233F7D83000
heap
page read and write
294F000
stack
page read and write
B6512FF000
stack
page read and write
233F7D4A000
heap
page read and write
1A6B75D5000
heap
page read and write
233F7DB0000
heap
page read and write
8AF000
heap
page read and write
233F7D9F000
heap
page read and write
233F7D70000
heap
page read and write
264CB652000
heap
page read and write
B80000
heap
page read and write
83F000
heap
page read and write
BD0000
heap
page read and write
1AB5B313000
heap
page read and write
1C92852B000
heap
page read and write
F00000
heap
page read and write
1C271520000
heap
page read and write
1AB5B308000
heap
page read and write
233F7D9F000
heap
page read and write
1F17FB02000
heap
page read and write
233F7D8D000
heap
page read and write
7EEAC7E000
stack
page read and write
264CB613000
heap
page read and write
233F7D7F000
heap
page read and write
1C928410000
heap
page read and write
1C271780000
direct allocation
page execute and read and write
233F7D18000
heap
page read and write
233F7DBC000
heap
page read and write
1AB5B190000
heap
page read and write
740000
heap
page read and write
1A6B7657000
heap
page read and write
233F72B2000
heap
page read and write
1AB5B264000
heap
page read and write
1C9284B0000
heap
page readonly
ED0000
heap
page read and write
1A6B91C0000
heap
page read and write
233F7D9F000
heap
page read and write
233F8218000
heap
page read and write
233F7D8D000
heap
page read and write
1653966F000
heap
page read and write
233F7D6E000
heap
page read and write
8B0000
heap
page read and write
1F17FA13000
heap
page read and write
233F7D81000
heap
page read and write
2084F720000
trusted library allocation
page read and write
233F7DD2000
heap
page read and write
233F7D75000
heap
page read and write
1C928531000
heap
page read and write
264CB64D000
heap
page read and write
233F8202000
heap
page read and write
1C2718B5000
heap
page read and write
80B000
heap
page read and write
6D0000
heap
page read and write
233F7254000
heap
page read and write
233F7D9E000
heap
page read and write
7ED8C7E000
stack
page read and write
264F000
stack
page read and write
27335600000
heap
page read and write
233F7D83000
heap
page read and write
233F7D9F000
heap
page read and write
869000
heap
page read and write
2CFDBFE000
stack
page read and write
1F17FB08000
heap
page read and write
1A6B765E000
heap
page read and write
18002D000
direct allocation
page readonly
233F7150000
heap
page read and write
1AB5B280000
heap
page read and write
233F7D7D000
heap
page read and write
2CFE177000
stack
page read and write
233F72D1000
heap
page read and write
9B0000
remote allocation
page read and write
233F7229000
heap
page read and write
233F8202000
heap
page read and write
16539570000
heap
page read and write
233F8202000
heap
page read and write
180000000
direct allocation
page read and write
264CB700000
heap
page read and write
1C2715A3000
heap
page read and write
1F17FA4F000
heap
page read and write
B6510FF000
stack
page read and write
273356AB000
heap
page read and write
18002D000
direct allocation
page readonly
1F17FA93000
heap
page read and write
7415F77000
stack
page read and write
233F7D7D000
heap
page read and write
2084E732000
heap
page read and write
1F17FA4C000
heap
page read and write
273356DF000
heap
page read and write
2084E9B0000
trusted library allocation
page read and write
7FFF2F372000
unkown
page readonly
18002E000
direct allocation
page read and write
233F7DB8000
heap
page read and write
7FFF2F376000
unkown
page read and write
264CB63C000
heap
page read and write
2960000
heap
page read and write
2084E9C0000
trusted library allocation
page read and write
C61313D000
stack
page read and write
233F7D8D000
heap
page read and write
177E525000
stack
page read and write
233F7D7B000
heap
page read and write
233F7D7F000
heap
page read and write
1F17F920000
heap
page read and write
233F7DA0000
heap
page read and write
1C271760000
heap
page read and write
107F000
heap
page read and write
233F7D7F000
heap
page read and write
A38AB8E000
stack
page read and write
7FFF2F321000
unkown
page execute read
233F7D7D000
heap
page read and write
2D2E000
stack
page read and write
233F7DA0000
heap
page read and write
233F7D68000
heap
page read and write
233F7D9F000
heap
page read and write
1048000
heap
page read and write
7FFF2F321000
unkown
page execute read
83C000
heap
page read and write
A38B1FE000
stack
page read and write
34D8FB000
stack
page read and write
7C0000
trusted library allocation
page read and write
233F7D7F000
heap
page read and write
233F7D5C000
heap
page read and write
264CB681000
heap
page read and write
1A6B767A000
heap
page read and write
1F17FA63000
heap
page read and write
B65107A000
stack
page read and write
1C2717C0000
heap
page readonly
1C928509000
heap
page read and write
233F7D7F000
heap
page read and write
A38B0F7000
stack
page read and write
BA0000
heap
page read and write
3C4000
stack
page read and write
1A6B7679000
heap
page read and write
233F7D9C000
heap
page read and write
264CB64A000
heap
page read and write
233F71B0000
heap
page read and write
7416177000
stack
page read and write
7ED89FB000
stack
page read and write
28CF000
stack
page read and write
233F7D78000
heap
page read and write
16539713000
heap
page read and write
B6511F9000
stack
page read and write
264CB702000
heap
page read and write
264CB600000
heap
page read and write
233F71E0000
trusted library allocation
page read and write
233F7D9E000
heap
page read and write
233F7D70000
heap
page read and write
A38AA8C000
stack
page read and write
233F7DE1000
heap
page read and write
74161FF000
stack
page read and write
1C92850E000
heap
page read and write
86D000
heap
page read and write
233F7D9E000
heap
page read and write
233F7249000
heap
page read and write
2084E9F9000
heap
page read and write
1F180002000
trusted library allocation
page read and write
1A6B7640000
heap
page read and write
2084E728000
heap
page read and write
233F7D73000
heap
page read and write
BD5000
heap
page read and write
16539652000
heap
page read and write
2084E730000
heap
page read and write
233F72F6000
heap
page read and write
273358B0000
heap
page read and write
233F7D83000
heap
page read and write
27CD000
stack
page read and write
37FC1CC000
stack
page read and write
1A6BAA40000
trusted library allocation
page read and write
6F0000
heap
page read and write
1A6BAA30000
heap
page read and write
811000
heap
page read and write
233F7D7D000
heap
page read and write
264CB64E000
heap
page read and write
233F7D8D000
heap
page read and write
165395E0000
heap
page read and write
4D432FD000
stack
page read and write
1A6B765A000
heap
page read and write
2084E990000
trusted library allocation
page read and write
7ED859E000
stack
page read and write
273358B5000
heap
page read and write
7FFF2F376000
unkown
page read and write
310000
heap
page read and write
7FFF2F379000
unkown
page readonly
1A6B7686000
heap
page read and write
177E8FE000
stack
page read and write
233F7D4A000
heap
page read and write
233F7D75000
heap
page read and write
104A000
heap
page read and write
233F7D8B000
heap
page read and write
1C27158D000
heap
page read and write
37FC6F9000
stack
page read and write
233F7D75000
heap
page read and write
233F72C3000
heap
page read and write
16539E80000
trusted library allocation
page read and write
233F7D7D000
heap
page read and write
264CB64B000
heap
page read and write
1A6B764E000
heap
page read and write
233F8202000
heap
page read and write
233F7DAE000
heap
page read and write
233F7D7E000
heap
page read and write
2084E620000
trusted library allocation
page read and write
233F8202000
heap
page read and write
18002D000
direct allocation
page readonly
233F7140000
heap
page read and write
233F7C02000
heap
page read and write
1A6B765A000
heap
page read and write
2084F4F0000
trusted library allocation
page read and write
233F7D71000
heap
page read and write
FCF000
stack
page read and write
233F7D8D000
heap
page read and write
7FFF2F379000
unkown
page readonly
4D4327B000
stack
page read and write
18002D000
direct allocation
page readonly
7EEAA75000
stack
page read and write
862000
heap
page read and write
264CB66C000
heap
page read and write
89C000
heap
page read and write
273356C5000
heap
page read and write
233F72A4000
heap
page read and write
7ED8D7E000
stack
page read and write
29F10C70000
heap
page read and write
1F17FA87000
heap
page read and write
233F7D50000
heap
page read and write
18002E000
direct allocation
page read and write
1A6B766D000
heap
page read and write
34D9FB000
stack
page read and write
7FFF2F321000
unkown
page execute read
233F8202000
heap
page read and write
233F72B5000
heap
page read and write
18002F000
direct allocation
page readonly
233F7D96000
heap
page read and write
233F7DB2000
heap
page read and write
233F7D90000
heap
page read and write
1A6B75DB000
heap
page read and write
EF0000
direct allocation
page execute and read and write
37FC67E000
stack
page read and write
233F7D9E000
heap
page read and write
16539600000
heap
page read and write
34D7FB000
stack
page read and write
233F724D000
heap
page read and write
1F17FA4D000
heap
page read and write
233F72E1000
heap
page read and write
1C2718B0000
heap
page read and write
105B000
heap
page read and write
233F723C000
heap
page read and write
7FFF2F320000
unkown
page readonly
233F7D86000
heap
page read and write
7ED8A7E000
stack
page read and write
1C273204000
heap
page read and write
233F821A000
heap
page read and write
264CB5F0000
heap
page read and write
233F7D75000
heap
page read and write
7EEAAFF000
stack
page read and write
177E97E000
stack
page read and write
7A0000
heap
page readonly
233F7D95000
heap
page read and write
1C2733C0000
heap
page read and write
233F7D9F000
heap
page read and write
233F7D75000
heap
page read and write
7FFF2F379000
unkown
page readonly
273356A0000
heap
page read and write
2CFE37D000
stack
page read and write
86D000
heap
page read and write
A38AB0F000
stack
page read and write
233F8202000
heap
page read and write
233F72C8000
heap
page read and write
16539702000
heap
page read and write
1A6B7530000
heap
page read and write
233F7D8D000
heap
page read and write
2084E9A0000
heap
page readonly
233F7DA0000
heap
page read and write
233F7D83000
heap
page read and write
273356C3000
heap
page read and write
233F7308000
heap
page read and write
2CFDB7B000
stack
page read and write
3F0000
remote allocation
page read and write
1A6BAA33000
heap
page read and write
1C2714B0000
heap
page read and write
16539613000
heap
page read and write
233F7D9F000
heap
page read and write
B44000
stack
page read and write
233F7DD2000
heap
page read and write
2084E8F0000
trusted library allocation
page read and write
1AB5B229000
heap
page read and write
862000
heap
page read and write
2084E730000
heap
page read and write
233F7D94000
heap
page read and write
233F724A000
heap
page read and write
1C271540000
heap
page read and write
1653963D000
heap
page read and write
34D47B000
stack
page read and write
273356C1000
heap
page read and write
7FFF2F320000
unkown
page readonly
86D000
heap
page read and write
18002F000
direct allocation
page readonly
1F17FA3C000
heap
page read and write
233F7D5C000
heap
page read and write
233F7D77000
heap
page read and write
233F7D9F000
heap
page read and write
A38AFFB000
stack
page read and write
233F7B10000
remote allocation
page read and write
107F000
heap
page read and write
233F8200000
heap
page read and write
233F7D9C000
heap
page read and write
180000000
direct allocation
page read and write
2084E610000
heap
page read and write
16539670000
heap
page read and write
233F7D83000
heap
page read and write
180000000
direct allocation
page read and write
233F7D9E000
heap
page read and write
264CB590000
heap
page read and write
27335680000
heap
page read and write
2964000
heap
page read and write
26CB000
stack
page read and write
2084E6A0000
heap
page read and write
89C000
heap
page read and write
29F10B30000
heap
page read and write
1A6B766D000
heap
page read and write
177E5AF000
stack
page read and write
7FFF2F376000
unkown
page read and write
7FFF2F372000
unkown
page readonly
3F0000
remote allocation
page read and write
233F7DBF000
heap
page read and write
233F7251000
heap
page read and write
7ED8B77000
stack
page read and write
233F7D78000
heap
page read and write
29F10CB0000
heap
page read and write
2284000
heap
page read and write
1AB5B25D000
heap
page read and write
1F17FA7C000
heap
page read and write
1C9282D0000
heap
page read and write
2084E6E0000
heap
page read and write
1AB5B28A000
heap
page read and write
233F7D71000
heap
page read and write
B651278000
stack
page read and write
233F7D9F000
heap
page read and write
273356B2000
heap
page read and write
83D000
heap
page read and write
233F7D9F000
heap
page read and write
7415A7B000
stack
page read and write
1AB5B200000
heap
page read and write
264CC002000
trusted library allocation
page read and write
7FFF2F320000
unkown
page readonly
1AB5BC02000
trusted library allocation
page read and write
233F7D75000
heap
page read and write
1A6B765F000
heap
page read and write
FD8000
heap
page read and write
1AB5B202000
heap
page read and write
760000
direct allocation
page execute and read and write
34DAFF000
stack
page read and write
1653967B000
heap
page read and write
2E2E000
stack
page read and write
7FFF2F379000
unkown
page readonly
950000
trusted library allocation
page read and write
233F7213000
heap
page read and write
233F7D5C000
heap
page read and write
1A6B75E0000
heap
page read and write
2CFDE7E000
stack
page read and write
233F72A3000
heap
page read and write
7415D7B000
stack
page read and write
16539580000
heap
page read and write
1AB5B300000
heap
page read and write
233F72B2000
heap
page read and write
233F8222000
heap
page read and write
233F7D83000
heap
page read and write
7FFF2F321000
unkown
page execute read
180000000
direct allocation
page read and write
1C273200000
heap
page read and write
233F7DC4000
heap
page read and write
233F7DAF000
heap
page read and write
1C271568000
heap
page read and write
7FFF2F320000
unkown
page readonly
1F17FA52000
heap
page read and write
1C929EF0000
heap
page read and write
1F17FA00000
heap
page read and write
233F7DAD000
heap
page read and write
741627F000
unkown
page read and write
7415AFE000
stack
page read and write
1C928542000
heap
page read and write
233F7D5C000
heap
page read and write
89C000
heap
page read and write
273356C0000
heap
page read and write
233F724B000
heap
page read and write
2084EA00000
trusted library allocation
page read and write
7D8000
heap
page read and write
1C929EF4000
heap
page read and write
7FFF2F372000
unkown
page readonly
1F17FB13000
heap
page read and write
233F7D9F000
heap
page read and write
FD0000
heap
page read and write
273356D1000
heap
page read and write
7FFF2F372000
unkown
page readonly
16539700000
heap
page read and write
1A6B7672000
heap
page read and write
233F7DBF000
heap
page read and write
233F7D18000
heap
page read and write
18002E000
direct allocation
page read and write
29F10CC5000
heap
page read and write
233F7DA6000
heap
page read and write
2084E8E0000
trusted library allocation
page read and write
274E000
stack
page read and write
1C928480000
heap
page read and write
18002F000
direct allocation
page readonly
1C9284A0000
direct allocation
page execute and read and write
7ED849B000
stack
page read and write
233F8222000
heap
page read and write
233F821A000
heap
page read and write
1C929E20000
heap
page read and write
1F17FA50000
heap
page read and write
264CB713000
heap
page read and write
233F8202000
heap
page read and write
233F7DAF000
heap
page read and write
2CFE27F000
stack
page read and write
1F17FA8B000
heap
page read and write
B65117F000
stack
page read and write
7D0000
heap
page read and write
264CB650000
heap
page read and write
1AB5B213000
heap
page read and write
29F10CB8000
heap
page read and write
233F7D85000
heap
page read and write
264CB629000
heap
page read and write
9B0000
remote allocation
page read and write
1A6B7669000
heap
page read and write
A38AEFB000
stack
page read and write
2950000
heap
page read and write
273356E1000
heap
page read and write
1AB5B27F000
heap
page read and write
1653A002000
trusted library allocation
page read and write
233F7DA0000
heap
page read and write
7415B7E000
stack
page read and write
9E0000
heap
page read and write
7FFF2F376000
unkown
page read and write
1A6B767E000
heap
page read and write
1F17F8B0000
heap
page read and write
273356C7000
heap
page read and write
7EEABFE000
stack
page read and write
233F7D0B000
heap
page read and write
264CB708000
heap
page read and write
233F7200000
heap
page read and write
37FC5F9000
stack
page read and write
233F7D8D000
heap
page read and write
273356D1000
heap
page read and write
273356C8000
heap
page read and write
1AB5B23C000
heap
page read and write
233F7D83000
heap
page read and write
2EAB000
stack
page read and write
2084E950000
trusted library allocation
page read and write
1A6B7663000
heap
page read and write
233F7D71000
heap
page read and write
233F7DA2000
heap
page read and write
233F7D8D000
heap
page read and write
F40000
heap
page readonly
233F72D1000
heap
page read and write
1A6B75D0000
heap
page read and write
233F7D9F000
heap
page read and write
233F7D6E000
heap
page read and write
9B0000
remote allocation
page read and write
1AB5B302000
heap
page read and write
233F7D21000
heap
page read and write
1076000
heap
page read and write
233F7D65000
heap
page read and write
233F7D70000
heap
page read and write
B65137C000
stack
page read and write
233F7DC4000
heap
page read and write
2084E730000
heap
page read and write
7415E78000
stack
page read and write
37FC57A000
stack
page read and write
233F7288000
heap
page read and write
1F17FA2C000
heap
page read and write
811000
heap
page read and write
A38B2FE000
stack
page read and write
7ED851E000
stack
page read and write
1AB5B130000
heap
page read and write
A90000
heap
page read and write
1F17FB00000
heap
page read and write
1C271560000
heap
page read and write
2084E6E8000
heap
page read and write
18002E000
direct allocation
page read and write
980000
heap
page read and write
233F7316000
heap
page read and write
1AB5B120000
heap
page read and write
233F7DD3000
heap
page read and write
233F7B10000
remote allocation
page read and write
264CB649000
heap
page read and write
233F7270000
heap
page read and write
233F7DAE000
heap
page read and write
233F7D00000
heap
page read and write
233F72F8000
heap
page read and write
1A6B75A0000
heap
page read and write
233F7D7D000
heap
page read and write
1F17FA48000
heap
page read and write
9E5000
heap
page read and write
There are 550 hidden memdumps, click here to show them.