IOC Report
Plt3z2W7KQ.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\Plt3z2W7KQ.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\Plt3z2W7KQ.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\Plt3z2W7KQ.dll,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\Plt3z2W7KQ.dll,DllUnregisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\KFXXkqoKy\adCFCoWid.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XxAsGMCLqrlaY\QoxZfNcqe.dll"
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\Plt3z2W7KQ.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Plt3z2W7KQ.dll",#1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://23.239.0.12/n
unknown
malicious
https://23.239.0.12/O
unknown
malicious
https://23.239.0.12/C
unknown
malicious
https://23.239.0.12/
23.239.0.12
malicious
https://23.239.0.12/ga
unknown
malicious
https://23.239.0.12/dll90
unknown
malicious
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://www.tiktok.com/legal/report/feedback
unknown
http://help.disneyplus.com.
unknown
https://support.hotspotshield.com/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://disneyplus.com/legal.
unknown
There are 4 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
23.239.0.12
unknown
United States
malicious
192.168.2.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
2250000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
235EA8D0000
direct allocation
page execute and read and write
malicious
1360000
direct allocation
page execute and read and write
malicious
235071B0000
direct allocation
page execute and read and write
malicious
CCA6D7F000
stack
page read and write
A20000
heap
page read and write
170ADAB3000
heap
page read and write
24A8DC02000
trusted library allocation
page read and write
16EFEB9A000
heap
page read and write
24A8D413000
heap
page read and write
16F380B0000
trusted library allocation
page read and write
16EFEB78000
heap
page read and write
170AA7A9000
heap
page read and write
17A5E076000
heap
page read and write
16EFEBA1000
heap
page read and write
16EFEB94000
heap
page read and write
170AA670000
heap
page read and write
FE0000
heap
page read and write
16EFE0B5000
heap
page read and write
910000
heap
page read and write
7FFF2F359000
unkown
page readonly
16EFEB8D000
heap
page read and write
16EFE029000
heap
page read and write
18002E000
direct allocation
page read and write
280E000
stack
page read and write
16F371E0000
trusted library allocation
page read and write
170AA7A2000
heap
page read and write
1BBE37F000
stack
page read and write
16F37000000
heap
page read and write
24A8D47F000
heap
page read and write
1404000
heap
page read and write
16EFDED0000
heap
page read and write
217E60B2000
heap
page read and write
170AAA35000
heap
page read and write
984000
heap
page read and write
1C909E13000
heap
page read and write
1431000
heap
page read and write
378AA7E000
stack
page read and write
16EFE013000
heap
page read and write
1C909E70000
heap
page read and write
24A8D429000
heap
page read and write
217E60C5000
heap
page read and write
619B577000
stack
page read and write
235072D5000
heap
page read and write
170AA650000
heap
page read and write
235070B8000
heap
page read and write
170AA7AE000
heap
page read and write
16F372A1000
heap
page read and write
CCA6C7E000
stack
page read and write
1431000
heap
page read and write
16EFF002000
heap
page read and write
16EFEB9B000
heap
page read and write
2BF2F44C000
heap
page read and write
86F66FE000
stack
page read and write
16EFEB8D000
heap
page read and write
323E000
stack
page read and write
1C909E5D000
heap
page read and write
16EFEBD2000
heap
page read and write
32BB000
stack
page read and write
24A8D400000
heap
page read and write
16EFE062000
heap
page read and write
170AA793000
heap
page read and write
217E60D8000
heap
page read and write
2BF2F500000
heap
page read and write
24A8D280000
heap
page read and write
16EFE05A000
heap
page read and write
16EFEB91000
heap
page read and write
16EFEB94000
heap
page read and write
7FFF2F356000
unkown
page read and write
235E8EF8000
heap
page read and write
16EFEB95000
heap
page read and write
170ADAC0000
trusted library allocation
page read and write
235E92A0000
direct allocation
page execute and read and write
217E60A0000
heap
page read and write
17A5E113000
heap
page read and write
2350710D000
heap
page read and write
CA62177000
stack
page read and write
22FE000
stack
page read and write
28AF000
stack
page read and write
170AAA3B000
heap
page read and write
16EFEB8D000
heap
page read and write
16EFE0F7000
heap
page read and write
378A79E000
stack
page read and write
16F37520000
trusted library allocation
page read and write
16EFEB91000
heap
page read and write
217E60D0000
heap
page read and write
16EFE000000
heap
page read and write
1CD9F3E0000
heap
page read and write
217E60CD000
heap
page read and write
16EFE059000
heap
page read and write
86F677B000
stack
page read and write
241C000
stack
page read and write
170AA6F0000
heap
page read and write
16EFEB8E000
heap
page read and write
217E60C6000
heap
page read and write
16EFEB8D000
heap
page read and write
17A5E000000
heap
page read and write
2D60000
trusted library allocation
page read and write
1CD9F4A5000
heap
page read and write
16EFEB91000
heap
page read and write
16EFE065000
heap
page read and write
7EC57FE000
stack
page read and write
16F380A0000
heap
page readonly
235EAAC0000
heap
page read and write
17A5E102000
heap
page read and write
12D0000
heap
page read and write
510000
heap
page read and write
16EFEB76000
heap
page read and write
16F37519000
heap
page read and write
23507240000
heap
page read and write
16EFDF40000
heap
page read and write
235072D0000
heap
page read and write
980000
heap
page read and write
18002F000
direct allocation
page readonly
24A8D457000
heap
page read and write
16EFEB8F000
heap
page read and write
16F38090000
trusted library allocation
page read and write
538A5F7000
stack
page read and write
16F37E80000
trusted library allocation
page read and write
915000
heap
page read and write
217E60D8000
heap
page read and write
24A8D502000
heap
page read and write
5389F5C000
stack
page read and write
16EFEBC6000
heap
page read and write
1330000
heap
page read and write
18002E000
direct allocation
page read and write
16EFE0E5000
heap
page read and write
17A5E002000
heap
page read and write
16EFE05D000
heap
page read and write
16EFEB8D000
heap
page read and write
17A5DFD0000
heap
page read and write
7FFF2F300000
unkown
page readonly
2BF2F300000
heap
page read and write
235E8E40000
heap
page read and write
24A8D508000
heap
page read and write
16EFE116000
heap
page read and write
18002E000
direct allocation
page read and write
170AA7B6000
heap
page read and write
619B77F000
stack
page read and write
170AA777000
heap
page read and write
14A5000
heap
page read and write
16EFF002000
heap
page read and write
16EFEB94000
heap
page read and write
170AA770000
heap
page read and write
CA61E7E000
stack
page read and write
F78A97C000
stack
page read and write
4BAAA7E000
stack
page read and write
217E60D0000
heap
page read and write
16EFF000000
heap
page read and write
1C909F13000
heap
page read and write
235E8ED0000
heap
page read and write
16EFEB9E000
heap
page read and write
CA6237F000
stack
page read and write
9B8000
heap
page read and write
17A5E028000
heap
page read and write
1C909F00000
heap
page read and write
23506ED0000
heap
page read and write
16EFEB78000
heap
page read and write
350F000
stack
page read and write
16EFEB99000
heap
page read and write
217E60B7000
heap
page read and write
2BF2F427000
heap
page read and write
16EFEBAE000
heap
page read and write
16F380C0000
trusted library allocation
page read and write
16EFE0A4000
heap
page read and write
16EFEB00000
heap
page read and write
16EFEB8E000
heap
page read and write
170AD930000
heap
page read and write
538A27D000
stack
page read and write
FA4000
stack
page read and write
24A8D472000
heap
page read and write
170AA79D000
heap
page read and write
F78AE7B000
stack
page read and write
7FFF2F301000
unkown
page execute read
5C4000
stack
page read and write
217E6070000
heap
page read and write
17A5E03C000
heap
page read and write
13C8000
heap
page read and write
235071E0000
heap
page readonly
16EFE05B000
heap
page read and write
2DDF000
stack
page read and write
144A000
heap
page read and write
2D60000
trusted library allocation
page read and write
16EFEB78000
heap
page read and write
235EA940000
heap
page read and write
538A3FE000
stack
page read and write
378A71B000
stack
page read and write
F78A9FE000
stack
page read and write
1C909E00000
heap
page read and write
16EFE0DD000
heap
page read and write
7EC5779000
stack
page read and write
16EFDFE0000
remote allocation
page read and write
2BF2F44D000
heap
page read and write
18002D000
direct allocation
page readonly
16EFDF70000
trusted library allocation
page read and write
CCA6E7E000
stack
page read and write
619AECB000
stack
page read and write
170AA79D000
heap
page read and write
7FFF2F352000
unkown
page readonly
16F372A1000
heap
page read and write
8D0000
heap
page read and write
2BF2F454000
heap
page read and write
7FFF2F352000
unkown
page readonly
217E6270000
heap
page read and write
16EFE108000
heap
page read and write
1394000
heap
page read and write
4BAA9F9000
stack
page read and write
1C909E29000
heap
page read and write
24A8D48D000
heap
page read and write
16F38110000
trusted library allocation
page read and write
24A8D500000
heap
page read and write
16EFEB9B000
heap
page read and write
619AF4E000
stack
page read and write
3490000
remote allocation
page read and write
17A5EA02000
trusted library allocation
page read and write
CCA6DFE000
stack
page read and write
7EC587C000
stack
page read and write
16EFDFE0000
remote allocation
page read and write
16EFEBAE000
heap
page read and write
24A8D402000
heap
page read and write
16EFE058000
heap
page read and write
3490000
remote allocation
page read and write
16EFEB97000
heap
page read and write
7FFF2F301000
unkown
page execute read
217E60C2000
heap
page read and write
217E60C4000
heap
page read and write
16EFE052000
heap
page read and write
16F37010000
trusted library allocation
page read and write
16F37515000
heap
page read and write
1404000
heap
page read and write
2BF2F457000
heap
page read and write
1C909F08000
heap
page read and write
4BAA97C000
stack
page read and write
145C000
heap
page read and write
7FFF2F300000
unkown
page readonly
1C909E53000
heap
page read and write
16EFEB78000
heap
page read and write
16EFE102000
heap
page read and write
237F000
stack
page read and write
16EFEB9D000
heap
page read and write
235EA900000
heap
page readonly
1451000
heap
page read and write
180000000
direct allocation
page read and write
4BAAAF9000
stack
page read and write
16EFF003000
heap
page read and write
16EFEA02000
heap
page read and write
217E60AB000
heap
page read and write
3490000
remote allocation
page read and write
235E8EF0000
heap
page read and write
18002D000
direct allocation
page readonly
16F372BD000
heap
page read and write
18002F000
direct allocation
page readonly
16F3729A000
heap
page read and write
FD0000
remote allocation
page read and write
235E92B5000
heap
page read and write
CA61B6B000
stack
page read and write
CCA6EFE000
stack
page read and write
619B47E000
stack
page read and write
235E8EB0000
heap
page read and write
16EFEB94000
heap
page read and write
16F37160000
heap
page read and write
619AFCE000
stack
page read and write
16EFE0C4000
heap
page read and write
538A6FA000
stack
page read and write
16EFEBB8000
heap
page read and write
2BF2F413000
heap
page read and write
8F0000
heap
page read and write
1BBE27E000
stack
page read and write
2BF2FC02000
trusted library allocation
page read and write
1350000
direct allocation
page execute and read and write
142E000
heap
page read and write
7FFF2F352000
unkown
page readonly
2BF2F513000
heap
page read and write
16EFDEE0000
heap
page read and write
1BBDB5C000
stack
page read and write
F78AD7B000
stack
page read and write
16F371D0000
trusted library allocation
page read and write
17A5DF60000
heap
page read and write
538A4FA000
stack
page read and write
2BF2F400000
heap
page read and write
16EFEBC1000
heap
page read and write
CA6227F000
stack
page read and write
1C909E5D000
heap
page read and write
16EFEB9D000
heap
page read and write
7FFF2F356000
unkown
page read and write
16EFF021000
heap
page read and write
217E6310000
heap
page read and write
16EFEB8D000
heap
page read and write
2BF2FBA0000
trusted library allocation
page read and write
148E000
heap
page read and write
17A5DF70000
heap
page read and write
16EFE0AB000
heap
page read and write
86F65FE000
stack
page read and write
2BF2F44F000
heap
page read and write
217E60D0000
heap
page read and write
A34000
heap
page read and write
7EC53AE000
stack
page read and write
FD0000
remote allocation
page read and write
18002D000
direct allocation
page readonly
619B67F000
stack
page read and write
217E60CD000
heap
page read and write
217E60D9000
heap
page read and write
31BB000
stack
page read and write
16EFEB52000
heap
page read and write
170AA7AA000
heap
page read and write
F78AF77000
stack
page read and write
1C909D20000
trusted library allocation
page read and write
16EFEB9E000
heap
page read and write
16EFE089000
heap
page read and write
24A8D380000
trusted library allocation
page read and write
217E6010000
heap
page read and write
24A8D43C000
heap
page read and write
16EFE0EC000
heap
page read and write
7FFF2F300000
unkown
page readonly
16EFEB9D000
heap
page read and write
2DF0000
heap
page read and write
170AA510000
heap
page read and write
1C909E3C000
heap
page read and write
619B3FB000
stack
page read and write
F78B17C000
stack
page read and write
16EFEB96000
heap
page read and write
235070FF000
heap
page read and write
235E92B0000
heap
page read and write
217E60B7000
heap
page read and write
F78B27E000
stack
page read and write
170AA799000
heap
page read and write
7FFF2F356000
unkown
page read and write
235EAAC4000
heap
page read and write
538A7FF000
stack
page read and write
2BF2F2A0000
heap
page read and write
23507080000
heap
page read and write
235070B0000
heap
page read and write
16F372C1000
heap
page read and write
23507010000
heap
page read and write
7EC567F000
stack
page read and write
7FFF2F301000
unkown
page execute read
1C909E77000
heap
page read and write
16EFEB91000
heap
page read and write
217E6315000
heap
page read and write
16EFF002000
heap
page read and write
CCA6985000
stack
page read and write
170AA78A000
heap
page read and write
235E8F3E000
heap
page read and write
16EFEB78000
heap
page read and write
16EFEB9B000
heap
page read and write
17A5E06B000
heap
page read and write
CA6207B000
stack
page read and write
180000000
direct allocation
page read and write
A13000
heap
page read and write
2BF2F290000
heap
page read and write
170AA78A000
heap
page read and write
346F000
stack
page read and write
F78B07F000
stack
page read and write
16F37240000
trusted library allocation
page read and write
1C909BB0000
heap
page read and write
16EFEBAA000
heap
page read and write
86F667E000
stack
page read and write
7EC56FE000
stack
page read and write
1CD9F450000
heap
page read and write
33CF000
stack
page read and write
1C909E4D000
heap
page read and write
86F64FF000
stack
page read and write
7FFF2F359000
unkown
page readonly
13C0000
heap
page read and write
17A5E870000
trusted library allocation
page read and write
170AA793000
heap
page read and write
217E60DD000
heap
page read and write
17A5E100000
heap
page read and write
1C909BC0000
heap
page read and write
CCA6CFE000
stack
page read and write
24A8D451000
heap
page read and write
7FFF2F352000
unkown
page readonly
170AA78F000
heap
page read and write
16EFE03C000
heap
page read and write
16EFEB8D000
heap
page read and write
1459000
heap
page read and write
145C000
heap
page read and write
16F3729B000
heap
page read and write
16EFE113000
heap
page read and write
18002E000
direct allocation
page read and write
13FC000
heap
page read and write
CCA6F7B000
stack
page read and write
145C000
heap
page read and write
7EC532A000
stack
page read and write
16F372A2000
heap
page read and write
23507030000
heap
page read and write
235E9280000
heap
page read and write
148C000
heap
page read and write
1BBE07B000
stack
page read and write
13A0000
heap
page readonly
EF0000
heap
page read and write
1C909C20000
heap
page read and write
2BF2F43C000
heap
page read and write
16EFEB95000
heap
page read and write
16EFE0B0000
heap
page read and write
2BF2F44B000
heap
page read and write
17A5E065000
heap
page read and write
12F0000
heap
page read and write
16F37510000
heap
page read and write
16EFEB8D000
heap
page read and write
2BF2F481000
heap
page read and write
16EFEBB4000
heap
page read and write
970000
direct allocation
page execute and read and write
7FFF2F359000
unkown
page readonly
16EFF002000
heap
page read and write
1BBE17B000
stack
page read and write
148C000
heap
page read and write
7FFF2F301000
unkown
page execute read
18002D000
direct allocation
page readonly
16EFE04D000
heap
page read and write
180000000
direct allocation
page read and write
7FFF2F356000
unkown
page read and write
148E000
heap
page read and write
12F5000
heap
page read and write
23507244000
heap
page read and write
A34000
heap
page read and write
170AA77B000
heap
page read and write
16EFEB91000
heap
page read and write
148E000
heap
page read and write
16EFF002000
heap
page read and write
950000
heap
page read and write
16EFEB78000
heap
page read and write
2BF2F429000
heap
page read and write
16EFEB14000
heap
page read and write
CA61BEE000
stack
page read and write
16EFEB91000
heap
page read and write
2BF2F476000
heap
page read and write
7FFF2F359000
unkown
page readonly
16EFDFE0000
remote allocation
page read and write
16EFF002000
heap
page read and write
2BF2F508000
heap
page read and write
23508BC0000
heap
page read and write
16EFE05E000
heap
page read and write
17A5E013000
heap
page read and write
2BF2F502000
heap
page read and write
A4E000
heap
page read and write
1451000
heap
page read and write
16EFF002000
heap
page read and write
24A8D220000
heap
page read and write
24A8D513000
heap
page read and write
3C714FD000
stack
page read and write
217E60DE000
heap
page read and write
16EFEB9D000
heap
page read and write
1CD9F490000
heap
page read and write
292B000
stack
page read and write
148C000
heap
page read and write
170AAA30000
heap
page read and write
235E8F4E000
heap
page read and write
16EFE0EF000
heap
page read and write
170ADAB0000
heap
page read and write
990000
heap
page readonly
16EFE0CB000
heap
page read and write
1C909F02000
heap
page read and write
217E60D8000
heap
page read and write
16EFF002000
heap
page read and write
7FFF2F300000
unkown
page readonly
4BAAB7F000
stack
page read and write
1C909E83000
heap
page read and write
1390000
heap
page read and write
235070A0000
direct allocation
page execute and read and write
2440000
heap
page read and write
F78AC7F000
stack
page read and write
1CD9F498000
heap
page read and write
86F6475000
stack
page read and write
538A979000
stack
page read and write
180000000
direct allocation
page read and write
5389FDE000
stack
page read and write
18002F000
direct allocation
page readonly
16EFEB18000
heap
page read and write
24A8D210000
heap
page read and write
217E60CD000
heap
page read and write
4BAA56B000
stack
page read and write
1C90A602000
trusted library allocation
page read and write
170AA787000
heap
page read and write
538A87F000
unkown
page read and write
16EFEB91000
heap
page read and write
16F37140000
heap
page read and write
9B0000
heap
page read and write
2BF2F470000
heap
page read and write
86F657F000
stack
page read and write
16EFEB75000
heap
page read and write
16F37259000
heap
page read and write
16EFE0EF000
heap
page read and write
16F37250000
heap
page read and write
170AA78E000
heap
page read and write
16EFEB91000
heap
page read and write
18002F000
direct allocation
page readonly
3520000
heap
page read and write
There are 482 hidden memdumps, click here to show them.