Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
pebbles.dat.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\Desktop\pebbles.dat.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\pebbles.dat.dll"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pebbles.dat.dll",#1
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\pebbles.dat.dll
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\pebbles.dat.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\pebbles.dat.dll,DllRegisterServer
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\pebbles.dat.dll,DllUnregisterServer
|
||
C:\Windows\SysWOW64\wermgr.exe
|
C:\Windows\SysWOW64\wermgr.exe
|
||
C:\Windows\SysWOW64\wermgr.exe
|
C:\Windows\SysWOW64\wermgr.exe
|
||
C:\Windows\SysWOW64\wermgr.exe
|
C:\Windows\SysWOW64\wermgr.exe
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\pebbles.dat.dll,bewailable
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 1 hidden processes, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
|
dbdf127f
|
||
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
|
ee40c231
|
||
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
|
ec01e24d
|
||
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
|
54bd8528
|
||
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
|
29b5caa2
|
||
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
|
9109adc7
|
||
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
|
56fca554
|
||
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
|
a4967d89
|
||
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
|
dbdf127f
|
||
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
|
dbdf127f
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4A40000
|
trusted library allocation
|
page read and write
|
||
3160000
|
trusted library allocation
|
page execute and read and write
|
||
32E0000
|
trusted library allocation
|
page read and write
|
||
29B0000
|
system
|
page execute and read and write
|
||
2C60000
|
system
|
page execute and read and write
|
||
3140000
|
trusted library allocation
|
page read and write
|
||
2D40000
|
system
|
page execute and read and write
|
||
4A60000
|
trusted library allocation
|
page execute and read and write
|
||
2D40000
|
system
|
page execute and read and write
|
||
2C60000
|
system
|
page execute and read and write
|
||
3460000
|
trusted library allocation
|
page execute and read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
1E5A5000000
|
heap
|
page read and write
|
||
2C130602000
|
heap
|
page read and write
|
||
2FC8000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
unkown
|
page readonly
|
||
11E0000
|
heap
|
page read and write
|
||
2C130689000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
2E091429000
|
heap
|
page read and write
|
||
518C000
|
trusted library allocation
|
page read and write
|
||
1E5A4F00000
|
heap
|
page read and write
|
||
2C1304B0000
|
heap
|
page read and write
|
||
3051000
|
trusted library allocation
|
page read and write
|
||
2701405C000
|
heap
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
6D930000
|
unkown
|
page readonly
|
||
2FC8000
|
trusted library allocation
|
page read and write
|
||
2FC8000
|
trusted library allocation
|
page read and write
|
||
310F000
|
unkown
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
72B6000
|
trusted library allocation
|
page read and write
|
||
2D20000
|
unkown
|
page readonly
|
||
F9641FF000
|
stack
|
page read and write
|
||
4AD3000
|
heap
|
page read and write
|
||
1E91A857000
|
heap
|
page read and write
|
||
1E91A900000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
1E5A5043000
|
heap
|
page read and write
|
||
2701402A000
|
heap
|
page read and write
|
||
3490000
|
trusted library allocation
|
page read and write
|
||
2C50000
|
unkown
|
page read and write
|
||
6AB2000
|
trusted library allocation
|
page read and write
|
||
32DE000
|
stack
|
page read and write
|
||
2C40000
|
unkown
|
page readonly
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
unkown
|
page readonly
|
||
1E91A889000
|
heap
|
page read and write
|
||
4ED0000
|
heap
|
page read and write
|
||
364217C000
|
stack
|
page read and write
|
||
19078A6E000
|
heap
|
page read and write
|
||
A63A07D000
|
stack
|
page read and write
|
||
2FAA000
|
trusted library allocation
|
page read and write
|
||
2FC8000
|
trusted library allocation
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
F9644FF000
|
stack
|
page read and write
|
||
29ED000
|
stack
|
page read and write
|
||