IOC Report
pebbles.dat.dll

loading gif

Files

File Path
Type
Category
Malicious
pebbles.dat.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\Desktop\pebbles.dat.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\pebbles.dat.dll"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pebbles.dat.dll",#1
malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\pebbles.dat.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\pebbles.dat.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\pebbles.dat.dll,DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\pebbles.dat.dll,DllUnregisterServer
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\pebbles.dat.dll,bewailable
malicious
C:\Windows\System32\audiodg.exe
C:\Windows\system32\AUDIODG.EXE 0x2ac
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Ymxempiiozk
5d054d9
HKEY_CURRENT_USER\Software\Microsoft\Ymxempiiozk
304f8497
HKEY_CURRENT_USER\Software\Microsoft\Ymxempiiozk
320ea4eb
HKEY_CURRENT_USER\Software\Microsoft\Ymxempiiozk
8ab2c38e
HKEY_CURRENT_USER\Software\Microsoft\Ymxempiiozk
f7ba8c04
HKEY_CURRENT_USER\Software\Microsoft\Ymxempiiozk
4f06eb61
HKEY_CURRENT_USER\Software\Microsoft\Ymxempiiozk
88f3e3f2
HKEY_CURRENT_USER\Software\Microsoft\Ymxempiiozk
7a993b2f
HKEY_CURRENT_USER\Software\Microsoft\Ymxempiiozk
5d054d9
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
dbdf127f
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
ee40c231
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
ec01e24d
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
54bd8528
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
29b5caa2
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
9109adc7
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
56fca554
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
a4967d89
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
dbdf127f
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
dbdf127f
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
990000
trusted library allocation
page execute and read and write
malicious
E40000
system
page execute and read and write
malicious
4450000
trusted library allocation
page execute and read and write
malicious
E40000
system
page execute and read and write
malicious
4430000
trusted library allocation
page read and write
malicious
12A0000
system
page execute and read and write
malicious
970000
system
page execute and read and write
malicious
590000
trusted library allocation
page read and write
malicious
2D60000
trusted library allocation
page read and write
malicious
2EE0000
trusted library allocation
page execute and read and write
malicious
970000
system
page execute and read and write
malicious
11B0B3E5000
heap
page read and write
206EA900000
heap
page read and write
34A0000
trusted library allocation
page read and write
22C0FC4F000
heap
page read and write
BF0000
unkown
page read and write
4CF0000
heap
page read and write
521F000
heap
page read and write
19D1D402000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
206EA760000
heap
page read and write
34A0000
trusted library allocation
page read and write
D8E000
stack
page read and write
FC0000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
1DA8839E000
heap
page read and write
21E51A4F000
heap
page read and write
1DA8838C000
heap
page read and write
22C0FC43000
heap
page read and write
5220000
heap
page read and write
176F23A0000
trusted library allocation
page read and write
21E51A57000
heap
page read and write
11B0BB22000
heap
page read and write
205CC240000
heap
page read and write
5650000
trusted library allocation
page read and write
534000
heap
page read and write
16B64E76000
heap
page read and write
96DCFE000
stack
page read and write
206EA7D0000
heap
page read and write
940000
unkown
page readonly
BD0000
unkown
page readonly
24ED47F0000
trusted library allocation
page read and write
93C000
stack
page read and write
1C5194D7000
heap
page read and write
22C0FC69000
heap
page read and write
2D84000
heap
page read and write
D4837E000
stack
page read and write
21E51B08000
heap
page read and write
1DA8837C000
heap
page read and write
176F0A70000
heap
page read and write