IOC Report
diatomaceous.dat.dll

loading gif

Files

File Path
Type
Category
Malicious
diatomaceous.dat.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\Desktop\diatomaceous.dat.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\diatomaceous.dat.dll"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\diatomaceous.dat.dll",#1
malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\diatomaceous.dat.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\diatomaceous.dat.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\diatomaceous.dat.dll,DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\diatomaceous.dat.dll,DllUnregisterServer
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
b501c7c4
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
809e178a
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
82df37f6
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
3a635093
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
476b1f19
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
ffd7787c
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
382270ef
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
ca48a832
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
b501c7c4
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
b501c7c4

Memdumps

Base Address
Regiontype
Protect
Malicious
2520000
system
page execute and read and write
malicious
3000000
trusted library allocation
page read and write
malicious
4960000
trusted library allocation
page read and write
malicious
2BC0000
trusted library allocation
page execute and read and write
malicious
2B70000
trusted library allocation
page read and write
malicious
2520000
system
page execute and read and write
malicious
2BC0000
system
page execute and read and write
malicious
4AD0000
trusted library allocation
page execute and read and write
malicious
4AF0000
trusted library allocation
page execute and read and write
malicious
2580000
system
page execute and read and write
malicious
2580000
system
page execute and read and write
malicious
4C41000
heap
page read and write
6DAA6000
unkown
page readonly
4A35000
trusted library allocation
page read and write
4C16000
heap
page read and write
4460000
trusted library allocation
page read and write
6CB000
heap
page read and write
4A9F000
stack
page read and write
2DF0000
trusted library allocation
page read and write
2B90000
unkown
page readonly
2500000
unkown
page readonly
4C25000
heap
page read and write
2B6F000
stack
page read and write
26AE66C0000
heap
page readonly
43DF000
heap
page read and write
4A2E000
trusted library allocation
page read and write
4C25000
heap
page read and write
B1F000
stack
page read and write
6DA51000
unkown
page execute read
25B0000
remote allocation
page read and write
4BA0000
heap
page read and write
ABC000
stack
page read and write
2BA0000
unkown
page readonly
2550000
unkown
page readonly
4860000
heap
page read and write
2500000
unkown
page readonly
4EB0000
trusted library allocation
page read and write
B60000
heap
page read and write
A84000
heap
page read and write
4A20000
trusted library allocation
page read and write
4F31000
heap
page read and write
24AC000
stack
page read and write
26AE6730000
trusted library allocation
page read and write
4C1F000
heap
page read and write
2BA0000
unkown
page readonly
4CA0000
heap
page read and write
4A1F000
trusted library allocation
page read and write
5F7C000
trusted library allocation
page read and write
4A20000
trusted library allocation
page read and write
5F7C000
trusted library allocation
page read and write
2570000
unkown
page read and write
597A000
trusted library allocation
page read and write
4BF1000
heap
page read and write
4C0F000
heap
page read and write
4A31000
trusted library allocation
page read and write
560000
trusted library allocation
page read and write
4A1F000
trusted library allocation
page read and write
24F0000
unkown
page readonly
690000
heap
page read and write
4F31000
heap
page read and write
26AE571C000
heap
page read and write
4EB0000
trusted library allocation
page read and write
6DAA4000
unkown
page read and write
24EC000
stack
page read and write
D1D2D7B000
stack
page read and write
4A31000
trusted library allocation
page read and write
6569000
trusted library allocation
page read and write
24A0000
heap
page read and write
5F7C000
trusted library allocation
page read and write
4A35000
trusted library allocation
page read and write
47C0000
heap
page read and write
25B0000
remote allocation
page read and write
2BF0000
remote allocation
page read and write
2500000
unkown
page readonly
2560000
unkown
page readonly
495E000
stack
page read and write
4C0F000
heap
page read and write
4C0F000
heap
page read and write
2560000
unkown
page readonly
AFB000
stack
page read and write
D1D3179000
stack
page read and write
CD4000
heap
page read and write
25CE000
unkown
page read and write
483F000
heap
page read and write
49C3000
trusted library allocation
page read and write
6A62000
trusted library allocation
page read and write
4401000
trusted library allocation
page read and write
2510000
unkown
page read and write
26AE6490000
trusted library allocation
page read and write
26AE56D0000
heap
page read and write
4400000
trusted library allocation
page read and write
2560000
unkown
page readonly
2BA0000
unkown
page readonly
190000
heap
page read and write
D64000
heap
page read and write
6A67000
trusted library allocation
page read and write
CD0000
heap
page read and write
31C4000
heap
page read and write
4A41000
trusted library allocation
page read and write
4A35000
trusted library allocation
page read and write
2BF0000
trusted library allocation
page read and write
4C0F000
heap
page read and write
4A41000
trusted library allocation
page read and write
4C0F000
heap
page read and write
25F0000
trusted library allocation
page read and write
4A1F000
trusted library allocation
page read and write
4C0F000
heap
page read and write
26AE571C000
heap
page read and write
C0A000
heap
page read and write
26AE5999000
heap
page read and write
5F4C000
trusted library allocation
page read and write
2AE0000
heap
page read and write
4A25000
trusted library allocation
page read and write
2A6E000
unkown
page read and write
5F7C000
trusted library allocation
page read and write
2BB0000
heap
page read and write
A84000
heap
page read and write
4A25000
trusted library allocation
page read and write
4C0F000
heap
page read and write
3055000
heap
page read and write
4C25000
heap
page read and write
D1D30F9000
stack
page read and write
4A20000
trusted library allocation
page read and write
6F72000
trusted library allocation
page read and write
2BB0000
unkown
page read and write
A80000
heap
page read and write
4C0F000
heap
page read and write
2510000
unkown
page read and write
4C25000
heap
page read and write
24F0000
unkown
page readonly
4C25000
heap
page read and write
4A35000
trusted library allocation
page read and write
2550000
unkown
page readonly
4C16000
heap
page read and write
2500000
unkown
page readonly
4A41000
trusted library allocation
page read and write
2BB0000
unkown
page read and write
4960000
trusted library allocation
page read and write
4D40000
trusted library allocation
page read and write
2AD0000
trusted library allocation
page read and write
4D1F000
heap
page read and write
2BA0000
unkown
page readonly
C3B000
stack
page read and write
4A1F000
trusted library allocation
page read and write
4A41000
trusted library allocation
page read and write
4C0F000
heap
page read and write
24F0000
unkown
page readonly
2570000
unkown
page read and write
5477000
trusted library allocation
page read and write
CD4000
heap
page read and write
D6F000
stack
page read and write
D70000
heap
page read and write
4A1F000
trusted library allocation
page read and write
CD4000
heap
page read and write
26AE5719000
heap
page read and write
656A000
trusted library allocation
page read and write
5531000
trusted library allocation
page read and write
2570000
unkown
page read and write
2828000
heap
page read and write
A50000
heap
page read and write
A84000
heap
page read and write
2EF7000
heap
page read and write
4EB0000
trusted library allocation
page read and write
CD4000
heap
page read and write
2570000
unkown
page read and write
4A28000
trusted library allocation
page read and write
5F7C000
trusted library allocation
page read and write
1FC000
stack
page read and write
2E00000
direct allocation
page execute and read and write
2B50000
heap
page read and write
6DA51000
unkown
page execute read
26AE56B0000
heap
page read and write
2EF7000
heap
page read and write
BFB000
stack
page read and write
6DA83000
unkown
page read and write
2570000
unkown
page read and write
4C25000
heap
page read and write
B70000
trusted library allocation
page read and write
2B90000
unkown
page readonly
254C000
stack
page read and write
BEE000
stack
page read and write
4A41000
trusted library allocation
page read and write
BBC000
stack
page read and write
4EB0000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
4C0F000
heap
page read and write
2BB0000
unkown
page read and write
2DEE000
stack
page read and write
4BF1000
heap
page read and write
D3F000
stack
page read and write
2510000
unkown
page read and write
2950000
heap
page read and write
4BF1000
heap
page read and write
26AE5995000
heap
page read and write
BFC000
stack
page read and write
24F0000
unkown
page readonly
4BF1000
heap
page read and write
4C0F000
heap
page read and write
4FC000
stack
page read and write
2B30000
trusted library allocation
page read and write
287E000
stack
page read and write
B90000
heap
page read and write
D64000
heap
page read and write
2510000
unkown
page read and write
2570000
unkown
page read and write
2BA0000
unkown
page readonly
4A41000
trusted library allocation
page read and write
2EE0000
heap
page read and write
4A1F000
trusted library allocation
page read and write
2550000
remote allocation
page read and write
6DA83000
unkown
page read and write
A84000
heap
page read and write
4A35000
trusted library allocation
page read and write
4C16000
heap
page read and write
4F31000
heap
page read and write
4C25000
heap
page read and write
2B90000
unkown
page readonly
2B90000
unkown
page readonly
483F000
heap
page read and write
94B000
stack
page read and write
4A1F000
trusted library allocation
page read and write
2BB0000
unkown
page read and write
2510000
unkown
page read and write
CD4000
heap
page read and write
2560000
unkown
page readonly
5F34000
trusted library allocation
page read and write
2550000
remote allocation
page read and write
5FE000
stack
page read and write
A84000
heap
page read and write
49CF000
trusted library allocation
page read and write
4C0F000
heap
page read and write
4BF1000
heap
page read and write
D2E000
stack
page read and write
4BF1000
heap
page read and write
26AE5960000
trusted library allocation
page read and write
4A22000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
4C25000
heap
page read and write
4A31000
trusted library allocation
page read and write
2AD1000
trusted library allocation
page read and write
6DA74000
unkown
page readonly
26AE5739000
heap
page read and write
4C0F000
heap
page read and write
4A1F000
trusted library allocation
page read and write
319A000
heap
page read and write
4A22000
trusted library allocation
page read and write
6568000
trusted library allocation
page read and write
90C000
stack
page read and write
6DA74000
unkown
page readonly
2440000
heap
page read and write
7268000
trusted library allocation
page read and write
4A20000
trusted library allocation
page read and write
4A20000
trusted library allocation
page read and write
4960000
heap
page read and write
25B0000
remote allocation
page read and write
4A22000
trusted library allocation
page read and write
2C40000
heap
page read and write
26AE5990000
heap
page read and write
A90000
trusted library allocation
page read and write
26AE5980000
trusted library allocation
page read and write
4A35000
trusted library allocation
page read and write
433F000
stack
page read and write
4BF1000
heap
page read and write
2BB0000
unkown
page read and write
26AE5737000
heap
page read and write
28AD000
heap
page read and write
2BB0000
unkown
page read and write
4A41000
trusted library allocation
page read and write
4C40000
heap
page read and write
26AE66D0000
trusted library allocation
page read and write
3190000
heap
page read and write
4C41000
heap
page read and write
4A00000
heap
page read and write
2DE0000
heap
page read and write
5BE000
stack
page read and write
6F73000
trusted library allocation
page read and write
4AA0000
direct allocation
page execute and read and write
4A20000
trusted library allocation
page read and write
4C16000
heap
page read and write
5F7C000
trusted library allocation
page read and write
6F7E000
trusted library allocation
page read and write
D50000
heap
page read and write
3200000
heap
page read and write
4A41000
trusted library allocation
page read and write
4A41000
trusted library allocation
page read and write
4460000
trusted library allocation
page read and write
4C25000
heap
page read and write
6DA50000
unkown
page readonly
6F71000
trusted library allocation
page read and write
6DA83000
unkown
page read and write
4A1F000
trusted library allocation
page read and write
5F7C000
trusted library allocation
page read and write
2ACF000
stack
page read and write
6DA50000
unkown
page readonly
4D1F000
heap
page read and write
4A1F000
trusted library allocation
page read and write
2F0D000
heap
page read and write
6DA50000
unkown
page readonly
C00000
heap
page read and write
4C0F000
heap
page read and write
2550000
unkown
page readonly
4C1F000
heap
page read and write
4BA1000
heap
page read and write
4D40000
trusted library allocation
page read and write
2EEA000
heap
page read and write
A84000
heap
page read and write
4A35000
trusted library allocation
page read and write
2560000
unkown
page readonly
250C000
stack
page read and write
4A31000
trusted library allocation
page read and write
4A1F000
trusted library allocation
page read and write
26AE5900000
trusted library allocation
page read and write
6DA83000
unkown
page read and write
26AE571A000
heap
page read and write
D1D31FF000
stack
page read and write
31D1000
heap
page read and write
D64000
heap
page read and write
D64000
heap
page read and write
4510000
heap
page read and write
CD4000
heap
page read and write
2B2E000
stack
page read and write
A84000
heap
page read and write
4C0F000
heap
page read and write
CA0000
trusted library allocation
page read and write
4861000
heap
page read and write
2898000
heap
page read and write
25D0000
trusted library allocation
page read and write
6DAA6000
unkown
page readonly
6DA51000
unkown
page execute read
4A20000
trusted library allocation
page read and write
A1F000
stack
page read and write
26AE5630000
trusted library allocation
page read and write
4C0F000
heap
page read and write
4C0F000
heap
page read and write
4A2A000
trusted library allocation
page read and write
2AAF000
unkown
page read and write
31D0000
heap
page read and write
4BA1000
heap
page read and write
6567000
trusted library allocation
page read and write
6DA74000
unkown
page readonly
2550000
unkown
page readonly
283E000
unkown
page read and write
2EF7000
heap
page read and write
283D000
heap
page read and write
4C25000
heap
page read and write
302A000
heap
page read and write
26AE5715000
heap
page read and write
4A62000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
2550000
remote allocation
page read and write
6DA51000
unkown
page execute read
2550000
unkown
page readonly
458F000
heap
page read and write
6DA84000
unkown
page write copy
B50000
heap
page read and write
D64000
heap
page read and write
4A25000
trusted library allocation
page read and write
43DF000
heap
page read and write
4A1F000
trusted library allocation
page read and write
7279000
trusted library allocation
page read and write
26AE58F0000
trusted library allocation
page read and write
2820000
heap
page read and write
D64000
heap
page read and write
4A25000
trusted library allocation
page read and write
26AE66E0000
trusted library allocation
page read and write
620000
heap
page read and write
2510000
unkown
page read and write
4A2A000
trusted library allocation
page read and write
CD4000
heap
page read and write
4861000
heap
page read and write
4A25000
trusted library allocation
page read and write
D60000
heap
page read and write
4990000
heap
page read and write
4A25000
trusted library allocation
page read and write
4A31000
trusted library allocation
page read and write
6DAA6000
unkown
page readonly
2BF0000
remote allocation
page read and write
4A22000
trusted library allocation
page read and write
4990000
direct allocation
page execute and read and write
26AE571C000
heap
page read and write
31C4000
heap
page read and write
D64000
heap
page read and write
48DF000
stack
page read and write
5F7C000
trusted library allocation
page read and write
A84000
heap
page read and write
4C0F000
heap
page read and write
5988000
trusted library allocation
page read and write
4C0F000
heap
page read and write
5F7C000
trusted library allocation
page read and write
49C1000
trusted library allocation
page read and write
4A31000
trusted library allocation
page read and write
4C0F000
heap
page read and write
4EB0000
trusted library allocation
page read and write
24F0000
unkown
page readonly
D64000
heap
page read and write
2E90000
trusted library allocation
page read and write
6DA74000
unkown
page readonly
4A20000
trusted library allocation
page read and write
6A68000
trusted library allocation
page read and write
4A22000
trusted library allocation
page read and write
2B2E000
stack
page read and write
3020000
heap
page read and write
8A0000
heap
page read and write
2550000
unkown
page readonly
458F000
heap
page read and write
31DB000
heap
page read and write
24F0000
unkown
page readonly
2B30000
trusted library allocation
page read and write
6DA50000
unkown
page readonly
2B90000
unkown
page readonly
4A2E000
trusted library allocation
page read and write
6DAA6000
unkown
page readonly
4A28000
trusted library allocation
page read and write
26AE56D8000
heap
page read and write
2B90000
unkown
page readonly
2500000
unkown
page readonly
4360000
heap
page read and write
4A35000
trusted library allocation
page read and write
4A35000
trusted library allocation
page read and write
6C0000
heap
page read and write
4A35000
trusted library allocation
page read and write
4A41000
trusted library allocation
page read and write
26AE5733000
heap
page read and write
2BA0000
unkown
page readonly
29B0000
heap
page read and write
26AE59A0000
trusted library allocation
page read and write
2890000
heap
page read and write
6A6C000
trusted library allocation
page read and write
26AE5690000
heap
page read and write
4BA0000
heap
page read and write
CD4000
heap
page read and write
4BF1000
heap
page read and write
D1D327B000
stack
page read and write
4BF1000
heap
page read and write
4EB0000
trusted library allocation
page read and write
4A20000
trusted library allocation
page read and write
26AE5714000
heap
page read and write
2560000
unkown
page readonly
2500000
unkown
page readonly
26AE5620000
heap
page read and write
There are 430 hidden memdumps, click here to show them.