IOC Report
diatomaceous.dat.dll

loading gif

Files

File Path
Type
Category
Malicious
diatomaceous.dat.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\Desktop\diatomaceous.dat.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\diatomaceous.dat.dll"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\diatomaceous.dat.dll",#1
malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\diatomaceous.dat.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\diatomaceous.dat.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\diatomaceous.dat.dll,DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\diatomaceous.dat.dll,DllUnregisterServer
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Ifwliuvmpg
101366b1
HKEY_CURRENT_USER\Software\Microsoft\Ifwliuvmpg
258cb6ff
HKEY_CURRENT_USER\Software\Microsoft\Ifwliuvmpg
27cd9683
HKEY_CURRENT_USER\Software\Microsoft\Ifwliuvmpg
9f71f1e6
HKEY_CURRENT_USER\Software\Microsoft\Ifwliuvmpg
e279be6c
HKEY_CURRENT_USER\Software\Microsoft\Ifwliuvmpg
5ac5d909
HKEY_CURRENT_USER\Software\Microsoft\Ifwliuvmpg
9d30d19a
HKEY_CURRENT_USER\Software\Microsoft\Ifwliuvmpg
6f5a0947
HKEY_CURRENT_USER\Software\Microsoft\Ifwliuvmpg
101366b1
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
b501c7c4
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
809e178a
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
82df37f6
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
3a635093
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
476b1f19
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
ffd7787c
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
382270ef
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
ca48a832
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
b501c7c4
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
b501c7c4
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2FA0000
trusted library allocation
page read and write
malicious
B90000
trusted library allocation
page read and write
malicious
4820000
trusted library allocation
page execute and read and write
malicious
2CC0000
trusted library allocation
page execute and read and write
malicious
730000
trusted library allocation
page execute and read and write
malicious
1000000
system
page execute and read and write
malicious
400000
trusted library allocation
page read and write
malicious
E00000
system
page execute and read and write
malicious
E00000
system
page execute and read and write
malicious
E00000
system
page execute and read and write
malicious
E00000
system
page execute and read and write
malicious
24420660000
heap
page read and write
4DD0000
trusted library allocation
page read and write
4D43000
heap
page read and write
4D4F000
heap
page read and write
4DE1000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
4E32000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
24420768000
heap
page read and write
3004000
heap
page read and write
BC0000
unkown
page readonly
BBC000
stack
page read and write
31A0000
trusted library allocation
page read and write
31A1000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
4DE1000
trusted library allocation
page read and write
DF0000
unkown
page read and write
4DD0000
trusted library allocation
page read and write
4D4F000
heap
page read and write
4D65000
heap
page read and write
4DD0000
trusted library allocation
page read and write
163F000
stack
page read and write
31A0000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
6DAB3000
unkown
page read and write
244209F0000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
BD0000
unkown
page readonly
4DD0000
trusted library allocation
page read and write
4E12000
trusted library allocation
page read and write
111E000
stack
page read and write
4AE000
stack
page read and write
BC0000
unkown
page readonly
BB0000
unkown
page readonly
49E1000
heap
page read and write
460BE7C000
stack
page read and write
4E12000
trusted library allocation
page read and write
460C1FF000
stack
page read and write
5390000
trusted library allocation
page read and write
244206F0000
trusted library allocation
page read and write
4DE1000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write