IOC Report
z5zecWP4su

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\z5zecWP4su.dll"
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\z5zecWP4su.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\z5zecWP4su.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\z5zecWP4su.dll,DllMain
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\z5zecWP4su.dll,DllRegisterServer
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\z5zecWP4su.dll",#1

URLs

Name
IP
Malicious
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
https://sectigo.com/CPS0
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown

IPs

IP
Domain
Country
Malicious
10.45.6.7
unknown
unknown
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dataohis
NULL

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF8A7E6F000
unkown
page read and write
23B1EB45000
heap
page read and write
26D637A000
stack
page read and write
E05EAFE000
stack
page read and write
7FF8A7D81000
unkown
page execute read
23B1D3E0000
heap
page read and write
7FF8A7D80000
unkown
page readonly
25E0000
heap
page read and write
7FF8A80B3000
unkown
page read and write
7FF8A8423000
unkown
page read and write
1FC0CD99000
heap
page read and write
7FF8A8083000
unkown
page execute read
23B1D150000
heap
page read and write
A50000
heap
page read and write
2132FB0D000
heap
page read and write
23B1EB40000
heap
page read and write
1FC0D110000
heap
page read and write
1FC0D030000
trusted library allocation
page read and write
AE5000
heap
page read and write
7FF8A8083000
unkown
page execute read
E05E9FE000
stack
page read and write
238E000
stack
page read and write
1FC0CF70000
heap
page read and write
23B1EA00000
heap
page read and write
23B1ECD0000
heap
page read and write
1FC0CD97000
heap
page read and write
23B1D0E0000
heap
page read and write
7FF8A7E73000
unkown
page read and write
25E5000
heap
page read and write
23B1CFE0000
heap
page read and write
AD0000
trusted library allocation
page read and write
2390000
trusted library allocation
page read and write
6D9B67E000
stack
page read and write
1FC0D030000
trusted library allocation
page read and write
967000
heap
page read and write
1FC0CFD0000
heap
page read and write
7FF8A7D80000
unkown
page readonly
189F6568000
heap
page read and write
26D63FF000
stack
page read and write
189F6505000
heap
page read and write
1FC0CF50000
heap
page read and write
2132FB00000
heap
page read and write
2390000
heap
page read and write
7FF8A7D80000
unkown
page readonly
A80000
heap
page read and write
213314A0000
heap
page read and write
7FF8A8077000
unkown
page read and write
7FF8A7E43000
unkown
page readonly
242E000
stack
page read and write
230F000
stack
page read and write
213315A0000
heap
page read and write
189F6500000
heap
page read and write
7FF8A8077000
unkown
page read and write
950000
heap
page read and write
FA1167F000
stack
page read and write
7FF8A8423000
unkown
page read and write
7FF8A8A8F000
unkown
page readonly
FA113FE000
stack
page read and write
980000
heap
page read and write
23B1EA40000
trusted library allocation
page read and write
213315A5000
heap
page read and write
189F6400000
heap
page read and write
23B1EA00000
trusted library allocation
page read and write
1FC0D000000
trusted library allocation
page read and write
6D9B47C000
stack
page read and write
7FF8A8A8F000
unkown
page readonly
23B1EA40000
trusted library allocation
page read and write
26D62FE000
stack
page read and write
7FF8A8424000
unkown
page execute read
23B1D3E5000
heap
page read and write
5F0000
heap
page read and write
189F7FB5000
heap
page read and write
189F64E0000
heap
page read and write
189F7E10000
trusted library allocation
page read and write
1FC0CFF0000
heap
page read and write
FA1177E000
stack
page read and write
23B1D140000
trusted library allocation
page read and write
23B1D0C0000
heap
page read and write
189F7E60000
heap
page read and write
213314C0000
trusted library allocation
page read and write
1FC0CFF5000
heap
page read and write
6D9B57F000
stack
page read and write
7FF8A8083000
unkown
page execute read
1FC0CD78000
heap
page read and write
2132FCD0000
heap
page read and write
26D627C000
stack
page read and write
238B000
stack
page read and write
7FF8A7E43000
unkown
page readonly
7FF8A8077000
unkown
page read and write
FA116FD000
stack
page read and write
7FF8A80B9000
unkown
page execute read
189F656F000
heap
page read and write
24A0000
heap
page read and write
189F7E10000
heap
page read and write
21331575000
heap
page read and write
7FF8A8079000
unkown
page readonly
21331570000
heap
page read and write
7FF8A8A8F000
unkown
page readonly
2132FAE0000
heap
page read and write
E05E8FB000
stack
page read and write
7FF8A80B9000
unkown
page execute read
6D9B4FF000
stack
page read and write
7FF8A7D81000
unkown
page execute read
7FF8A7E6F000
unkown
page read and write
7FF8A8424000
unkown
page execute read
26D637E000
stack
page read and write
1FC0CFD0000
trusted library allocation
page read and write
7FF8A7D81000
unkown
page execute read
AE0000
heap
page read and write
189F6510000
heap
page read and write
959000
heap
page read and write
87B000
stack
page read and write
189F7E10000
trusted library allocation
page read and write
7FF8A7E73000
unkown
page read and write
FA1137C000
stack
page read and write
213314C0000
heap
page read and write
E05EAFB000
stack
page read and write
7FF8A80B9000
unkown
page execute read
7FF8A80B3000
unkown
page read and write
7FF8A7E6F000
unkown
page read and write
7FF8A7E43000
unkown
page readonly
2132FB09000
heap
page read and write
7FF8A8079000
unkown
page readonly
95B000
heap
page read and write
1FC0CE70000
heap
page read and write
E05EBFF000
stack
page read and write
1FC0E9C0000
heap
page read and write
7FF8A8079000
unkown
page readonly
6D9B6FE000
stack
page read and write
7FF8A8423000
unkown
page read and write
7FF8A8424000
unkown
page execute read
189F7FB0000
heap
page read and write
23B1D158000
heap
page read and write
189F6560000
heap
page read and write
FA117FF000
stack
page read and write
213314C0000
trusted library allocation
page read and write
7FF8A80B3000
unkown
page read and write
1FC0CD70000
heap
page read and write
2132FB18000
heap
page read and write
1FC0D115000
heap
page read and write
7FF8A7E73000
unkown
page read and write
There are 131 hidden memdumps, click here to show them.