IOC Report
antispam.exe

loading gif

Files

File Path
Type
Category
Malicious
antispam.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\qwertyuio.txt
data
modified
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\cmd.exe
cmd.exe /c systeminfo
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\systeminfo.exe
systeminfo
malicious
C:\Windows\System32\cmd.exe
cmd.exe /c route print
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\cmd.exe
cmd.exe /c ipconfig /all
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /all
malicious
C:\Users\user\Desktop\antispam.exe
"C:\Users\user\Desktop\antispam.exe"
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\ROUTE.EXE
route print
There are 2 hidden processes, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\system32\mlang.dll,-4387
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\system32\mlang.dll,-4407

Memdumps

Base Address
Regiontype
Protect
Malicious
202CB9C0000
heap
page read and write
1F553A58000
heap
page read and write
202CB83B000
heap
page read and write
3DD3FAD000
stack
page read and write
202CB810000
heap
page read and write
7FF6A1F71000
unkown
page execute read
9E196FE000
stack
page read and write
202CB86D000
heap
page read and write
202CB85E000
heap
page read and write
202CB85C000
heap
page read and write
22AFC160000
heap
page read and write
1F553A6A000
heap
page read and write
202CB859000
heap
page read and write
7FF6A1F78000
unkown
page write copy
202CB859000
heap
page read and write
1F553A5E000
heap
page read and write
202CB836000
heap
page read and write
1F5558D0000
heap
page read and write
22AFC060000
heap
page read and write
1F5553A5000
heap
page read and write
202CB859000
heap
page read and write
7FF6A1F75000
unkown
page readonly
3DD427F000
stack
page read and write
1F5539C0000
heap
page read and write
202CB863000
heap
page read and write
7FF6A1F79000
unkown
page readonly
202CB835000
heap
page read and write
202CB859000
heap
page read and write
7FF6A1F75000
unkown
page readonly
202CB845000
heap
page read and write
22AFC069000
heap
page read and write
202CB835000
heap
page read and write
22AFC180000
heap
page read and write
202CB843000
heap
page read and write
1F553950000
heap
page read and write
682807E000
stack
page read and write
22AFC2F5000
heap
page read and write
22AFC07C000
heap
page read and write
202CB867000
heap
page read and write
1F5553AA000
heap
page read and write
6827D1E000
stack
page read and write
202CB845000
heap
page read and write
22AFBF70000
heap
page read and write
6827D9E000
stack
page read and write
202CB859000
heap
page read and write
1F5553A0000
heap
page read and write
7FF6A1F70000
unkown
page readonly
1F553A39000
heap
page read and write
9E195FE000
stack
page read and write
7FF6A1F79000
unkown
page readonly
9E192F8000
stack
page read and write
1F557030000
trusted library allocation
page read and write
1F553A1B000
heap
page read and write
1F5539F3000
heap
page read and write
3DD42FF000
stack
page read and write
202CB9C5000
heap
page read and write
1F553A10000
heap
page read and write
6827C9B000
stack
page read and write
7FF6A1F71000
unkown
page execute read
202CB83B000
heap
page read and write
7FF6A1F70000
unkown
page readonly
202CB817000
heap
page read and write
1F553A5B000
heap
page read and write
202CB6F0000
heap
page read and write
1F555580000
heap
page read and write
202CB859000
heap
page read and write
1F5539F0000
heap
page read and write
202CB7F0000
heap
page read and write
22AFC2F0000
heap
page read and write
1F553870000
heap
page read and write
7FF6A1F78000
unkown
page read and write
68280FF000
stack
page read and write
202CB7D0000
heap
page read and write
1F553980000
heap
page read and write
682817E000
stack
page read and write
There are 65 hidden memdumps, click here to show them.