IOC Report
antispam_account.exe

loading gif

Files

File Path
Type
Category
Malicious
antispam_account.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\antispam_account.exe
"C:\Users\user\Desktop\antispam_account.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
19E647E0000
heap
page read and write
7FF69E4B4000
unkown
page read and write
7FF69E4A9000
unkown
page readonly
7FF69E4B6000
unkown
page readonly
1FC09FF000
stack
page read and write
7FF69E491000
unkown
page execute read
1FC05DC000
stack
page read and write
7FF69E4A9000
unkown
page readonly
7FF69E4B6000
unkown
page readonly
19E66080000
heap
page read and write
19E647EB000
heap
page read and write
1FC08FF000
stack
page read and write
19E646C0000
heap
page read and write
7FF69E491000
unkown
page execute read
7FF69E4B4000
unkown
page write copy
7FF69E490000
unkown
page readonly
7FF69E490000
unkown
page readonly
19E647A0000
heap
page read and write
19E66140000
heap
page read and write
There are 9 hidden memdumps, click here to show them.