IOC Report
MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029.zip

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029.zip\Keygen.exe
"C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029.zip\Keygen.exe"
malicious
C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029.zip\Keygen.exe
"C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029.zip\Keygen.exe"
malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Users\user\Desktop\MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029\Keygen.exe
"C:\Users\user\Desktop\MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029\Keygen.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Users\user\Desktop\MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029\Keygen.exe
"C:\Users\user\Desktop\MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029\Keygen.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Users\user\Desktop\MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029\Keygen.exe
"C:\Users\user\Desktop\MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029\Keygen.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Users\user\Desktop\MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029\Keygen.exe
"C:\Users\user\Desktop\MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029\Keygen.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Users\user\Desktop\MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029\Keygen.exe
"C:\Users\user\Desktop\MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029\Keygen.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Users\user\Desktop\Keygen.exe
"C:\Users\user\Desktop\Keygen.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 7 hidden processes, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6DF1BFF000
stack
page read and write
F9603FD000
stack
page read and write
C000078000
direct allocation
page read and write
19939870000
heap
page read and write
1BCE0450000
heap
page read and write
170B1589000
direct allocation
page read and write
C000017000
direct allocation
page read and write
216D1B00000
heap
page read and write
C000012000
direct allocation
page read and write
F96000
unkown
page execute and read and write
C000126000
direct allocation
page read and write
C000136000
direct allocation
page read and write
664000
unkown
page execute and read and write
CC331FF000
stack
page read and write
C000078000
direct allocation
page read and write
7C349FF000
stack
page read and write
43F000
unkown
page write copy
C00003A000
direct allocation
page read and write
170B1725000
heap
page read and write
19939890000
heap
page read and write
F9607FF000
stack
page read and write
C000122000
direct allocation
page read and write
C000004000
direct allocation
page read and write
FDF4BFE000
stack
page read and write
28816720000
direct allocation
page read and write
21B06784000
direct allocation
page read and write
C000100000
direct allocation
page read and write
C00001C000
direct allocation
page read and write
C000114000
direct allocation
page read and write
216D1DD0000
direct allocation
page read and write
C000010000
direct allocation
page read and write
CC329FE000
stack
page read and write
C000146000
direct allocation
page read and write
C00005B000
direct allocation
page read and write
6D7497F000
stack
page read and write
19939B51000
direct allocation
page read and write
C000045000
direct allocation
page read and write
D2E000
unkown
page execute and read and write
170B1580000
direct allocation
page read and write
C000142000
direct allocation
page read and write
C000060000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
C000060000
direct allocation
page read and write
C00005B000
direct allocation
page read and write
C00010E000
direct allocation
page read and write
633000
unkown
page execute and read and write
268D4236000
heap
page read and write
480E9FE000
stack
page read and write
C00003A000
direct allocation
page read and write
C000014000
direct allocation
page read and write
664000
unkown
page execute and read and write
636000
unkown
page execute and read and write
62F000
unkown
page execute and read and write
C000002000
direct allocation
page read and write
404000
unkown
page execute and read and write
54C000
unkown
page execute and read and write
C000060000
direct allocation
page read and write
C000064000
direct allocation
page read and write
C000025000
direct allocation
page read and write
C000014000
direct allocation
page read and write
C000002000
direct allocation
page read and write
C00015E000
direct allocation
page read and write
21B06560000
heap
page read and write
170B1584000
direct allocation
page read and write
C000050000
direct allocation
page read and write
7C347FF000
stack
page read and write
C00003A000
direct allocation
page read and write
480EBFE000
stack
page read and write
10B2000
unkown
page execute and read and write
170B1460000
heap
page read and write
268D4470000
direct allocation
page read and write
268D4404000
direct allocation
page read and write
22D67350000
direct allocation
page read and write
7C343FE000
stack
page read and write
9095FFE000
stack
page read and write
268F9ED1000
direct allocation
page read and write
C000030000
direct allocation
page read and write
216D1A60000
heap
page read and write
170B1720000
heap
page read and write
C000030000
direct allocation
page read and write
C00011C000
direct allocation
page read and write
C000030000
direct allocation
page read and write
C000030000
direct allocation
page read and write
C000025000
direct allocation
page read and write
C000030000
direct allocation
page read and write
C000022000
direct allocation
page read and write
10BE000
unkown
page execute and read and write
FDF51FF000
stack
page read and write
22D615FD000
heap
page read and write
506000
unkown
page execute and read and write
170D7031000
direct allocation
page read and write
CC32DFF000
stack
page read and write
C000110000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
28816729000
direct allocation
page read and write
E0000
unkown
page readonly
288167E5000
heap
page read and write
C000064000
direct allocation
page read and write
C000120000
direct allocation
page read and write
C000072000
direct allocation
page read and write
D2A000
unkown
page execute and read and write
90967FF000
stack
page read and write
C00000C000
direct allocation
page read and write
C000050000
direct allocation
page read and write
C000025000
direct allocation
page read and write
170B1473000
heap
page read and write
1BCE0263000
heap
page read and write
622000
unkown
page execute and read and write
C000072000
direct allocation
page read and write
F9611FF000
stack
page read and write
C00001C000
direct allocation
page read and write
C000045000
direct allocation
page read and write
C000060000
direct allocation
page read and write
268D4210000
heap
page read and write
634000
unkown
page execute and read and write
DD0000
unkown
page readonly
E0000
unkown
page readonly
C00000C000
direct allocation
page read and write
C000022000
direct allocation
page read and write
19939C25000
heap
page read and write
22D672B0000
direct allocation
page read and write
C00001C000
direct allocation
page read and write
C00007D000
direct allocation
page read and write
6D7487E000
stack
page read and write
22D61800000
heap
page read and write
C000116000
direct allocation
page read and write
C00007D000
direct allocation
page read and write
1BCE0455000
heap
page read and write
C00011C000
direct allocation
page read and write
C000072000
direct allocation
page read and write
28816500000
heap
page read and write
6D748FF000
stack
page read and write
C000050000
direct allocation
page read and write
F960DFF000
stack
page read and write
28816780000
direct allocation
page read and write
21B2C110000
direct allocation
page read and write
C000102000
direct allocation
page read and write
F9E000
unkown
page execute and read and write
1BCE0250000
heap
page read and write
4785FD000
stack
page read and write
C000060000
direct allocation
page read and write
68B000
unkown
page execute and read and write
C000118000
direct allocation
page read and write
C00007D000
direct allocation
page read and write
2883C1F1000
direct allocation
page read and write
C000064000
direct allocation
page read and write
22D61850000
direct allocation
page read and write
C000072000
direct allocation
page read and write
C00012A000
direct allocation
page read and write
57C000
unkown
page execute and read and write
1BCE0359000
direct allocation
page read and write
E4E000
unkown
page execute and read and write
C00003A000
direct allocation
page read and write
C000022000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
C00011A000
direct allocation
page read and write
C000114000
direct allocation
page read and write
21B06780000
direct allocation
page read and write
622000
unkown
page execute and read and write
480F5FE000
stack
page read and write
C000110000
direct allocation
page read and write
268D4230000
heap
page read and write
C000072000
direct allocation
page read and write
6DF25FE000
stack
page read and write
C000072000
direct allocation
page read and write
C000002000
direct allocation
page read and write
22D672D1000
direct allocation
page read and write
7C345FF000
stack
page read and write
268D4400000
direct allocation
page read and write
22D615F6000
heap
page read and write
C000035000
direct allocation
page read and write
C000030000
direct allocation
page read and write
C000072000
direct allocation
page read and write
9095BFF000
stack
page read and write
C000037000
direct allocation
page read and write
21B06590000
heap
page read and write
C000054000
direct allocation
page read and write
C000025000
direct allocation
page read and write
FDF4DFF000
stack
page read and write
C00010C000
direct allocation
page read and write
C000054000
direct allocation
page read and write
C00010A000
direct allocation
page read and write
C000037000
direct allocation
page read and write
C00007D000
direct allocation
page read and write
170B16F0000
direct allocation
page read and write
C00011A000
direct allocation
page read and write
C000078000
direct allocation
page read and write
68B000
unkown
page execute and read and write
480E7FD000
stack
page read and write
216D1E85000
heap
page read and write
FDF55FF000
stack
page read and write
288165E0000
heap
page read and write
9095DFE000
stack
page read and write
C000012000
direct allocation
page read and write
FDF4FFE000
stack
page read and write
19F288C9000
heap
page read and write
C000004000
direct allocation
page read and write
268D4460000
direct allocation
page read and write
C00003E000
direct allocation
page read and write
C000030000
direct allocation
page read and write
268D41F0000
heap
page read and write
28816724000
direct allocation
page read and write
22D671A0000
direct allocation
page read and write
C000006000
direct allocation
page read and write
CC333FE000
stack
page read and write
C00001C000
direct allocation
page read and write
4789FF000
stack
page read and write
D26000
unkown
page execute and read and write
50A000
unkown
page execute and read and write
C000054000
direct allocation
page read and write
10AA000
unkown
page execute and read and write
C00005B000
direct allocation
page read and write
C00010E000
direct allocation
page read and write
42B000
unkown
page execute and read and write
1BCE03D0000
direct allocation
page read and write
21B06760000
heap
page read and write
216D1A30000
heap
page read and write
C000114000
direct allocation
page read and write
22D615F9000
heap
page read and write
C000045000
direct allocation
page read and write
C000037000
direct allocation
page read and write
622000
unkown
page execute and read and write
68B000
unkown
page execute and read and write
C000054000
direct allocation
page read and write
C00001C000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
664000
unkown
page execute and read and write
21B067F0000
heap
page read and write
C00005B000
direct allocation
page read and write
216D1AF0000
direct allocation
page read and write
268D44C0000
heap
page read and write
21B2C221000
direct allocation
page read and write
328000
unkown
page execute and write copy
C000114000
direct allocation
page read and write
C000064000
direct allocation
page read and write
4787FF000
stack
page read and write
62E000
unkown
page execute and read and write
7C34DFF000
stack
page read and write
622000
unkown
page execute and read and write
340000
unkown
page readonly
C00003A000
direct allocation
page read and write
268D4409000
direct allocation
page read and write
480EDFE000
stack
page read and write
C000037000
direct allocation
page read and write
43A000
unkown
page execute and read and write
4791FE000
stack
page read and write
CC32BFE000
stack
page read and write
111B000
unkown
page execute and read and write
C000037000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
268D41E0000
heap
page read and write
E42000
unkown
page execute and read and write
19939920000
direct allocation
page read and write
199398B4000
direct allocation
page read and write
68B000
unkown
page execute and read and write
C000112000
direct allocation
page read and write
C00005B000
direct allocation
page read and write
FDF49FD000
stack
page read and write
D9C000
unkown
page execute and read and write
C000064000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
1BCE03C0000
direct allocation
page read and write
C000012000
direct allocation
page read and write
C000022000
direct allocation
page read and write
22D61854000
direct allocation
page read and write
C000078000
direct allocation
page read and write
C000078000
direct allocation
page read and write
50E000
unkown
page execute and read and write
C00005B000
direct allocation
page read and write
22D61607000
heap
page read and write
C00004E000
direct allocation
page read and write
170B1700000
direct allocation
page read and write
216D1DF1000
direct allocation
page read and write
664000
unkown
page execute and read and write
7C341FF000
stack
page read and write
22D617E0000
heap
page read and write
6DF23FF000
stack
page read and write
478DFE000
stack
page read and write
43F000
unkown
page read and write
C00007D000
direct allocation
page read and write
21B067F5000
heap
page read and write
216D1A80000
direct allocation
page read and write
19F28870000
heap
page read and write
C00000C000
direct allocation
page read and write
C00010C000
direct allocation
page read and write
C00003C000
direct allocation
page read and write
C000110000
direct allocation
page read and write
6DF21FE000
stack
page read and write
28816609000
heap
page read and write
C000060000
direct allocation
page read and write
19939790000
heap
page read and write
6DF1DFF000
stack
page read and write
C000022000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
C000012000
direct allocation
page read and write
22D6185B000
direct allocation
page read and write
21B06789000
direct allocation
page read and write
C000025000
direct allocation
page read and write
C000020000
direct allocation
page read and write
C000110000
direct allocation
page read and write
C00003C000
direct allocation
page read and write
90965FE000
stack
page read and write
19939930000
direct allocation
page read and write
19F28770000
heap
page read and write
664000
unkown
page execute and read and write
431000
unkown
page execute and read and write
C000045000
direct allocation
page read and write
C00003E000
direct allocation
page read and write
19939C20000
heap
page read and write
19939958000
heap
page read and write
C00007D000
direct allocation
page read and write
C000045000
direct allocation
page read and write
170B1560000
heap
page read and write
CC32FFF000
stack
page read and write
C000027000
direct allocation
page read and write
C000050000
direct allocation
page read and write
C000025000
direct allocation
page read and write
22D61859000
direct allocation
page read and write
C000114000
direct allocation
page read and write
CC327FD000
stack
page read and write
C000037000
direct allocation
page read and write
C000108000
direct allocation
page read and write
DD0000
unkown
page readonly
216D1A40000
heap
page read and write
7C33FFD000
stack
page read and write
C000064000
direct allocation
page read and write
19F28850000
heap
page read and write
C000035000
direct allocation
page read and write
C00005B000
direct allocation
page read and write
C000072000
direct allocation
page read and write
22D61840000
heap
page read and write
636000
unkown
page execute and read and write
C000128000
direct allocation
page read and write
C000025000
direct allocation
page read and write
21B06580000
direct allocation
page read and write
288167E0000
heap
page read and write
C00001C000
direct allocation
page read and write
636000
unkown
page execute and read and write
B60000
unkown
page readonly
28816790000
direct allocation
page read and write
19F2A380000
heap
page read and write
C000110000
direct allocation
page read and write
D8E000
unkown
page execute and read and write
C000074000
direct allocation
page read and write
216D1B13000
heap
page read and write
C000114000
direct allocation
page read and write
21B0659C000
heap
page read and write
C000035000
direct allocation
page read and write
C00003E000
direct allocation
page read and write
C000045000
direct allocation
page read and write
C000014000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
C00007D000
direct allocation
page read and write
E1000
unkown
page execute and read and write
28816613000
heap
page read and write
C000004000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
C00014E000
direct allocation
page read and write
90959FD000
stack
page read and write
F9609FF000
stack
page read and write
268D423D000
heap
page read and write
C000025000
direct allocation
page read and write
C000054000
direct allocation
page read and write
C000045000
direct allocation
page read and write
C00003C000
direct allocation
page read and write
C000050000
direct allocation
page read and write
FFE000
unkown
page execute and read and write
C000050000
direct allocation
page read and write
E84000
unkown
page execute and read and write
340000
unkown
page readonly
28816700000
heap
page read and write
C000107000
direct allocation
page read and write
6D7459C000
stack
page read and write
1BCE0354000
direct allocation
page read and write
268D44C5000
heap
page read and write
C00003C000
direct allocation
page read and write
622000
unkown
page execute and read and write
288167A0000
direct allocation
page read and write
FDF53FE000
stack
page read and write
22D61845000
heap
page read and write
EAB000
unkown
page execute and read and write
22D61700000
heap
page read and write
478FFF000
stack
page read and write
B60000
unkown
page readonly
19F28A45000
heap
page read and write
10F4000
unkown
page execute and read and write
C00010E000
direct allocation
page read and write
E3A000
unkown
page execute and read and write
C00000C000
direct allocation
page read and write
F9A000
unkown
page execute and read and write
6DF17FD000
stack
page read and write
C000050000
direct allocation
page read and write
C000078000
direct allocation
page read and write
C000022000
direct allocation
page read and write
C00003C000
direct allocation
page read and write
1BCE03F1000
direct allocation
page read and write
C000037000
direct allocation
page read and write
C000030000
direct allocation
page read and write
C000054000
direct allocation
page read and write
C000050000
direct allocation
page read and write
C000074000
direct allocation
page read and write
268D4480000
direct allocation
page read and write
C00011A000
direct allocation
page read and write
19939910000
direct allocation
page read and write
90961FE000
stack
page read and write
478BFE000
stack
page read and write
22D67190000
direct allocation
page read and write
1BCE0350000
direct allocation
page read and write
61A000
unkown
page execute and read and write
21B06550000
heap
page read and write
C000110000
direct allocation
page read and write
170B1440000
heap
page read and write
100C000
unkown
page execute and read and write
1BCE0130000
heap
page read and write
C000122000
direct allocation
page read and write
C00001C000
direct allocation
page read and write
C000004000
direct allocation
page read and write
22D67194000
direct allocation
page read and write
170B1468000
heap
page read and write
F9605FF000
stack
page read and write
C000045000
direct allocation
page read and write
C000060000
direct allocation
page read and write
C000014000
direct allocation
page read and write
90963FE000
stack
page read and write
C000120000
direct allocation
page read and write
C000112000
direct allocation
page read and write
CC335FF000
stack
page read and write
1BCE0259000
heap
page read and write
634000
unkown
page execute and read and write
C000064000
direct allocation
page read and write
C00005B000
direct allocation
page read and write
C000035000
direct allocation
page read and write
C000054000
direct allocation
page read and write
C000037000
direct allocation
page read and write
7C34BFE000
stack
page read and write
C00012C000
direct allocation
page read and write
C000116000
direct allocation
page read and write
56E000
unkown
page execute and read and write
216D1B08000
heap
page read and write
F960FFE000
stack
page read and write
C000054000
direct allocation
page read and write
C000078000
direct allocation
page read and write
6DF1FFE000
stack
page read and write
C000002000
direct allocation
page read and write
1BCE0210000
heap
page read and write
480EFFF000
stack
page read and write
216D1E80000
heap
page read and write
C000022000
direct allocation
page read and write
1BCE0230000
heap
page read and write
C000022000
direct allocation
page read and write
19939950000
heap
page read and write
216D1A89000
direct allocation
page read and write
4793FF000
stack
page read and write
F960BFF000
stack
page read and write
C00000C000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
170B1360000
heap
page read and write
19F28A40000
heap
page read and write
634000
unkown
page execute and read and write
6DF19FF000
stack
page read and write
199398B0000
direct allocation
page read and write
28816600000
heap
page read and write
C00011E000
direct allocation
page read and write
480F3FE000
stack
page read and write
C000064000
direct allocation
page read and write
FDC000
unkown
page execute and read and write
C000020000
direct allocation
page read and write
D6C000
unkown
page execute and read and write
68B000
unkown
page execute and read and write
C000124000
direct allocation
page read and write
480F1FF000
stack
page read and write
1BCE03B0000
direct allocation
page read and write
19F288C0000
heap
page read and write
C000110000
direct allocation
page read and write
22D615F0000
heap
page read and write
C00001C000
direct allocation
page read and write
216D1A84000
direct allocation
page read and write
199398B9000
direct allocation
page read and write
There are 468 hidden memdumps, click here to show them.