Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\Users\user\Desktop\cmdline.out
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\Desktop\download\dstrootcax3.p7c
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition
--user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://apps.identrust.com/roots/dstrootcax3.p7c"
> cmdline.out 2>&1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\wget.exe
|
wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0
(Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://apps.identrust.com/roots/dstrootcax3.p7c"
|
||
C:\Windows\System32\rundll32.exe
|
"C:\Windows\system32\rundll32.exe" cryptext.dll,CryptExtOpenCER C:\Users\user\Desktop\download\dstrootcax3.p7c.der
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
190000
|
heap
|
page read and write
|
||
C19C37F000
|
stack
|
page read and write
|
||
24CCEC80000
|
heap
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
18E000
|
stack
|
page read and write
|
||
C19C27E000
|
stack
|
page read and write
|
||
24CCECA2000
|
heap
|
page read and write
|
||
C19BFEA000
|
stack
|
page read and write
|
||
24CCECB2000
|
heap
|
page read and write
|
||
24CCECA8000
|
heap
|
page read and write
|
||
24CCECB2000
|
heap
|
page read and write
|
||
24CCEFDB000
|
heap
|
page read and write
|
||
24CD37D0000
|
trusted library allocation
|
page read and write
|
||
24CCEE50000
|
heap
|
page read and write
|
||
24CCECAC000
|
heap
|
page read and write
|
||
24CCEE70000
|
heap
|
page read and write
|
||
24CCECD0000
|
heap
|
page read and write
|
||
B78000
|
heap
|
page read and write
|
||
E6F000
|
stack
|
page read and write
|
||
24CCECB2000
|
heap
|
page read and write
|
||
9CC000
|
stack
|
page read and write
|
||
106F000
|
stack
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
1A6000
|
heap
|
page read and write
|
||
24CCECB6000
|
heap
|
page read and write
|
||
24CCEF44000
|
heap
|
page read and write
|
||
24CCEFD0000
|
heap
|
page read and write
|
||
24CCECAB000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
24CCECB2000
|
heap
|
page read and write
|
||
24CCECC8000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
24CCECB3000
|
heap
|
page read and write
|
||
14E000
|
stack
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
24CCEC88000
|
heap
|
page read and write
|
||
24CCEC9F000
|
heap
|
page read and write
|
||
24CCEF60000
|
heap
|
page read and write
|
||
24CCECAB000
|
heap
|
page read and write
|
||
24CCEFD5000
|
heap
|
page read and write
|
||
1C5000
|
heap
|
page read and write
|
||
1CA000
|
heap
|
page read and write
|
||
24CCECAB000
|
heap
|
page read and write
|
||
24CCEC70000
|
heap
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
24CCECAC000
|
heap
|
page read and write
|
||
24CCECBB000
|
heap
|
page read and write
|
||
C19C2FD000
|
stack
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
24CCECA2000
|
heap
|
page read and write
|
||
24CD0BB0000
|
heap
|
page read and write
|
||
24CCEF40000
|
heap
|
page read and write
|
There are 43 hidden memdumps, click here to show them.