IOC Report
http://apps.identrust.com/roots/dstrootcax3.p7c

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Desktop\cmdline.out
ASCII text, with CRLF line terminators
modified
C:\Users\user\Desktop\download\dstrootcax3.p7c
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://apps.identrust.com/roots/dstrootcax3.p7c" > cmdline.out 2>&1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\wget.exe
wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://apps.identrust.com/roots/dstrootcax3.p7c"
C:\Windows\System32\rundll32.exe
"C:\Windows\system32\rundll32.exe" cryptext.dll,CryptExtOpenCER C:\Users\user\Desktop\download\dstrootcax3.p7c.der

Memdumps

Base Address
Regiontype
Protect
Malicious
190000
heap
page read and write
C19C37F000
stack
page read and write
24CCEC80000
heap
page read and write
1A0000
heap
page read and write
18E000
stack
page read and write
C19C27E000
stack
page read and write
24CCECA2000
heap
page read and write
C19BFEA000
stack
page read and write
24CCECB2000
heap
page read and write
24CCECA8000
heap
page read and write
24CCECB2000
heap
page read and write
24CCEFDB000
heap
page read and write
24CD37D0000
trusted library allocation
page read and write
24CCEE50000
heap
page read and write
24CCECAC000
heap
page read and write
24CCEE70000
heap
page read and write
24CCECD0000
heap
page read and write
B78000
heap
page read and write
E6F000
stack
page read and write
24CCECB2000
heap
page read and write
9CC000
stack
page read and write
106F000
stack
page read and write
B70000
heap
page read and write
1A6000
heap
page read and write
24CCECB6000
heap
page read and write
24CCEF44000
heap
page read and write
24CCEFD0000
heap
page read and write
24CCECAB000
heap
page read and write
1E0000
heap
page read and write
24CCECB2000
heap
page read and write
24CCECC8000
heap
page read and write
1D0000
heap
page read and write
24CCECB3000
heap
page read and write
14E000
stack
page read and write
1C0000
heap
page read and write
24CCEC88000
heap
page read and write
24CCEC9F000
heap
page read and write
24CCEF60000
heap
page read and write
24CCECAB000
heap
page read and write
24CCEFD5000
heap
page read and write
1C5000
heap
page read and write
1CA000
heap
page read and write
24CCECAB000
heap
page read and write
24CCEC70000
heap
page read and write
2C80000
heap
page read and write
100000
heap
page read and write
24CCECAC000
heap
page read and write
24CCECBB000
heap
page read and write
C19C2FD000
stack
page read and write
9B000
stack
page read and write
24CCECA2000
heap
page read and write
24CD0BB0000
heap
page read and write
24CCEF40000
heap
page read and write
There are 43 hidden memdumps, click here to show them.