Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\Users\user\Desktop\cmdline.out
|
ASCII text, with CRLF line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition
--user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://pdfconvertychrome.ssl.hwcdn.net/pdfconverty.exe"
> cmdline.out 2>&1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\wget.exe
|
wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0
(Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://pdfconvertychrome.ssl.hwcdn.net/pdfconverty.exe"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
B70000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
B76000
|
heap
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
106F000
|
stack
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
9CC000
|
stack
|
page read and write
|
||
DA1000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
126F000
|
stack
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
D78000
|
heap
|
page read and write
|
||
2FBF000
|
stack
|
page read and write
|
There are 11 hidden memdumps, click here to show them.