IOC Report
http://pdfconvertychrome.ssl.hwcdn.net/pdfconverty.exe

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Desktop\cmdline.out
ASCII text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://pdfconvertychrome.ssl.hwcdn.net/pdfconverty.exe" > cmdline.out 2>&1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\wget.exe
wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://pdfconvertychrome.ssl.hwcdn.net/pdfconverty.exe"

Memdumps

Base Address
Regiontype
Protect
Malicious
B70000
heap
page read and write
30000
heap
page read and write
A50000
heap
page read and write
B76000
heap
page read and write
A4E000
stack
page read and write
AFE000
stack
page read and write
1F0000
heap
page read and write
A60000
heap
page read and write
106F000
stack
page read and write
31BF000
stack
page read and write
1F5000
heap
page read and write
9CC000
stack
page read and write
DA1000
heap
page read and write
1D0000
heap
page read and write
126F000
stack
page read and write
B3E000
stack
page read and write
9D000
stack
page read and write
A0E000
stack
page read and write
D70000
heap
page read and write
D78000
heap
page read and write
2FBF000
stack
page read and write
There are 11 hidden memdumps, click here to show them.