IOC Report
http://16ba07bbb69ff55803f38dfe516fcafa48a030eafdf423a59f3bc69483e01107

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Desktop\cmdline.out
ASCII text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://16ba07bbb69ff55803f38dfe516fcafa48a030eafdf423a59f3bc69483e01107" > cmdline.out 2>&1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\wget.exe
wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://16ba07bbb69ff55803f38dfe516fcafa48a030eafdf423a59f3bc69483e01107"

Memdumps

Base Address
Regiontype
Protect
Malicious
A4E000
stack
page read and write
B80000
heap
page read and write
B86000
heap
page read and write
A60000
heap
page read and write
118F000
stack
page read and write
F85000
heap
page read and write
A0E000
stack
page read and write
F80000
heap
page read and write
9C000
stack
page read and write
9CD000
stack
page read and write
D8F000
stack
page read and write
A80000
heap
page read and write
A88000
heap
page read and write
100000
heap
page read and write
1E0000
heap
page read and write
A50000
heap
page read and write
There are 6 hidden memdumps, click here to show them.