IOC Report
http://acroipm2.adobe.com/assets/Owner/arm/adnme4/2016.zip

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Desktop\cmdline.out
ASCII text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://acroipm2.adobe.com/assets/Owner/arm/adnme4/2016.zip" > cmdline.out 2>&1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\wget.exe
wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://acroipm2.adobe.com/assets/Owner/arm/adnme4/2016.zip"

Memdumps

Base Address
Regiontype
Protect
Malicious
A0E000
stack
page read and write
FBF000
stack
page read and write
A4E000
stack
page read and write
1E0000
heap
page read and write
11BF000
stack
page read and write
9CD000
stack
page read and write
AB5000
heap
page read and write
B40000
heap
page read and write
9C000
stack
page read and write
A50000
heap
page read and write
AB0000
heap
page read and write
A60000
heap
page read and write
100000
heap
page read and write
B46000
heap
page read and write
CC0000
heap
page read and write
CC8000
heap
page read and write
There are 6 hidden memdumps, click here to show them.