IOC Report
https://is.gd/BALCAOHN898GERENCIAPS676TRIBU

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Desktop\cmdline.out
ASCII text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://is.gd/BALCAOHN898GERENCIAPS676TRIBU" > cmdline.out 2>&1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\wget.exe
wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://is.gd/BALCAOHN898GERENCIAPS676TRIBU"

URLs

Name
IP
Malicious
https://is.gd/BALCAOHN898GERENCIAPS676TRIBU
https://is.gd/BALCAOHN898GERENCIAPS676TRIBUel
unknown
https://is.gd/BALCAOHN898GERENCIAPS676TRIBU
104.25.233.53

Domains

Name
IP
Malicious
is.gd
104.25.233.53

IPs

IP
Domain
Country
Malicious
104.25.233.53
is.gd
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
10EF000
stack
page read and write
A65000
heap
page read and write
B16000
heap
page read and write
9CD000
stack
page read and write
A4E000
stack
page read and write
A6B000
heap
page read and write
2BDD000
heap
page read and write
A0E000
stack
page read and write
A6C000
heap
page read and write
ACE000
stack
page read and write
100000
heap
page read and write
A6D000
heap
page read and write
9C000
stack
page read and write
A70000
heap
page read and write
A50000
heap
page read and write
2ECF000
stack
page read and write
2BD0000
heap
page read and write
A60000
heap
page read and write
B10000
heap
page read and write
BF0000
heap
page read and write
EEF000
stack
page read and write
2C11000
heap
page read and write
2C06000
heap
page read and write
2C0F000
heap
page read and write
BF8000
heap
page read and write
A6E000
heap
page read and write
2C0A000
heap
page read and write
2C10000
heap
page read and write
1E0000
heap
page read and write
2BDA000
heap
page read and write
There are 20 hidden memdumps, click here to show them.