Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\Users\user\Desktop\cmdline.out
|
ASCII text, with CRLF line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition
--user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://is.gd/BALCAOHN898GERENCIAPS676TRIBU"
> cmdline.out 2>&1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\wget.exe
|
wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0
(Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://is.gd/BALCAOHN898GERENCIAPS676TRIBU"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://is.gd/BALCAOHN898GERENCIAPS676TRIBU
|
|||
https://is.gd/BALCAOHN898GERENCIAPS676TRIBUel
|
unknown
|
||
https://is.gd/BALCAOHN898GERENCIAPS676TRIBU
|
104.25.233.53
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
is.gd
|
104.25.233.53
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.25.233.53
|
is.gd
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
10EF000
|
stack
|
page read and write
|
||
A65000
|
heap
|
page read and write
|
||
B16000
|
heap
|
page read and write
|
||
9CD000
|
stack
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
A6B000
|
heap
|
page read and write
|
||
2BDD000
|
heap
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
A6C000
|
heap
|
page read and write
|
||
ACE000
|
stack
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
A6D000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
2ECF000
|
stack
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
EEF000
|
stack
|
page read and write
|
||
2C11000
|
heap
|
page read and write
|
||
2C06000
|
heap
|
page read and write
|
||
2C0F000
|
heap
|
page read and write
|
||
BF8000
|
heap
|
page read and write
|
||
A6E000
|
heap
|
page read and write
|
||
2C0A000
|
heap
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
2BDA000
|
heap
|
page read and write
|
There are 20 hidden memdumps, click here to show them.