IOC Report
http://D:/2017%20Tort%20Claims/Armendariz,%20Hector%20Gamboa/Investigation/Crime%20Scene/NMSP%20Rook/Setup.exe

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Desktop\cmdline.out
ASCII text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://D:/2017%20Tort%20Claims/Armendariz,%20Hector%20Gamboa/Investigation/Crime%20Scene/NMSP%20Rook/Setup.exe" > cmdline.out 2>&1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\wget.exe
wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://D:/2017%20Tort%20Claims/Armendariz,%20Hector%20Gamboa/Investigation/Crime%20Scene/NMSP%20Rook/Setup.exe"

Memdumps

Base Address
Regiontype
Protect
Malicious
A0E000
stack
page read and write
AA0000
heap
page read and write
D6000
heap
page read and write
1110000
heap
page read and write
110000
heap
page read and write
AA8000
heap
page read and write
F9F000
stack
page read and write
D9F000
stack
page read and write
A4E000
stack
page read and write
9C000
stack
page read and write
A60000
heap
page read and write
1F0000
heap
page read and write
9CD000
stack
page read and write
D0000
heap
page read and write
1115000
heap
page read and write
A70000
heap
page read and write
There are 6 hidden memdumps, click here to show them.