Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\Users\user\Desktop\cmdline.out
|
ASCII text, with CRLF line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition
--user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://D:/2017%20Tort%20Claims/Armendariz,%20Hector%20Gamboa/Investigation/Crime%20Scene/NMSP%20Rook/Setup.exe"
> cmdline.out 2>&1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\wget.exe
|
wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0
(Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://D:/2017%20Tort%20Claims/Armendariz,%20Hector%20Gamboa/Investigation/Crime%20Scene/NMSP%20Rook/Setup.exe"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
A0E000
|
stack
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
D6000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
110000
|
heap
|
page read and write
|
||
AA8000
|
heap
|
page read and write
|
||
F9F000
|
stack
|
page read and write
|
||
D9F000
|
stack
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
9CD000
|
stack
|
page read and write
|
||
D0000
|
heap
|
page read and write
|
||
1115000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
There are 6 hidden memdumps, click here to show them.