IOC Report

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
cmd /C "C:\WINDOWS\system32\cmd.exe /c mshta.exe "about:<input type=file id=FILE><script>FILE.click();new ActiveXObject('Scripting.FileSystemObject').GetStandardStream(1).WriteLine(FILE.value);close();resizeTo(0,0);</script>""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
C:\WINDOWS\system32\cmd.exe /c mshta.exe "about:<input type=file id=FILE><script>FILE.click();new ActiveXObject('Scripting.FileSystemObject').GetStandardStream(1).WriteLine(FILE.value);close();resizeTo(0,0);</script>"
C:\Windows\SysWOW64\mshta.exe
mshta.exe "about:<input type=file id=FILE><script>FILE.click();new ActiveXObject('Scripting.FileSystemObject').GetStandardStream(1).WriteLine(FILE.value);close();resizeTo(0,0);</script>"

URLs

Name
IP
Malicious
http://www.autoitscript.com/autoit3/8
unknown
http://www.autoitscript.com/favicon.ico
unknown
http://www.autoitscript.com/site/autoit/#
unknown
http://www.autoitscript.com/site/autoit/3
unknown
http://www.autoitscript.com/site/autoit/e
unknown
http://www.autoitscript.com/site/autoit/eC
unknown
http://www.autoitscript.com/site/autoit/?
unknown
http://www.autoitscript.com/site/autoit/
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\0
1
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\0\1
0
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\0\1
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\0\1\0
NodeSlot
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\0\1\0
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\Shell
SniffedFolderType
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@C:\Windows\System32\ieframe.dll,-10046
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@C:\Windows\System32\hhctrl.ocx,-452
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
ImageStoreRandomFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{FBF23B40-E3F0-101B-8488-00AA003E56F8} {00021500-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\0
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
NodeSlots
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5078000
trusted library allocation
page read and write
A1A3000
heap
page read and write
311C000
heap
page read and write
6638000
trusted library allocation
page read and write
6470000
heap
page read and write
9EE5000
heap
page read and write
9EE3000
heap
page read and write
D900000
trusted library allocation
page read and write
54EF000
stack
page read and write
A1CD000
heap
page read and write
5068000
trusted library allocation
page read and write
A1CD000
heap
page read and write
6475000
heap
page read and write
3110000
heap
page read and write
A1A3000
heap
page read and write
31B5000
heap
page read and write
9E9E000
heap
page read and write
57AB000
stack
page read and write
6577000
trusted library allocation
page read and write
D3F9000
stack
page read and write
9EA1000
heap
page read and write
E71E000
stack
page read and write
507A000
trusted library allocation
page read and write
3176000
heap
page read and write
30F0000
heap
page read and write
5070000
trusted library allocation
page read and write
9EE8000
heap
page read and write
317F000
heap
page read and write
A1D2000
heap
page read and write
A1A2000
heap
page read and write
661F000
stack
page read and write
333A000
heap
page read and write
50B8000
trusted library allocation
page read and write
A13D000
heap
page read and write
9EEC000
heap
page read and write
A13F000
heap
page read and write
9ED9000
heap
page read and write
58FE000
stack
page read and write
CD29000
stack
page read and write
9F3E000
heap
page read and write
A1A3000
heap
page read and write
64DD000
heap
page read and write
552C000
stack
page read and write
A1D2000
heap
page read and write
507C000
trusted library allocation
page read and write
A1D2000
heap
page read and write
3182000
heap
page read and write
2E20000
heap
page read and write
508C000
trusted library allocation
page read and write
67A0000
trusted library allocation
page execute
896F000
stack
page read and write
9EE1000
heap
page read and write
9F13000
heap
page read and write
3161000
heap
page read and write
8970000
trusted library section
page readonly
6634000
trusted library allocation
page read and write
3103000
heap
page read and write
9ED9000
heap
page read and write
576D000
stack
page read and write
6584000
trusted library allocation
page read and write
A17F000
heap
page read and write
DD3B000
stack
page read and write
50A8000
trusted library allocation
page read and write
2F80000
heap
page read and write
50C6000
trusted library allocation
page read and write
A0AC000
stack
page read and write
9B8F000
stack
page read and write
A1D2000
heap
page read and write
A142000
heap
page read and write
3195000
heap
page read and write
506E000
trusted library allocation
page read and write
DCF9000
stack
page read and write
A0E8000
trusted library allocation
page read and write
A1CD000
heap
page read and write
31C3000
heap
page read and write
E19E000
stack
page read and write
30D0000
heap
page read and write
DE39000
stack
page read and write
3125000
heap
page read and write
2BB2000
stack
page read and write
310C000
heap
page read and write
9EE1000
heap
page read and write
DE7E000
stack
page read and write
9EE9000
heap
page read and write
3187000
heap
page read and write
A1A3000
heap
page read and write
64B9000
heap
page read and write
A14E000
heap
page read and write
4E2F000
heap
page read and write
A1D2000
heap
page read and write
9E70000
heap
page read and write
9EE5000
heap
page read and write
CBDB000
stack
page read and write
562E000
stack
page read and write
528B000
stack
page read and write
5050000
heap
page read and write
9EE1000
heap
page read and write
3300000
heap
page read and write
667E000
stack
page read and write
30C0000
trusted library allocation
page read and write
9A8C000
stack
page read and write
E29F000
stack
page read and write
E81F000
stack
page read and write
4F70000
heap
page read and write
A129000
heap
page read and write
A1D2000
heap
page read and write
58BA000
stack
page read and write
3330000
heap
page read and write
3164000
heap
page read and write
C4D0000
heap
page read and write
6624000
trusted library allocation
page read and write
9F4D000
heap
page read and write
52E4000
heap
page read and write
A1CD000
heap
page read and write
57B0000
heap
page read and write
9EE5000
heap
page read and write
9EE9000
heap
page read and write
662B000
trusted library allocation
page read and write
3171000
heap
page read and write
509C000
trusted library allocation
page read and write
64D3000
heap
page read and write
2FB6000
heap
page read and write
A0E0000
heap
page read and write
53EE000
stack
page read and write
A1A3000
heap
page read and write
2AAE000
stack
page read and write
657E000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
503F000
stack
page read and write
4E24000
heap
page read and write
3151000
heap
page read and write
5088000
trusted library allocation
page read and write
50BC000
trusted library allocation
page read and write
52E0000
heap
page read and write
30D8000
heap
page read and write
886E000
stack
page read and write
64A4000
heap
page read and write
A1D2000
heap
page read and write
3336000
heap
page read and write
50BE000
trusted library allocation
page read and write
566B000
stack
page read and write
6575000
trusted library allocation
page read and write
F162000
trusted library allocation
page read and write
A1A5000
heap
page read and write
50BA000
trusted library allocation
page read and write
317A000
heap
page read and write
4FEE000
stack
page read and write
A1D2000
heap
page read and write
9F7B000
heap
page read and write
A1CD000
heap
page read and write
A1D2000
heap
page read and write
A1A3000
heap
page read and write
313B000
heap
page read and write
506C000
trusted library allocation
page read and write
9EF9000
heap
page read and write
9EE3000
heap
page read and write
31AE000
heap
page read and write
315C000
heap
page read and write
509A000
trusted library allocation
page read and write
A1A2000
heap
page read and write
9E90000
heap
page read and write
30E2000
heap
page read and write
3173000
heap
page read and write
9F17000
heap
page read and write
DF7D000
stack
page read and write
52CE000
stack
page read and write
5098000
trusted library allocation
page read and write
50CC000
trusted library allocation
page read and write
A1CD000
heap
page read and write
32F0000
trusted library allocation
page read and write
507E000
trusted library allocation
page read and write
508A000
trusted library allocation
page read and write
9BD0000
heap
page read and write
677F000
stack
page read and write
50C2000
trusted library allocation
page read and write
4F30000
heap
page read and write
9EE3000
heap
page read and write
50CA000
trusted library allocation
page read and write
C4E0000
heap
page read and write
9E0B000
stack
page read and write
2FB0000
heap
page read and write
A1A2000
heap
page read and write
4E26000
heap
page read and write
4E20000
heap
page read and write
A1D2000
heap
page read and write
6626000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
316B000
heap
page read and write
A0E1000
trusted library allocation
page read and write
3130000
heap
page read and write
9ED9000
heap
page read and write
65CE000
stack
page read and write
4F73000
heap
page read and write
6581000
trusted library allocation
page read and write
316F000
heap
page read and write
647B000
heap
page read and write
59FE000
stack
page read and write
5C10000
trusted library allocation
page read and write
506A000
trusted library allocation
page read and write
508E000
trusted library allocation
page read and write
A1D2000
heap
page read and write
9FB6000
heap
page read and write
A1CD000
heap
page read and write
31C8000
heap
page read and write
6492000
heap
page read and write
There are 196 hidden memdumps, click here to show them.