IOC Report
3oqXgfRHnU.hta

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\3oqXgfRHnU.hta"

Memdumps

Base Address
Regiontype
Protect
Malicious
769000
stack
page read and write
7A0000
heap
page read and write
60E0000
heap
page read and write
4D30000
trusted library allocation
page read and write
4CEE000
trusted library allocation
page read and write
613C000
heap
page read and write
2D4A000
heap
page read and write
4D08000
trusted library allocation
page read and write
507E000
stack
page read and write
4D46000
trusted library allocation
page read and write
4D28000
trusted library allocation
page read and write
4B56000
heap
page read and write
62A0000
trusted library allocation
page read and write
5383000
heap
page read and write
6132000
heap
page read and write
4D00000
trusted library allocation
page read and write
7F0000
heap
page read and write
6150000
heap
page read and write
85B0000
trusted library section
page readonly
4CD0000
heap
page read and write
2F60000
heap
page read and write
6296000
trusted library allocation
page read and write
2F6A000
heap
page read and write
7F9C0000
trusted library allocation
page execute read
A20000
trusted library allocation
page read and write
6141000
heap
page read and write
AB10000
trusted library allocation
page read and write
533A000
heap
page read and write
7E0000
heap
page read and write
4CF8000
trusted library allocation
page read and write
4B5F000
heap
page read and write
2D59000
heap
page read and write
62A8000
trusted library allocation
page read and write
543B000
stack
page read and write
2D63000
heap
page read and write
2D6D000
heap
page read and write
4D3C000
trusted library allocation
page read and write
2C90000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
6102000
heap
page read and write
2F66000
heap
page read and write
6138000
heap
page read and write
4D4C000
trusted library allocation
page read and write
567F000
stack
page read and write
AB00000
trusted library allocation
page read and write
4B54000
heap
page read and write
51FB000
stack
page read and write
2D2A000
heap
page read and write
2CF5000
heap
page read and write
84AE000
stack
page read and write
7F9B1000
trusted library allocation
page execute read
4CC0000
heap
page read and write
2D3A000
heap
page read and write
2D56000
heap
page read and write
4CE8000
trusted library allocation
page read and write
4CEA000
trusted library allocation
page read and write
614F000
heap
page read and write
2D0F000
heap
page read and write
61F2000
trusted library allocation
page read and write
2D31000
heap
page read and write
6146000
heap
page read and write
4D18000
trusted library allocation
page read and write
2D1F000
heap
page read and write
85AC000
stack
page read and write
6410000
trusted library allocation
page execute
53A3000
heap
page read and write
62A4000
trusted library allocation
page read and write
628F000
stack
page read and write
4B50000
heap
page read and write
5890000
trusted library allocation
page read and write
4CFE000
trusted library allocation
page read and write
9F92000
trusted library allocation
page read and write
6138000
heap
page read and write
4D48000
trusted library allocation
page read and write
4F74000
heap
page read and write
AB00000
trusted library allocation
page read and write
60E5000
heap
page read and write
60EB000
heap
page read and write
4D0C000
trusted library allocation
page read and write
5320000
heap
page read and write
4D4A000
trusted library allocation
page read and write
2D5F000
heap
page read and write
2D4D000
heap
page read and write
4CEC000
trusted library allocation
page read and write
62EE000
stack
page read and write
2D37000
heap
page read and write
50BC000
stack
page read and write
623E000
stack
page read and write
4F70000
heap
page read and write
2CEC000
heap
page read and write
6114000
heap
page read and write
553F000
stack
page read and write
532C000
heap
page read and write
AAA0000
heap
page read and write
52FE000
stack
page read and write
6139000
heap
page read and write
2CEF000
heap
page read and write
2B3A000
stack
page read and write
6132000
heap
page read and write
4D3E000
trusted library allocation
page read and write
6129000
heap
page read and write
2D63000
heap
page read and write
557E000
stack
page read and write
4CF0000
trusted library allocation
page read and write
4C8E000
stack
page read and write
6153000
heap
page read and write
2D25000
heap
page read and write
61E7000
trusted library allocation
page read and write
6153000
heap
page read and write
63EF000
stack
page read and write
2CE2000
heap
page read and write
4D0E000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
4CFC000
trusted library allocation
page read and write
4CFA000
trusted library allocation
page read and write
6138000
heap
page read and write
5300000
heap
page read and write
4CF2000
trusted library allocation
page read and write
2CA0000
heap
page read and write
2CA8000
heap
page read and write
A8D1000
heap
page read and write
6132000
heap
page read and write
6134000
heap
page read and write
629B000
trusted library allocation
page read and write
4F5B000
stack
page read and write
51BF000
stack
page read and write
A8A0000
heap
page read and write
2EFB000
heap
page read and write
4F1F000
stack
page read and write
6141000
heap
page read and write
2EE0000
heap
page read and write
2EF0000
heap
page read and write
2EF6000
heap
page read and write
2EF3000
heap
page read and write
53ED000
heap
page read and write
4D0A000
trusted library allocation
page read and write
2D6D000
heap
page read and write
53ED000
heap
page read and write
53A3000
heap
page read and write
2D1C000
heap
page read and write
2D2F000
heap
page read and write
2CBE000
heap
page read and write
6294000
trusted library allocation
page read and write
There are 133 hidden memdumps, click here to show them.