IOC Report
na.hta

loading gif

Files

File Path
Type
Category
Malicious
na.hta
HTML document, ASCII text, with very long lines (29716)
initial sample
malicious
C:\Users\user\AppData\Local\Temp\rad4338C.tmp\Journal-http.exe
MS-DOS executable
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\error[1]
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\warning[1]
GIF image data, version 89a, 36 x 38
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\error[1]
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\na.hta"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
8CC000
heap
page read and write
malicious
5CBE000
heap
page read and write
malicious
5CBE000
heap
page read and write
malicious
87F000
heap
page read and write
malicious
5CBE000
heap
page read and write
malicious
8CE000
heap
page read and write
malicious
4FAC000
stack
page read and write
AFB8000
trusted library allocation
page read and write
862000
heap
page read and write
A01E000
stack
page read and write
640000
heap
page read and write
47F0000
trusted library allocation
page read and write
5D1E000
heap
page read and write
696D000
trusted library allocation
page read and write
928000
heap
page read and write
5CA0000
heap
page read and write
5D0C000
heap
page read and write
650000
heap
page read and write
6951000
trusted library allocation
page read and write
B060000
trusted library allocation
page read and write
5C8E000
heap
page read and write
4600000
heap
page read and write
6A06000
trusted library allocation
page read and write
4B8E000
stack
page read and write
696E000
trusted library allocation
page read and write
6C0A000
heap
page read and write
6BE0000
heap
page read and write
5D0C000
heap
page read and write
6BB8000
heap
page read and write
6BAF000
heap
page read and write
695A000
trusted library allocation
page read and write
5D0E000
heap
page read and write
B070000
heap
page read and write
89C000
heap
page read and write
7F120000
trusted library allocation
page execute read
5D21000
heap
page read and write
5D31000
heap
page read and write
5C82000
heap
page read and write
4772000
trusted library allocation
page read and write
4658000
heap
page read and write
8A8000
heap
page read and write
651E000
stack
page read and write
4A8C000
stack
page read and write
5D0D000
heap
page read and write
69AE000
stack
page read and write
5CDA000
heap
page read and write
4F5F000
stack
page read and write
A7A000
heap
page read and write
6BA0000
heap
page read and write
4D1B000
stack
page read and write
610000
trusted library allocation
page read and write
50AD000
stack
page read and write
6710000
heap
page read and write
9F1B000
stack
page read and write
5D15000
heap
page read and write
7F101000
trusted library allocation
page execute read
47C7000
trusted library allocation
page read and write
696B000
trusted library allocation
page read and write
6BC4000
heap
page read and write
47D2000
trusted library allocation
page read and write
A70000
heap
page read and write
E00000
trusted library allocation
page read and write
5D2E000
heap
page read and write
5D2F000
heap
page read and write
5D29000
heap
page read and write
6BCF000
heap
page read and write
5D29000
heap
page read and write
47F4000
trusted library allocation
page read and write
8BC000
heap
page read and write
6C4D000
heap
page read and write
6BC1000
heap
page read and write
6C54000
heap
page read and write
5D24000
heap
page read and write
4E5C000
stack
page read and write
47BC000
trusted library allocation
page read and write
4776000
trusted library allocation
page read and write
4CCF000
stack
page read and write
6A5E000
stack
page read and write
661F000
stack
page read and write
B070000
trusted library allocation
page read and write
47E0000
trusted library allocation
page read and write
4604000
heap
page read and write
5D06000
heap
page read and write
5C80000
heap
page read and write
5D2E000
heap
page read and write
AFB5000
trusted library allocation
page read and write
B060000
trusted library allocation
page read and write
6C5E000
heap
page read and write
693F000
stack
page read and write
B080000
trusted library allocation
page read and write
6968000
trusted library allocation
page read and write
47E8000
trusted library allocation
page read and write
6BBD000
heap
page read and write
620000
trusted library allocation
page read and write
7F0F1000
trusted library allocation
page execute read
5D26000
heap
page read and write
466F000
heap
page read and write
4774000
trusted library allocation
page read and write
47F2000
trusted library allocation
page read and write
5D24000
heap
page read and write
47A4000
trusted library allocation
page read and write
5D29000
heap
page read and write
4900000
heap
page read and write
5D2E000
heap
page read and write
86B000
heap
page read and write
5CEF000
heap
page read and write
465A000
heap
page read and write
5330000
heap
page read and write
6955000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
4666000
heap
page read and write
5CA0000
heap
page read and write
B060000
trusted library allocation
page read and write
5D0C000
heap
page read and write
5C90000
heap
page read and write
5F0000
heap
page read and write
5D26000
heap
page read and write
7F111000
trusted library allocation
page execute read
47DA000
trusted library allocation
page read and write
6C60000
heap
page read and write
5D0C000
heap
page read and write
6A18000
trusted library allocation
page read and write
6B5F000
stack
page read and write
5D22000
heap
page read and write
4660000
heap
page read and write
B070000
trusted library allocation
page read and write
8A3000
heap
page read and write
5D0D000
heap
page read and write
5D06000
heap
page read and write
84F000
heap
page read and write
6969000
trusted library allocation
page read and write
6A04000
trusted library allocation
page read and write
5C88000
heap
page read and write
6BD2000
heap
page read and write
488000
stack
page read and write
6967000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page read and write
AFD0000
heap
page read and write
655000
heap
page read and write
AFB0000
trusted library allocation
page read and write
909000
heap
page read and write
A76000
heap
page read and write
47CA000
trusted library allocation
page read and write
47D6000
trusted library allocation
page read and write
B0A1000
heap
page read and write
5D1B000
heap
page read and write
5D26000
heap
page read and write
6A0B000
trusted library allocation
page read and write
5D21000
heap
page read and write
696A000
trusted library allocation
page read and write
6C5A000
heap
page read and write
47DE000
trusted library allocation
page read and write
6BB4000
heap
page read and write
5D22000
heap
page read and write
47A0000
trusted library allocation
page read and write
AFD0000
trusted library allocation
page read and write
5D26000
heap
page read and write
5D06000
heap
page read and write
4E1E000
stack
page read and write
5D24000
heap
page read and write
6BC8000
heap
page read and write
6BF2000
heap
page read and write
683E000
stack
page read and write
6C71000
heap
page read and write
8D3E000
stack
page read and write
4780000
trusted library allocation
page read and write
6CA2000
trusted library allocation
page read and write
4800000
trusted library allocation
page read and write
8E3C000
stack
page read and write
4653000
heap
page read and write
4A4F000
stack
page read and write
69FF000
stack
page read and write
47CC000
trusted library allocation
page read and write
5C92000
heap
page read and write
4783000
trusted library allocation
page read and write
5D26000
heap
page read and write
4650000
heap
page read and write
842000
heap
page read and write
6700000
heap
page read and write
5C81000
heap
page read and write
695C000
trusted library allocation
page read and write
6BC6000
heap
page read and write
5D29000
heap
page read and write
837000
heap
page read and write
5C9E000
heap
page read and write
830000
heap
page read and write
47A8000
trusted library allocation
page read and write
4620000
heap
page read and write
4664000
heap
page read and write
AAF2000
trusted library allocation
page read and write
5D2E000
heap
page read and write
465E000
heap
page read and write
6957000
trusted library allocation
page read and write
585000
stack
page read and write
4788000
trusted library allocation
page read and write
A11D000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
5D14000
heap
page read and write
4BCC000
stack
page read and write
918000
heap
page read and write
600000
trusted library allocation
page read and write
6A14000
trusted library allocation
page read and write
47BA000
trusted library allocation
page read and write
47D8000
trusted library allocation
page read and write
48EE000
stack
page read and write
5D2B000
heap
page read and write
45D0000
heap
page read and write
476C000
trusted library allocation
page read and write
6B80000
trusted library allocation
page execute
696C000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
5CD0000
heap
page read and write
5D06000
heap
page read and write
There are 203 hidden memdumps, click here to show them.