Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
na.hta
|
HTML document, ASCII text, with very long lines (29716)
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\rad4338C.tmp\Journal-http.exe
|
MS-DOS executable
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\error[1]
|
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\warning[1]
|
GIF image data, version 89a, 36 x 38
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\error[1]
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\mshta.exe
|
mshta.exe "C:\Users\user\Desktop\na.hta"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
8CC000
|
heap
|
page read and write
|
||
5CBE000
|
heap
|
page read and write
|
||
5CBE000
|
heap
|
page read and write
|
||
87F000
|
heap
|
page read and write
|
||
5CBE000
|
heap
|
page read and write
|
||
8CE000
|
heap
|
page read and write
|
||
4FAC000
|
stack
|
page read and write
|
||
AFB8000
|
trusted library allocation
|
page read and write
|
||
862000
|
heap
|
page read and write
|
||
A01E000
|
stack
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
47F0000
|
trusted library allocation
|
page read and write
|
||
5D1E000
|
heap
|
page read and write
|
||
696D000
|
trusted library allocation
|
page read and write
|
||
928000
|
heap
|
page read and write
|
||
5CA0000
|
heap
|
page read and write
|
||
5D0C000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
6951000
|
trusted library allocation
|
page read and write
|
||
B060000
|
trusted library allocation
|
page read and write
|
||
5C8E000
|
heap
|
page read and write
|
||
4600000
|
heap
|
page read and write
|
||
6A06000
|
trusted library allocation
|
page read and write
|
||
4B8E000
|
stack
|
page read and write
|
||
696E000
|
trusted library allocation
|
page read and write
|
||
6C0A000
|
heap
|
page read and write
|
||
6BE0000
|
heap
|
page read and write
|
||
5D0C000
|
heap
|
page read and write
|
||
6BB8000
|
heap
|
page read and write
|
||
6BAF000
|
heap
|
page read and write
|
||
695A000
|
trusted library allocation
|
page read and write
|
||
5D0E000
|
heap
|
page read and write
|
||
B070000
|
heap
|
page read and write
|
||
89C000
|
heap
|
page read and write
|
||
7F120000
|
trusted library allocation
|
page execute read
|
||
5D21000
|
heap
|
page read and write
|
||
5D31000
|
heap
|
page read and write
|
||
5C82000
|
heap
|
page read and write
|
||
4772000
|
trusted library allocation
|
page read and write
|
||
4658000
|
heap
|
page read and write
|
||
8A8000
|
heap
|
page read and write
|
||
651E000
|
stack
|
page read and write
|
||
4A8C000
|
stack
|
page read and write
|
||
5D0D000
|
heap
|
page read and write
|
||
69AE000
|
stack
|
page read and write
|
||
5CDA000
|
heap
|
page read and write
|
||
4F5F000
|
stack
|
page read and write
|
||
A7A000
|
heap
|
page read and write
|
||
6BA0000
|
heap
|
page read and write
|
||
4D1B000
|
stack
|
page read and write
|
||
610000
|
trusted library allocation
|
page read and write
|
||
50AD000
|
stack
|
page read and write
|
||
6710000
|
heap
|
page read and write
|
||
9F1B000
|
stack
|
page read and write
|
||
5D15000
|
heap
|
page read and write
|
||
7F101000
|
trusted library allocation
|
page execute read
|
||
47C7000
|
trusted library allocation
|
page read and write
|
||
696B000
|
trusted library allocation
|
page read and write
|
||
6BC4000
|
heap
|
page read and write
|
||
47D2000
|
trusted library allocation
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
5D2E000
|
heap
|
page read and write
|
||
5D2F000
|
heap
|
page read and write
|
||
5D29000
|
heap
|
page read and write
|
||
6BCF000
|
heap
|
page read and write
|
||
5D29000
|
heap
|
page read and write
|
||
47F4000
|
trusted library allocation
|
page read and write
|
||
8BC000
|
heap
|
page read and write
|
||
6C4D000
|
heap
|
page read and write
|
||
6BC1000
|
heap
|
page read and write
|
||
6C54000
|
heap
|
page read and write
|
||
5D24000
|
heap
|
page read and write
|
||
4E5C000
|
stack
|
page read and write
|
||
47BC000
|
trusted library allocation
|
page read and write
|
||
4776000
|
trusted library allocation
|
page read and write
|
||
4CCF000
|
stack
|
page read and write
|
||
6A5E000
|
stack
|
page read and write
|
||
661F000
|
stack
|
page read and write
|
||
B070000
|
trusted library allocation
|
page read and write
|
||
47E0000
|
trusted library allocation
|
page read and write
|
||
4604000
|
heap
|
page read and write
|
||
5D06000
|
heap
|
page read and write
|
||
5C80000
|
heap
|
page read and write
|
||
5D2E000
|
heap
|
page read and write
|
||
AFB5000
|
trusted library allocation
|
page read and write
|
||
B060000
|
trusted library allocation
|
page read and write
|
||
6C5E000
|
heap
|
page read and write
|
||
693F000
|
stack
|
page read and write
|
||
B080000
|
trusted library allocation
|
page read and write
|
||
6968000
|
trusted library allocation
|
page read and write
|
||
47E8000
|
trusted library allocation
|
page read and write
|
||
6BBD000
|
heap
|
page read and write
|
||
620000
|
trusted library allocation
|
page read and write
|
||
7F0F1000
|
trusted library allocation
|
page execute read
|
||
5D26000
|
heap
|
page read and write
|
||
466F000
|
heap
|
page read and write
|
||
4774000
|
trusted library allocation
|
page read and write
|
||
47F2000
|
trusted library allocation
|
page read and write
|
||
5D24000
|
heap
|
page read and write
|
||
47A4000
|
trusted library allocation
|
page read and write
|
||
5D29000
|
heap
|
page read and write
|
||
4900000
|
heap
|
page read and write
|
||
5D2E000
|
heap
|
page read and write
|
||
86B000
|
heap
|
page read and write
|
||
5CEF000
|
heap
|
page read and write
|
||
465A000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
6955000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
4666000
|
heap
|
page read and write
|
||
5CA0000
|
heap
|
page read and write
|
||
B060000
|
trusted library allocation
|
page read and write
|
||
5D0C000
|
heap
|
page read and write
|
||
5C90000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
5D26000
|
heap
|
page read and write
|
||
7F111000
|
trusted library allocation
|
page execute read
|
||
47DA000
|
trusted library allocation
|
page read and write
|
||
6C60000
|
heap
|
page read and write
|
||
5D0C000
|
heap
|
page read and write
|
||
6A18000
|
trusted library allocation
|
page read and write
|
||
6B5F000
|
stack
|
page read and write
|
||
5D22000
|
heap
|
page read and write
|
||
4660000
|
heap
|
page read and write
|
||
B070000
|
trusted library allocation
|
page read and write
|
||
8A3000
|
heap
|
page read and write
|
||
5D0D000
|
heap
|
page read and write
|
||
5D06000
|
heap
|
page read and write
|
||
84F000
|
heap
|
page read and write
|
||
6969000
|
trusted library allocation
|
page read and write
|
||
6A04000
|
trusted library allocation
|
page read and write
|
||
5C88000
|
heap
|
page read and write
|
||
6BD2000
|
heap
|
page read and write
|
||
488000
|
stack
|
page read and write
|
||
6967000
|
trusted library allocation
|
page read and write
|
||
6CA0000
|
trusted library allocation
|
page read and write
|
||
AFD0000
|
heap
|
page read and write
|
||
655000
|
heap
|
page read and write
|
||
AFB0000
|
trusted library allocation
|
page read and write
|
||
909000
|
heap
|
page read and write
|
||
A76000
|
heap
|
page read and write
|
||
47CA000
|
trusted library allocation
|
page read and write
|
||
47D6000
|
trusted library allocation
|
page read and write
|
||
B0A1000
|
heap
|
page read and write
|
||
5D1B000
|
heap
|
page read and write
|
||
5D26000
|
heap
|
page read and write
|
||
6A0B000
|
trusted library allocation
|
page read and write
|
||
5D21000
|
heap
|
page read and write
|
||
696A000
|
trusted library allocation
|
page read and write
|
||
6C5A000
|
heap
|
page read and write
|
||
47DE000
|
trusted library allocation
|
page read and write
|
||
6BB4000
|
heap
|
page read and write
|
||
5D22000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
AFD0000
|
trusted library allocation
|
page read and write
|
||
5D26000
|
heap
|
page read and write
|
||
5D06000
|
heap
|
page read and write
|
||
4E1E000
|
stack
|
page read and write
|
||
5D24000
|
heap
|
page read and write
|
||
6BC8000
|
heap
|
page read and write
|
||
6BF2000
|
heap
|
page read and write
|
||
683E000
|
stack
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
8D3E000
|
stack
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
6CA2000
|
trusted library allocation
|
page read and write
|
||
4800000
|
trusted library allocation
|
page read and write
|
||
8E3C000
|
stack
|
page read and write
|
||
4653000
|
heap
|
page read and write
|
||
4A4F000
|
stack
|
page read and write
|
||
69FF000
|
stack
|
page read and write
|
||
47CC000
|
trusted library allocation
|
page read and write
|
||
5C92000
|
heap
|
page read and write
|
||
4783000
|
trusted library allocation
|
page read and write
|
||
5D26000
|
heap
|
page read and write
|
||
4650000
|
heap
|
page read and write
|
||
842000
|
heap
|
page read and write
|
||
6700000
|
heap
|
page read and write
|
||
5C81000
|
heap
|
page read and write
|
||
695C000
|
trusted library allocation
|
page read and write
|
||
6BC6000
|
heap
|
page read and write
|
||
5D29000
|
heap
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
5C9E000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
47A8000
|
trusted library allocation
|
page read and write
|
||
4620000
|
heap
|
page read and write
|
||
4664000
|
heap
|
page read and write
|
||
AAF2000
|
trusted library allocation
|
page read and write
|
||
5D2E000
|
heap
|
page read and write
|
||
465E000
|
heap
|
page read and write
|
||
6957000
|
trusted library allocation
|
page read and write
|
||
585000
|
stack
|
page read and write
|
||
4788000
|
trusted library allocation
|
page read and write
|
||
A11D000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
trusted library allocation
|
page read and write
|
||
5D14000
|
heap
|
page read and write
|
||
4BCC000
|
stack
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
600000
|
trusted library allocation
|
page read and write
|
||
6A14000
|
trusted library allocation
|
page read and write
|
||
47BA000
|
trusted library allocation
|
page read and write
|
||
47D8000
|
trusted library allocation
|
page read and write
|
||
48EE000
|
stack
|
page read and write
|
||
5D2B000
|
heap
|
page read and write
|
||
45D0000
|
heap
|
page read and write
|
||
476C000
|
trusted library allocation
|
page read and write
|
||
6B80000
|
trusted library allocation
|
page execute
|
||
696C000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
5CD0000
|
heap
|
page read and write
|
||
5D06000
|
heap
|
page read and write
|
There are 203 hidden memdumps, click here to show them.