IOC Report
65#U2465.hta

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\65#U2465.hta"

URLs

Name
IP
Malicious
https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jsdll~T
unknown
https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.js
208.109.233.61
https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jsuT
unknown
https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.js~T
unknown
https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jsVRh
unknown
https://61.233.109.208.host.secureserver.net/
unknown
https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jskT
unknown
https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jsx
unknown
https://61.233.109.208.host.secureserver.net/GGOTSPH54/GGOTSPH54gerw/cPG711.jsZG
unknown

Domains

Name
IP
Malicious
61.233.109.208.host.secureserver.net
208.109.233.61

IPs

IP
Domain
Country
Malicious
208.109.233.61
61.233.109.208.host.secureserver.net
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
54E8000
trusted library allocation
page read and write
5544000
trusted library allocation
page read and write
52EF000
heap
page read and write
52E6000
heap
page read and write
5478000
heap
page read and write
67DE000
stack
page read and write
6AAF000
heap
page read and write
5BDE000
stack
page read and write
70EF000
stack
page read and write
3460000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
35A7000
heap
page read and write
6A73000
heap
page read and write
549A000
trusted library allocation
page read and write
6A26000
heap
page read and write
6A2C000
heap
page read and write
3597000
heap
page read and write
6A96000
heap
page read and write
35C2000
heap
page read and write
5ADC000
stack
page read and write
595F000
stack
page read and write
3437000
heap
page read and write
68DE000
stack
page read and write
2F80000
heap
page read and write
6DF5000
heap
page read and write
6A8E000
heap
page read and write
669E000
stack
page read and write
54B8000
trusted library allocation
page read and write
34B0000
heap
page read and write
35D5000
heap
page read and write
54DA000
trusted library allocation
page read and write
35AD000
heap
page read and write
6F3E000
stack
page read and write
6DFE000
heap
page read and write
6A73000
heap
page read and write
679F000
stack
page read and write
6A57000
heap
page read and write
35BE000
heap
page read and write
343A000
heap
page read and write
6E0E000
heap
page read and write
54C8000
trusted library allocation
page read and write
6DD0000
heap
page read and write
6EE5000
trusted library allocation
page read and write
6A92000
heap
page read and write
5D70000
heap
page read and write
54BE000
trusted library allocation
page read and write
6C90000
remote allocation
page read and write
5C1C000
stack
page read and write
54E6000
trusted library allocation
page read and write
5472000
heap
page read and write
354F000
heap
page read and write
35AF000
heap
page read and write
6E60000
heap
page read and write
6AB7000
heap
page read and write
544E000
stack
page read and write
35B2000
heap
page read and write
6FA8000
trusted library allocation
page read and write
6E6D000
heap
page read and write
52E0000
heap
page read and write
2FD0000
heap
page read and write
6EA1000
heap
page read and write
AC82000
trusted library allocation
page read and write
6A55000
heap
page read and write
35DB000
heap
page read and write
6DF7000
heap
page read and write
3512000
heap
page read and write
54A8000
trusted library allocation
page read and write
6EF2000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
35E0000
heap
page read and write
35B5000
heap
page read and write
B8C0000
heap
page read and write
6A7A000
heap
page read and write
6B80000
heap
page read and write
6A1F000
stack
page read and write
3440000
trusted library allocation
page read and write
5488000
trusted library allocation
page read and write
3591000
heap
page read and write
6CCE000
stack
page read and write
35E0000
heap
page read and write
32F9000
stack
page read and write
5498000
trusted library allocation
page read and write
6A92000
heap
page read and write
6E70000
heap
page read and write
3455000
heap
page read and write
B930000
trusted library allocation
page read and write
35AC000
heap
page read and write
2F19000
stack
page read and write
54E2000
trusted library allocation
page read and write
55CF000
stack
page read and write
35B5000
heap
page read and write
6E1D000
heap
page read and write
691E000
stack
page read and write
3591000
heap
page read and write
6C90000
remote allocation
page read and write
35BE000
heap
page read and write
6C90000
remote allocation
page read and write
35CD000
heap
page read and write
547B000
heap
page read and write
92B0000
trusted library section
page readonly
54EC000
trusted library allocation
page read and write
35C2000
heap
page read and write
6F8F000
stack
page read and write
6A20000
heap
page read and write
34C0000
heap
page read and write
54DE000
trusted library allocation
page read and write
91AE000
stack
page read and write
3532000
heap
page read and write
35B2000
heap
page read and write
6FEE000
stack
page read and write
6FA4000
trusted library allocation
page read and write
6B98000
heap
page read and write
7F970000
trusted library allocation
page execute read
6A8F000
heap
page read and write
5470000
heap
page read and write
6F9B000
trusted library allocation
page read and write
6DCF000
stack
page read and write
3508000
heap
page read and write
6A7A000
heap
page read and write
52E4000
heap
page read and write
54DC000
trusted library allocation
page read and write
6E14000
heap
page read and write
6EE7000
trusted library allocation
page read and write
6A73000
heap
page read and write
6A97000
heap
page read and write
6AA0000
heap
page read and write
6E68000
heap
page read and write
6A6B000
heap
page read and write
54E4000
trusted library allocation
page read and write
6AA5000
heap
page read and write
549C000
trusted library allocation
page read and write
5E00000
trusted library allocation
page read and write
B920000
trusted library allocation
page read and write
599C000
stack
page read and write
6A73000
heap
page read and write
6AB7000
heap
page read and write
54D8000
trusted library allocation
page read and write
6A7F000
heap
page read and write
6A7A000
heap
page read and write
5D1D000
stack
page read and write
7110000
trusted library allocation
page execute
3450000
heap
page read and write
3556000
heap
page read and write
6FA0000
trusted library allocation
page read and write
6AA8000
heap
page read and write
354F000
heap
page read and write
6F96000
trusted library allocation
page read and write
5A9E000
stack
page read and write
3430000
heap
page read and write
3597000
heap
page read and write
6A7A000
heap
page read and write
6F94000
trusted library allocation
page read and write
3470000
heap
page read and write
585C000
stack
page read and write
35CD000
heap
page read and write
54EA000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
35C9000
heap
page read and write
6DF3000
heap
page read and write
54C0000
trusted library allocation
page read and write
34C4000
heap
page read and write
6A69000
heap
page read and write
581A000
stack
page read and write
6A85000
heap
page read and write
35E0000
heap
page read and write
3411000
trusted library allocation
page read and write
35AA000
heap
page read and write
92AC000
stack
page read and write
B920000
trusted library allocation
page read and write
3500000
heap
page read and write
6DE9000
heap
page read and write
581C000
stack
page read and write
3556000
heap
page read and write
5620000
heap
page read and write
35DB000
heap
page read and write
560B000
stack
page read and write
7F961000
trusted library allocation
page execute read
35C9000
heap
page read and write
6A9D000
heap
page read and write
There are 169 hidden memdumps, click here to show them.