IOC Report
eLoll8t7fq.hta

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\eLoll8t7fq.hta"

URLs

Name
IP
Malicious
https://acess.mailcffemx.com//672350cabd2c8/js/672350cabd242.jsH-
unknown
https://acess.mailcffemx.com/
unknown
https://acess.mailcffemx.com//672350cabd2c8/js/672350cabd242.js
104.21.60.109
https://acess.mailcffemx.com//672350cabd2c8/js/672350cabd242.jsZ
unknown
https://acess.mailcffemx.com//672350cabd2c8/js/672350cabd242.jsn-
unknown

Domains

Name
IP
Malicious
acess.mailcffemx.com
104.21.60.109

IPs

IP
Domain
Country
Malicious
104.21.60.109
acess.mailcffemx.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
6A10000
heap
page read and write
31F6000
heap
page read and write
6723000
heap
page read and write
31E3000
heap
page read and write
31C0000
heap
page read and write
551C000
stack
page read and write
516C000
trusted library allocation
page read and write
512C000
trusted library allocation
page read and write
673D000
heap
page read and write
5178000
trusted library allocation
page read and write
54DA000
stack
page read and write
2BCA000
stack
page read and write
517A000
trusted library allocation
page read and write
8E60000
trusted library section
page readonly
B3C0000
trusted library allocation
page read and write
6734000
heap
page read and write
317C000
heap
page read and write
30D3000
heap
page read and write
3434000
heap
page read and write
31FA000
heap
page read and write
5138000
trusted library allocation
page read and write
517C000
trusted library allocation
page read and write
512A000
trusted library allocation
page read and write
5340000
heap
page read and write
31DA000
heap
page read and write
672A000
heap
page read and write
61AB000
stack
page read and write
2FC0000
heap
page read and write
5148000
trusted library allocation
page read and write
5344000
heap
page read and write
3208000
heap
page read and write
539F000
stack
page read and write
31E3000
heap
page read and write
6B9E000
stack
page read and write
31FA000
heap
page read and write
6B54000
trusted library allocation
page read and write
5100000
heap
page read and write
31B3000
heap
page read and write
6723000
heap
page read and write
3216000
heap
page read and write
512E000
trusted library allocation
page read and write
513C000
trusted library allocation
page read and write
B3B0000
trusted library allocation
page read and write
30D8000
heap
page read and write
30D0000
heap
page read and write
687E000
stack
page read and write
66D6000
heap
page read and write
579C000
stack
page read and write
6A1C000
heap
page read and write
53DB000
stack
page read and write
648D000
stack
page read and write
6705000
heap
page read and write
3138000
heap
page read and write
658E000
stack
page read and write
511C000
trusted library allocation
page read and write
3171000
heap
page read and write
31DD000
heap
page read and write
6B50000
trusted library allocation
page read and write
2FD5000
heap
page read and write
8E5C000
stack
page read and write
5158000
trusted library allocation
page read and write
6AEE000
stack
page read and write
31F3000
heap
page read and write
3216000
heap
page read and write
3130000
heap
page read and write
5970000
trusted library allocation
page read and write
66E0000
heap
page read and write
2EF9000
stack
page read and write
3110000
trusted library allocation
page read and write
516E000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
31C6000
heap
page read and write
6A95000
trusted library allocation
page read and write
6A4D000
heap
page read and write
3216000
heap
page read and write
6C9F000
stack
page read and write
3208000
heap
page read and write
69BC000
heap
page read and write
7FC71000
trusted library allocation
page execute read
511E000
trusted library allocation
page read and write
6840000
remote allocation
page read and write
69AD000
heap
page read and write
6A97000
trusted library allocation
page read and write
672E000
heap
page read and write
343F000
heap
page read and write
6730000
heap
page read and write
671A000
heap
page read and write
62AF000
stack
page read and write
69C2000
heap
page read and write
561F000
stack
page read and write
6999000
heap
page read and write
6840000
remote allocation
page read and write
31C6000
heap
page read and write
31F2000
heap
page read and write
B3B0000
trusted library allocation
page read and write
6995000
heap
page read and write
513E000
trusted library allocation
page read and write
6A16000
heap
page read and write
6B44000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
65CE000
stack
page read and write
50E0000
heap
page read and write
5330000
heap
page read and write
6CC0000
trusted library allocation
page execute
6B58000
trusted library allocation
page read and write
B150000
heap
page read and write
66DC000
heap
page read and write
575E000
stack
page read and write
5130000
trusted library allocation
page read and write
5128000
trusted library allocation
page read and write
6B3F000
stack
page read and write
31E0000
heap
page read and write
8D5E000
stack
page read and write
3208000
heap
page read and write
3171000
heap
page read and write
511A000
trusted library allocation
page read and write
672A000
heap
page read and write
6B46000
trusted library allocation
page read and write
2F30000
heap
page read and write
6723000
heap
page read and write
6AA2000
trusted library allocation
page read and write
565C000
stack
page read and write
69A2000
heap
page read and write
589C000
stack
page read and write
513A000
trusted library allocation
page read and write
50DE000
stack
page read and write
3208000
heap
page read and write
6729000
heap
page read and write
697F000
stack
page read and write
A842000
trusted library allocation
page read and write
3560000
heap
page read and write
3540000
heap
page read and write
6840000
remote allocation
page read and write
69CD000
heap
page read and write
6B4B000
trusted library allocation
page read and write
317C000
heap
page read and write
3216000
heap
page read and write
3100000
trusted library allocation
page read and write
2FD0000
heap
page read and write
5150000
trusted library allocation
page read and write
5118000
trusted library allocation
page read and write
31B3000
heap
page read and write
66CF000
stack
page read and write
3430000
heap
page read and write
5176000
trusted library allocation
page read and write
3566000
heap
page read and write
356A000
heap
page read and write
31FA000
heap
page read and write
66D0000
heap
page read and write
6A19000
heap
page read and write
3161000
heap
page read and write
31F3000
heap
page read and write
66F3000
heap
page read and write
31C0000
heap
page read and write
673E000
heap
page read and write
7FC80000
trusted library allocation
page execute read
6990000
heap
page read and write
3436000
heap
page read and write
672A000
heap
page read and write
3142000
heap
page read and write
There are 150 hidden memdumps, click here to show them.