IOC Report
Developer Services.js

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Developer Services.js"
malicious
C:\Windows\System32\cscript.exe
"C:\Windows\System32\cscript.exe" "Developer Services.js"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
2194AB29000
heap
page read and write
2194C580000
heap
page read and write
2194AB21000
heap
page read and write
2194AB35000
heap
page read and write
496ECFA000
stack
page read and write
1DE70189000
heap
page read and write
1DE6CF89000
heap
page read and write
1DE65104000
heap
page read and write
2194ADF5000
heap
page read and write
1DE63D04000
heap
page read and write
1DE63304000
heap
page read and write
2194AB35000
heap
page read and write
2194AA70000
heap
page read and write
2194AB3D000
heap
page read and write
1DE6C589000
heap
page read and write
1DE6E389000
heap
page read and write
496EDFE000
stack
page read and write
2194AB2E000
heap
page read and write
1DE71589000
heap
page read and write
2194AA50000
heap
page read and write
2194AB2F000
heap
page read and write
1DE64704000
heap
page read and write
1DE6BB89000
heap
page read and write
2194AB1C000
heap
page read and write
496EEFF000
stack
page read and write
2194AB00000
heap
page read and write
2194ADF0000
heap
page read and write
2194AB3F000
heap
page read and write
2194A970000
heap
page read and write
1DE70B89000
heap
page read and write
1DE6ED89000
heap
page read and write
2194AB2A000
heap
page read and write
2194AB08000
heap
page read and write
1DE6D989000
heap
page read and write
1DE6F789000
heap
page read and write
2194AB35000
heap
page read and write
There are 26 hidden memdumps, click here to show them.