IOC Report
download.js

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\download.js"
malicious

Domains

Name
IP
Malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45

Memdumps

Base Address
Regiontype
Protect
Malicious
24918B20000
heap
page read and write
24918DD5000
heap
page read and write
24918B1A000
heap
page read and write
FA0B91A000
stack
page read and write
FA0BFFE000
stack
page read and write
FA0BDFE000
stack
page read and write
24918B76000
heap
page read and write
7FFB1E0E1000
unkown
page execute read
2491C0D0000
heap
page read and write
249189A0000
heap
page read and write
24918B76000
heap
page read and write
2491A524000
heap
page read and write
24918B27000
heap
page read and write
24918B26000
heap
page read and write
24918DD0000
heap
page read and write
24918AF7000
heap
page read and write
24918AF0000
heap
page read and write
24918B91000
heap
page read and write
24918B78000
heap
page read and write
24918B47000
heap
page read and write
24918B6D000
heap
page read and write
FA0C2FE000
stack
page read and write
24918B64000
heap
page read and write
24918B6D000
heap
page read and write
24918B12000
heap
page read and write
24918B99000
heap
page read and write
7FFB1E0E0000
unkown
page readonly
24918B30000
heap
page read and write
FA0C0FE000
stack
page read and write
24918B76000
heap
page read and write
24918B76000
heap
page read and write
24918B6A000
heap
page read and write
24918DDC000
heap
page read and write
24918A80000
heap
page read and write
24918B7E000
heap
page read and write
2491C0F0000
trusted library allocation
page read and write
24918B68000
heap
page read and write
24918B66000
heap
page read and write
24918B6D000
heap
page read and write
24918B76000
heap
page read and write
24918B3C000
heap
page read and write
24918B6D000
heap
page read and write
24918B7A000
heap
page read and write
2491A870000
heap
page read and write
7FFB1E102000
unkown
page readonly
24918B69000
heap
page read and write
24918B64000
heap
page read and write
2491A520000
heap
page read and write
7FFB1E0F6000
unkown
page readonly
24918B32000
heap
page read and write
FA0C1FE000
stack
page read and write
24918B12000
heap
page read and write
24918AA0000
heap
page read and write
FA0C3FE000
stack
page read and write
24918B3C000
heap
page read and write
24918B30000
heap
page read and write
24918B0D000
heap
page read and write
24918B6D000
heap
page read and write
24918B6D000
heap
page read and write
24918B51000
heap
page read and write
24918B64000
heap
page read and write
7FFB1E105000
unkown
page readonly
24918B64000
heap
page read and write
24918B6D000
heap
page read and write
24918B76000
heap
page read and write
FA0BCFE000
stack
page read and write
24918B77000
heap
page read and write
7FFB1E100000
unkown
page read and write
24918B1F000
heap
page read and write
24918B76000
heap
page read and write
24918B19000
heap
page read and write
There are 61 hidden memdumps, click here to show them.