IOC Report
jsv.js

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\jsv.js"
malicious

URLs

Name
IP
Malicious
https://google.com
unknown
https://aadcdn.msftauth.net/shared/1.0/content/images/appbackgrounds/49_6ffe0a92d779c878835b40171ffc
unknown
https://softwarereviews.s3.amazonaws.com/production/favicons/offerings/3117/original/Sharepoint_icon
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
162F9C6E000
heap
page read and write
162F9C60000
heap
page read and write
162F9F40000
heap
page read and write
162F9D28000
heap
page read and write
162F9CBB000
heap
page read and write
162FB650000
heap
page read and write
162F9D30000
heap
page read and write
162F9D28000
heap
page read and write
162FBBA5000
heap
page read and write
162F9D28000
heap
page read and write
162F9C30000
heap
page read and write
162F9C59000
heap
page read and write
162F9D2C000
heap
page read and write
162F9C71000
heap
page read and write
313EAFE000
stack
page read and write
162F9F45000
heap
page read and write
313EDFF000
stack
page read and write
162FB9D0000
heap
page read and write
162F9B40000
heap
page read and write
162F9CAF000
heap
page read and write
162FBBBF000
heap
page read and write
162FBB9E000
heap
page read and write
313EFFE000
stack
page read and write
162FB9DB000
heap
page read and write
313EEFE000
stack
page read and write
162FB9D2000
heap
page read and write
162F9D50000
heap
page read and write
162FBBA5000
heap
page read and write
313EBFE000
stack
page read and write
162FBB9E000
heap
page read and write
162FB9F0000
heap
page read and write
162F9C5A000
heap
page read and write
162FBB71000
heap
page read and write
162FBBA5000
heap
page read and write
162FB9EF000
heap
page read and write
162FBB41000
heap
page read and write
162F9CFA000
heap
page read and write
162FD490000
trusted library allocation
page read and write
162F9C60000
heap
page read and write
162FD370000
heap
page read and write
162F9C70000
heap
page read and write
162F9C52000
heap
page read and write
162F9D2C000
heap
page read and write
162FB654000
heap
page read and write
162F9C4D000
heap
page read and write
162F9D2C000
heap
page read and write
162F9CAF000
heap
page read and write
162FB9D9000
heap
page read and write
162F9C5F000
heap
page read and write
162F9CAF000
heap
page read and write
313E73A000
stack
page read and write
162FB9D1000
heap
page read and write
162FBBA5000
heap
page read and write
162F9C52000
heap
page read and write
162FBAE0000
heap
page read and write
162FB9EF000
heap
page read and write
162F9D29000
heap
page read and write
162F9D2C000
heap
page read and write
162FBB42000
heap
page read and write
162FB9D8000
heap
page read and write
162F9D2C000
heap
page read and write
313F0FF000
stack
page read and write
162FBAE1000
heap
page read and write
162FB9EF000
heap
page read and write
162FBB9E000
heap
page read and write
162FB9D6000
heap
page read and write
There are 56 hidden memdumps, click here to show them.