IOC Report
qwgrp.js

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\qwgrp.js"

Memdumps

Base Address
Regiontype
Protect
Malicious
1611931A000
heap
page read and write
20DAD3DD000
heap
page read and write
161193AF000
heap
page read and write
161193B3000
heap
page read and write
19A3FAE2000
heap
page read and write
4E37AFC000
stack
page read and write
2B2C2540000
heap
page read and write
161193A5000
heap
page read and write
19A3FB1C000
heap
page read and write
2D92EC5B000
heap
page read and write
1E9D3302000
heap
page read and write
1E9D325E000
heap
page read and write
16119388000
heap
page read and write
10C37F000
stack
page read and write
20DAF1A2000
heap
page read and write
161188C8000
heap
page read and write
2B2C2702000
heap
page read and write
2B2C3104000
heap
page read and write
20DAD240000
heap
page read and write
2B2C7E00000
heap
page read and write
16119384000
heap
page read and write
1E9D3200000
heap
page read and write
2B2C3002000
heap
page read and write
19A40990000
trusted library allocation
page read and write
2B2C8000000
trusted library allocation
page read and write
BDFD7FF000
stack
page read and write
3DA9C7E000
stack
page read and write
2B2C3102000
heap
page read and write
1611883C000
heap
page read and write
15FBCD40000
heap
page read and write
1611938C000
heap
page read and write
2D92EC3C000
heap
page read and write
20DAD3B3000
heap
page read and write
5FF677B000
stack
page read and write
16119385000
heap
page read and write
1611939D000
heap
page read and write
20DAF1A0000
heap
page read and write
16119318000
heap
page read and write
161193B3000
heap
page read and write
ECADFF000
stack
page read and write
2D92EC02000
heap
page read and write
19A40740000
trusted library allocation
page read and write
2B2C7E4A000
heap
page read and write
3DA9DFF000
stack
page read and write
1973E743000
heap
page read and write
3DAA1F8000
stack
page read and write
4E3774C000
stack
page read and write
1973E725000
heap
page read and write
16118813000
heap
page read and write
2B2C26FE000
heap
page read and write
2D92EB80000
heap
page read and write
16118710000
heap
page read and write
20DAD4D0000
heap
page read and write
2B2C7D84000
trusted library allocation
page read and write
2B2C8060000
trusted library allocation
page read and write
1E9D3A02000
trusted library allocation
page read and write
20DAD3BB000
heap
page read and write
20DAD3E5000
heap
page read and write
20DAD4A0000
heap
page read and write
2B2C2707000
heap
page read and write
2B2C7BA0000
trusted library allocation
page read and write
16119382000
heap
page read and write
161187A0000
trusted library allocation
page read and write
16118871000
heap
page read and write
1E9D328A000
heap
page read and write
2B2C7EF8000
heap
page read and write
1611884F000
heap
page read and write
20DAF1A6000
heap
page read and write
1E9D3280000
heap
page read and write
2B2C8070000
trusted library allocation
page read and write
15D32FB000
stack
page read and write
2B2C8030000
trusted library allocation
page read and write
20DAD3E7000
heap
page read and write
2B2C2725000
heap
page read and write
5FF6A7F000
stack
page read and write
DEE597F000
stack
page read and write
1E9D30B0000
heap
page read and write
16118829000
heap
page read and write
161188EC000
heap
page read and write
20DAD3DD000
heap
page read and write
4E37CF9000
stack
page read and write
16119802000
heap
page read and write
2B2C26A1000
heap
page read and write
2B2C80A0000
remote allocation
page read and write
20DAD3E5000
heap
page read and write
3DAA47A000
stack
page read and write
16119202000
heap
page read and write
2B2C25A0000
heap
page read and write
161190D0000
remote allocation
page read and write
16119821000
heap
page read and write
10BF5F000
stack
page read and write
161193B4000
heap
page read and write
2B2C7C20000
trusted library allocation
page read and write
20DAEE50000
heap
page read and write
2B2C36F0000
trusted library allocation
page read and write
1E9D325F000
heap
page read and write
1973E711000
heap
page read and write
16119802000
heap
page read and write
5FF667E000
stack
page read and write
2B2C7F02000
heap
page read and write
2B2C8010000
trusted library allocation
page read and write
19A406D0000
trusted library allocation
page read and write
1611938A000
heap
page read and write
15FBCD50000
heap
page read and write
161193B0000
heap
page read and write
161193A5000
heap
page read and write
16118770000
heap
page read and write
2B2C7D70000
trusted library allocation
page read and write
2B2C26FE000
heap
page read and write
161193A0000
heap
page read and write
2B2C7E8B000
heap
page read and write
15FBCDB0000
heap
page read and write
1E9D3255000
heap
page read and write
2B2C3015000
heap
page read and write
1611937E000
heap
page read and write
1E9D3213000
heap
page read and write
2B2C3118000
heap
page read and write
2B2C3BA0000
trusted library allocation
page read and write
DEE56FB000
stack
page read and write
3DAA37A000
stack
page read and write
2D92EC61000
heap
page read and write
1973E732000
heap
page read and write
2B2C267C000
heap
page read and write
16119393000
heap
page read and write
15FBD802000
trusted library allocation
page read and write
1611938A000
heap
page read and write
2B2C7D70000
trusted library allocation
page read and write
2D92EC66000
heap
page read and write
2B2C7D80000
trusted library allocation
page read and write
2B2C2696000
heap
page read and write
3DA9FF7000
stack
page read and write
3DAA0FE000
stack
page read and write
1973E745000
heap
page read and write
2D92ED00000
heap
page read and write
19A3FD70000
trusted library allocation
page read and write
20DAD3DD000
heap
page read and write
DEE5877000
stack
page read and write
161193C0000
heap
page read and write
2D92EC00000
heap
page read and write
15FBCE62000
heap
page read and write
1E9D3300000
heap
page read and write
1973E743000
heap
page read and write
3DA9D7C000
stack
page read and write
2B2C7EF2000
heap
page read and write
10C3F9000
stack
page read and write
5FF635C000
stack
page read and write
2B2C3B93000
trusted library allocation
page read and write
BDFD17A000
stack
page read and write
2B2C7E30000
heap
page read and write
2B2C7E24000
heap
page read and write
4E37B79000
stack
page read and write
1E9D30C0000
heap
page read and write
15FBCE3C000
heap
page read and write
16119370000
heap
page read and write
2B2C7EA6000
heap
page read and write
2D92EC7F000
heap
page read and write
16119802000
heap
page read and write
16118700000
heap
page read and write
20DB0AF0000
trusted library allocation
page read and write
161193A9000
heap
page read and write
16119388000
heap
page read and write
2B2C8190000
trusted library allocation
page read and write
1973E72E000
heap
page read and write
20DAD3E6000
heap
page read and write
2B2C7D50000
trusted library allocation
page read and write
16119800000
heap
page read and write
15FBCE00000
heap
page read and write
1611884B000
heap
page read and write
16119370000
heap
page read and write
20DAD3A7000
heap
page read and write
20DAD3DD000
heap
page read and write
20DAD380000
heap
page read and write
15FBCE55000
heap
page read and write
2B2C25D0000
trusted library allocation
page read and write
16118853000
heap
page read and write
16119387000
heap
page read and write
16118858000
heap
page read and write
2B2C2629000
heap
page read and write
16119382000
heap
page read and write
2B2C80A0000
remote allocation
page read and write
161188EC000
heap
page read and write
15FBCDE0000
trusted library allocation
page read and write
2B2C7E16000
heap
page read and write
19A3FB1E000
heap
page read and write
1E9D39C0000
trusted library allocation
page read and write
2B2C3113000
heap
page read and write
19A409B0000
trusted library allocation
page read and write
1611938E000
heap
page read and write
BDFD47B000
stack
page read and write
10BFDE000
stack
page read and write
1E9D3261000
heap
page read and write
15D31FE000
stack
page read and write
15FBCE63000
heap
page read and write
2D92ED02000
heap
page read and write
1611937E000
heap
page read and write
20DAEE54000
heap
page read and write
2B2C3118000
heap
page read and write
1973E743000
heap
page read and write
16119821000
heap
page read and write
2B2C81D0000
trusted library allocation
page read and write
2B2C2678000
heap
page read and write
1611938A000
heap
page read and write
2D92ED08000
heap
page read and write
2B2C3B71000
trusted library allocation
page read and write
2B2C7C30000
trusted library allocation
page read and write
DEE51AC000
stack
page read and write
16119389000
heap
page read and write
3DA99EE000
stack
page read and write
ECA9FD000
stack
page read and write
1973E724000
heap
page read and write
1973E72E000
heap
page read and write
16119802000
heap
page read and write
16119382000
heap
page read and write
16119802000
heap
page read and write
20DAD3A6000
heap
page read and write
4E37BFE000
stack
page read and write
2B2C2702000
heap
page read and write
16118854000
heap
page read and write
20DAD3ED000
heap
page read and write
2D92ED13000
heap
page read and write
20DAD39D000
heap
page read and write
16119395000
heap
page read and write
1611939F000
heap
page read and write
20DAD3B9000
heap
page read and write
15D30FB000
stack
page read and write
10C2F9000
stack
page read and write
16118800000
heap
page read and write
16118908000
heap
page read and write
15D2ABC000
stack
page read and write
2B2C2600000
heap
page read and write
20DAD392000
heap
page read and write
1611938C000
heap
page read and write
1973E740000
heap
page read and write
1973E716000
heap
page read and write
2B2C7D80000
trusted library allocation
page read and write
161188E4000
heap
page read and write
ECACFF000
stack
page read and write
BDFCEF7000
stack
page read and write
1973E741000
heap
page read and write
19A3FB1C000
heap
page read and write
2B2C7EFC000
heap
page read and write
161188B3000
heap
page read and write
20DAD388000
heap
page read and write
5FF687B000
stack
page read and write
2D92F490000
trusted library allocation
page read and write
16119323000
heap
page read and write
19A409C0000
trusted library allocation
page read and write
2B2C7BB0000
trusted library allocation
page read and write
2B2C8050000
trusted library allocation
page read and write
DEE54FD000
stack
page read and write
19A406E0000
trusted library allocation
page read and write
2B2C2613000
heap
page read and write
2B2C80A0000
remote allocation
page read and write
15FBCE7A000
heap
page read and write
20DAD4D5000
heap
page read and write
161190D0000
remote allocation
page read and write
1611938C000
heap
page read and write
1E9D3265000
heap
page read and write
1973E6C5000
heap
page read and write
20DAD3E5000
heap
page read and write
161193A9000
heap
page read and write
1973E72E000
heap
page read and write
161193AF000
heap
page read and write
16119353000
heap
page read and write
16119844000
heap
page read and write
20DAD400000
heap
page read and write
161188D7000
heap
page read and write
2B2C800E000
trusted library allocation
page read and write
1E9D323C000
heap
page read and write
16119393000
heap
page read and write
2B2C7D40000
trusted library allocation
page read and write
2B2C8008000
trusted library allocation
page read and write
19A3FB3A000
heap
page read and write
BDFCB3B000
stack
page read and write
15FBCE29000
heap
page read and write
1611939D000
heap
page read and write
15FBCF02000
heap
page read and write
2B2C9000000
heap
page read and write
2D92EBF0000
heap
page read and write
2B2C3158000
heap
page read and write
19A3FB1C000
heap
page read and write
20DAD408000
heap
page read and write
19A3FA60000
heap
page read and write
2B2C7E58000
heap
page read and write
19A3FAD0000
heap
page read and write
2B2C3B90000
trusted library allocation
page read and write
BDFDB7F000
stack
page read and write
1973E722000
heap
page read and write
19A40750000
trusted library allocation
page read and write
1E9D3269000
heap
page read and write
19A3FD69000
heap
page read and write
5FF6977000
stack
page read and write
20DAD3CD000
heap
page read and write
161193CE000
heap
page read and write
ECAEFF000
stack
page read and write
1973E716000
heap
page read and write
19A3F900000
heap
page read and write
3DA996C000
stack
page read and write
15FBCF00000
heap
page read and write
2B2C8080000
trusted library allocation
page read and write
20DAD3A9000
heap
page read and write
2B2C2673000
heap
page read and write
2D92EC55000
heap
page read and write
16119398000
heap
page read and write
2B2C268C000
heap
page read and write
161193A9000
heap
page read and write
ECAFFE000
stack
page read and write
2D92EC13000
heap
page read and write
19A3FA40000
heap
page read and write
20DAD398000
heap
page read and write
2B2C8021000
trusted library allocation
page read and write
DEE547E000
stack
page read and write
5FF6B7F000
stack
page read and write
16119300000
heap
page read and write
16118902000
heap
page read and write
1611938C000
heap
page read and write
1E9D3262000
heap
page read and write
2B2C8010000
trusted library allocation
page read and write
19A3FB14000
heap
page read and write
1973E690000
heap
page read and write
15FBCE13000
heap
page read and write
16118883000
heap
page read and write
161193C8000
heap
page read and write
1E9D3308000
heap
page read and write
2B2C26A9000
heap
page read and write
3DAA27E000
unkown
page read and write
16119374000
heap
page read and write
2B2C3100000
heap
page read and write
161188FA000
heap
page read and write
DEE5A7C000
stack
page read and write
16119802000
heap
page read and write
20DAD3CC000
heap
page read and write
2B2C7E3E000
heap
page read and write
19A40A10000
trusted library allocation
page read and write
19A3FD65000
heap
page read and write
1973E726000
heap
page read and write
1973E743000
heap
page read and write
161193B6000
heap
page read and write
BDFD27F000
stack
page read and write
16118913000
heap
page read and write
3DA9EF7000
stack
page read and write
19A409A0000
heap
page readonly
BDFD07A000
stack
page read and write
20DAD3B2000
heap
page read and write
20DAD3DD000
heap
page read and write
161188A8000
heap
page read and write
ECABFF000
stack
page read and write
DEE5B7F000
stack
page read and write
16119382000
heap
page read and write
161193B4000
heap
page read and write
DEE577E000
stack
page read and write
16119379000
heap
page read and write
BDFD97A000
stack
page read and write
20DAD3E1000
heap
page read and write
1973E670000
heap
page read and write
2B2C7D50000
trusted library allocation
page read and write
20DAD480000
heap
page read and write
161190D0000
remote allocation
page read and write
20DAD3E5000
heap
page read and write
1973E70B000
heap
page read and write
1E9D325C000
heap
page read and write
5FF63DE000
stack
page read and write
19A3FB36000
heap
page read and write
10BEDA000
stack
page read and write
2B2C7EA4000
heap
page read and write
16118916000
heap
page read and write
2B2C3000000
heap
page read and write
15FBCE02000
heap
page read and write
1E9D322A000
heap
page read and write
2B2C2530000
heap
page read and write
161188A9000
heap
page read and write
2B2C2658000
heap
page read and write
1611937C000
heap
page read and write
10C27E000
stack
page read and write
ECA8FE000
stack
page read and write
1973E700000
heap
page read and write
16119381000
heap
page read and write
DEE55FC000
stack
page read and write
ECA569000
stack
page read and write
161188C1000
heap
page read and write
16119364000
heap
page read and write
20DAD3E1000
heap
page read and write
2D92EB90000
heap
page read and write
15FBCF13000
heap
page read and write
20DAEDF0000
heap
page read and write
20DAD3E1000
heap
page read and write
1973E6C0000
heap
page read and write
2B2C7E64000
heap
page read and write
19A3F910000
trusted library allocation
page read and write
1E9D3313000
heap
page read and write
2B2C8010000
trusted library allocation
page read and write
2B2C2691000
heap
page read and write
16119392000
heap
page read and write
1973E540000
heap
page read and write
1E9D3120000
heap
page read and write
16119388000
heap
page read and write
2B2C8024000
trusted library allocation
page read and write
1611938A000
heap
page read and write
20DAD3E5000
heap
page read and write
2D92F602000
trusted library allocation
page read and write
20DAD3A6000
heap
page read and write
15FBCE6E000
heap
page read and write
16119374000
heap
page read and write
2D92EC29000
heap
page read and write
2B2C2641000
heap
page read and write
BDFD37C000
stack
page read and write
15D2FFB000
stack
page read and write
2D92EC5F000
heap
page read and write
20DAD3E1000
heap
page read and write
2B2C7D40000
trusted library allocation
page read and write
2B2C7EEC000
heap
page read and write
20DAD3E1000
heap
page read and write
161188E9000
heap
page read and write
19A3FD60000
heap
page read and write
There are 404 hidden memdumps, click here to show them.