🚨 #Alert: Multi-stage payload reflectively loads backdoored TaskScheduler.dll vmray.com/analyses/_vt/4… 🔍 A #JScript file with low detection rates on VT retrieves additional payloads via the Pastebin alternative "paste.ee" and a JPG file hosted on Google Drive.…

vmray's tweet image. 🚨 #Alert: Multi-stage payload reflectively loads backdoored TaskScheduler.dll
vmray.com/analyses/_vt/4…

🔍 A #JScript file with low detection rates on VT retrieves additional payloads via the Pastebin alternative "paste.ee" and a JPG file hosted on Google Drive.…
vmray's tweet image. 🚨 #Alert: Multi-stage payload reflectively loads backdoored TaskScheduler.dll
vmray.com/analyses/_vt/4…

🔍 A #JScript file with low detection rates on VT retrieves additional payloads via the Pastebin alternative "paste.ee" and a JPG file hosted on Google Drive.…
vmray's tweet image. 🚨 #Alert: Multi-stage payload reflectively loads backdoored TaskScheduler.dll
vmray.com/analyses/_vt/4…

🔍 A #JScript file with low detection rates on VT retrieves additional payloads via the Pastebin alternative "paste.ee" and a JPG file hosted on Google Drive.…
vmray's tweet image. 🚨 #Alert: Multi-stage payload reflectively loads backdoored TaskScheduler.dll
vmray.com/analyses/_vt/4…

🔍 A #JScript file with low detection rates on VT retrieves additional payloads via the Pastebin alternative "paste.ee" and a JPG file hosted on Google Drive.…

Find your festive flick! 🎬 Search for holiday classics with this fun Christmas Movie Finder! Explore your favorite Christmas movies, and let the festive magic begin. 👉 What’s your favorite holiday movie? #webdev #jscript #CodingChallenge


Wish this was happening sooner, but looks like disabling #VBScript prevents #Gootloader from running (even though it is coded in #JScript .js) bleepingcomputer.com/news/microsoft…

Gootloader's tweet image. Wish this was happening sooner, but looks like disabling #VBScript prevents #Gootloader from running (even though it is coded in #JScript .js) bleepingcomputer.com/news/microsoft…

OK, people smarter then me, I downloaded my twitter archive, but when I try and open a file, this comes up. How do I fix? #twitter #jscript #help

AmandaJL_80's tweet image. OK, people smarter then me, I downloaded my twitter archive, but when I try and open a file, this comes up. How do I fix? #twitter #jscript #help

I MIGHT BE SLOW, BUT I DON'T STOP MOVING 🐌 One day it will be worthy! #jscript #learning #scrimba #freecodecamp

Vallunateacher's tweet image. I MIGHT BE SLOW, BUT I DON'T STOP MOVING 🐌

One day it will be worthy! #jscript #learning #scrimba #freecodecamp

The pain and time I go through just for a bit of user friendly ajax . Will be going back to php and auto_refresh page soon.. This is bullshit #jscript


Just learning #jscript after php Variables = let variable So iam so going be calling all my variables Let $variable . Having no symbol is just spaghetti when reading through the code


La estandarización no estuvo exenta de desafíos. Microsoft desarrolló su propia versión llamada JScript para competir con Netscape. La falta de una especificación oficial llevó a la necesidad de estandarizar el lenguaje para garantizar la compatibilidad. #JScript #WebStandards


When you fix some #jscript on a form after 2 days.. This shit is crazy .


I think it's high time I took my coding seriously #100dayscoding #python #jscript


Why don't the #jscript errors give the correct line the error is on ? Am I doing it wrong? #Php errors tells me the exact issue and where the issue is.


(3/5)🧪 1996: Microsoft launched JScript IE3 তে Microsoft নিজস্ব version দিল – JScript. তখন শুরু হয় browser war, আর compatibility nightmare! #Microsoft #JScript #WebHistory #3JAJahmd


#PowerShell #JScript JScript初めてまともに触った、、 VBScriptとちがってオブジェクトの代入も"="でイケて いいなと思ったのもつかの間 PowerShellから文字列をobject[]で渡したら Variant()() なジャグ配列になってて発狂しそう.... 普通にString渡したらStringのまま.... わけわからぬ


微软宣布在 Windows 11 中默认启用 JScript9Legacy 脚本引擎替换此前的 #JScript,新版本提供更好的性能和安全性。 JScript 是 IE 3.0 时代的产物,由于还有企业需要使用该引擎,所以微软停用 JScript 的同时发布新版本进行替代,确保特定场景下继续安全可用。 查看全文:ourl.co/109753

landiannews.com

微软在Windows 11中推出新版JScript引擎 提供更好的性能和安全性 – 蓝点网

#系统资讯 微软宣布在 Windows 11 24H2 版中默认启用 JScript9Legacy 脚本引擎替换此前的 JScrip…


(3/5)🧪 1996: Microsoft launched JScript IE3 তে Microsoft নিজস্ব version দিল – JScript. তখন শুরু হয় browser war, আর compatibility nightmare! #Microsoft #JScript #WebHistory #3JAJahmd


Just learning #jscript after php Variables = let variable So iam so going be calling all my variables Let $variable . Having no symbol is just spaghetti when reading through the code


Find your festive flick! 🎬 Search for holiday classics with this fun Christmas Movie Finder! Explore your favorite Christmas movies, and let the festive magic begin. 👉 What’s your favorite holiday movie? #webdev #jscript #CodingChallenge


🚨 #Alert: Multi-stage payload reflectively loads backdoored TaskScheduler.dll vmray.com/analyses/_vt/4… 🔍 A #JScript file with low detection rates on VT retrieves additional payloads via the Pastebin alternative "paste.ee" and a JPG file hosted on Google Drive.…

vmray's tweet image. 🚨 #Alert: Multi-stage payload reflectively loads backdoored TaskScheduler.dll
vmray.com/analyses/_vt/4…

🔍 A #JScript file with low detection rates on VT retrieves additional payloads via the Pastebin alternative "paste.ee" and a JPG file hosted on Google Drive.…
vmray's tweet image. 🚨 #Alert: Multi-stage payload reflectively loads backdoored TaskScheduler.dll
vmray.com/analyses/_vt/4…

🔍 A #JScript file with low detection rates on VT retrieves additional payloads via the Pastebin alternative "paste.ee" and a JPG file hosted on Google Drive.…
vmray's tweet image. 🚨 #Alert: Multi-stage payload reflectively loads backdoored TaskScheduler.dll
vmray.com/analyses/_vt/4…

🔍 A #JScript file with low detection rates on VT retrieves additional payloads via the Pastebin alternative "paste.ee" and a JPG file hosted on Google Drive.…
vmray's tweet image. 🚨 #Alert: Multi-stage payload reflectively loads backdoored TaskScheduler.dll
vmray.com/analyses/_vt/4…

🔍 A #JScript file with low detection rates on VT retrieves additional payloads via the Pastebin alternative "paste.ee" and a JPG file hosted on Google Drive.…

Con #JScript no pudieron, pero con #TypeScript nos la han metido bien doblada estos de #Microsoft. Parece pensado para 1) desarrollar en #JavaScript por gente que le jode cómo funciona JavaScript; 2) privatizar un estándar haciéndose el guay … #DeveloperThinks


Is there a framework that just allows you to change one word and your submit form becomes an edit form as well? Allowing users to edit data is creating 80% more code . #php #laravel #jscript


Is there a framework that just allows you to change one word and your submit form becomes an edit form as well? Allowing users to edit data is creating 80% more code . #php #laravel #jscript


Why don't the #jscript errors give the correct line the error is on ? Am I doing it wrong? #Php errors tells me the exact issue and where the issue is.


The pain and time I go through just for a bit of user friendly ajax . Will be going back to php and auto_refresh page soon.. This is bullshit #jscript


#PE -> #mshta (/update.drp.su/mustang/tools/run.hta) -> moves window to (-50000, 0), redirects to (/mustang/main.html). It includes ./main.js (#JScript) -> #bitsadmin ( /download.drp.su/soft/ + window.lang === 'ru' ? 'AvastAntivirusB.exe' : 'AvastAntivirusWorldwideE.exe')

DissectMalware's tweet image. #PE -> #mshta (/update.drp.su/mustang/tools/run.hta) -> moves window to (-50000, 0), redirects to (/mustang/main.html). It includes  ./main.js (#JScript) -> #bitsadmin (
/download.drp.su/soft/ + 
window.lang === 'ru' ? 'AvastAntivirusB.exe' : 'AvastAntivirusWorldwideE.exe')
DissectMalware's tweet image. #PE -> #mshta (/update.drp.su/mustang/tools/run.hta) -> moves window to (-50000, 0), redirects to (/mustang/main.html). It includes  ./main.js (#JScript) -> #bitsadmin (
/download.drp.su/soft/ + 
window.lang === 'ru' ? 'AvastAntivirusB.exe' : 'AvastAntivirusWorldwideE.exe')
DissectMalware's tweet image. #PE -> #mshta (/update.drp.su/mustang/tools/run.hta) -> moves window to (-50000, 0), redirects to (/mustang/main.html). It includes  ./main.js (#JScript) -> #bitsadmin (
/download.drp.su/soft/ + 
window.lang === 'ru' ? 'AvastAntivirusB.exe' : 'AvastAntivirusWorldwideE.exe')

CreateTextFile()で開いたファイルに文字列を書き込もうとしたら、書き込むデータによってはWrite()で例外がでる場合がある。 書き出せない文字とかあるんだろうか… #WSH #JScript

emurenMRz's tweet image. CreateTextFile()で開いたファイルに文字列を書き込もうとしたら、書き込むデータによってはWrite()で例外がでる場合がある。
書き出せない文字とかあるんだろうか…
#WSH #JScript

IE11のflex周りのバグのせいで、もう完全にお手上げ状態…orz Micorosoft Edgeでは、ActiveXコントロールは非対応みたい。 #IE11 #WScript #Jscript #WSH #DOM #HTML #WEBBOT #cscript #Edge #Microsoft #マイクロソフト #Windows #Windows10

_pikka_'s tweet image. IE11のflex周りのバグのせいで、もう完全にお手上げ状態…orz
Micorosoft Edgeでは、ActiveXコントロールは非対応みたい。
#IE11 #WScript #Jscript #WSH #DOM #HTML #WEBBOT #cscript #Edge #Microsoft #マイクロソフト #Windows #Windows10
_pikka_'s tweet image. IE11のflex周りのバグのせいで、もう完全にお手上げ状態…orz
Micorosoft Edgeでは、ActiveXコントロールは非対応みたい。
#IE11 #WScript #Jscript #WSH #DOM #HTML #WEBBOT #cscript #Edge #Microsoft #マイクロソフト #Windows #Windows10
_pikka_'s tweet image. IE11のflex周りのバグのせいで、もう完全にお手上げ状態…orz
Micorosoft Edgeでは、ActiveXコントロールは非対応みたい。
#IE11 #WScript #Jscript #WSH #DOM #HTML #WEBBOT #cscript #Edge #Microsoft #マイクロソフト #Windows #Windows10

Interesting #malicious #JScript kills processes listed by a remote server, and then dels them from filesystem. Next, it dls the malware(s) specified by the remote server. Then, it uses #regsrv32 to register a bunch of #dll including a #dll on a REMOTE server (unavailable)!

DissectMalware's tweet image. Interesting #malicious #JScript kills processes listed by a remote server, and then dels them from filesystem. Next, it dls the malware(s) specified by the remote server. Then, it uses #regsrv32 to register a bunch of #dll including a #dll on a REMOTE server (unavailable)!

🚨 #Alert: Multi-stage payload reflectively loads backdoored TaskScheduler.dll vmray.com/analyses/_vt/4… 🔍 A #JScript file with low detection rates on VT retrieves additional payloads via the Pastebin alternative "paste.ee" and a JPG file hosted on Google Drive.…

vmray's tweet image. 🚨 #Alert: Multi-stage payload reflectively loads backdoored TaskScheduler.dll
vmray.com/analyses/_vt/4…

🔍 A #JScript file with low detection rates on VT retrieves additional payloads via the Pastebin alternative "paste.ee" and a JPG file hosted on Google Drive.…
vmray's tweet image. 🚨 #Alert: Multi-stage payload reflectively loads backdoored TaskScheduler.dll
vmray.com/analyses/_vt/4…

🔍 A #JScript file with low detection rates on VT retrieves additional payloads via the Pastebin alternative "paste.ee" and a JPG file hosted on Google Drive.…
vmray's tweet image. 🚨 #Alert: Multi-stage payload reflectively loads backdoored TaskScheduler.dll
vmray.com/analyses/_vt/4…

🔍 A #JScript file with low detection rates on VT retrieves additional payloads via the Pastebin alternative "paste.ee" and a JPG file hosted on Google Drive.…
vmray's tweet image. 🚨 #Alert: Multi-stage payload reflectively loads backdoored TaskScheduler.dll
vmray.com/analyses/_vt/4…

🔍 A #JScript file with low detection rates on VT retrieves additional payloads via the Pastebin alternative "paste.ee" and a JPG file hosted on Google Drive.…

Interesting #xsl file: #JScript contains #base64 encoded #MSBuild #project #xml (docs.microsoft.com/en-us/aspnet/w…) Project.UsingTask.Task.Code element contains #csharp -> injects code into #certutil & runs it via a new thread virustotal.com/#/file/346e53f… @InQuest

DissectMalware's tweet image. Interesting #xsl file: #JScript contains #base64 encoded #MSBuild #project #xml (docs.microsoft.com/en-us/aspnet/w…)

Project.UsingTask.Task.Code element contains #csharp -> injects code into #certutil & runs it via a new thread

virustotal.com/#/file/346e53f…

@InQuest
DissectMalware's tweet image. Interesting #xsl file: #JScript contains #base64 encoded #MSBuild #project #xml (docs.microsoft.com/en-us/aspnet/w…)

Project.UsingTask.Task.Code element contains #csharp -> injects code into #certutil & runs it via a new thread

virustotal.com/#/file/346e53f…

@InQuest
DissectMalware's tweet image. Interesting #xsl file: #JScript contains #base64 encoded #MSBuild #project #xml (docs.microsoft.com/en-us/aspnet/w…)

Project.UsingTask.Task.Code element contains #csharp -> injects code into #certutil & runs it via a new thread

virustotal.com/#/file/346e53f…

@InQuest

#JScript / #VBScript : 指定したフォルダ内のフォルダ毎の使用済みサイズを読める範囲でレポートする logicalerror.seesaa.net/article/473829… #js #vbs #wsh #cscript #管理者権限

sworc's tweet image. #JScript / #VBScript : 指定したフォルダ内のフォルダ毎の使用済みサイズを読める範囲でレポートする logicalerror.seesaa.net/article/473829… 

#js #vbs #wsh #cscript #管理者権限

Stumbled upon version 1 of what I called #jscript.phantom: app.any.run/tasks/66963a06… c2 is: http://176.107.180[.]243/J2nk8OsPRs/ files: transfer.sh/BBrll/phantom1… related: previous #snort / #suricata rules fired off nicely.

James_inthe_box's tweet image. Stumbled upon version 1 of what I called #jscript.phantom:

app.any.run/tasks/66963a06…

c2 is:
http://176.107.180[.]243/J2nk8OsPRs/

files:
transfer.sh/BBrll/phantom1…

related:


previous #snort / #suricata rules fired off nicely.
James_inthe_box's tweet image. Stumbled upon version 1 of what I called #jscript.phantom:

app.any.run/tasks/66963a06…

c2 is:
http://176.107.180[.]243/J2nk8OsPRs/

files:
transfer.sh/BBrll/phantom1…

related:


previous #snort / #suricata rules fired off nicely.
James_inthe_box's tweet image. Stumbled upon version 1 of what I called #jscript.phantom:

app.any.run/tasks/66963a06…

c2 is:
http://176.107.180[.]243/J2nk8OsPRs/

files:
transfer.sh/BBrll/phantom1…

related:


previous #snort / #suricata rules fired off nicely.

So this is version 2 of the same thing (version 1.2) from: hybrid-analysis.com/sample/4d522c1… I'm calling this jscript.phantom from ver 1.2, since it caught my eye :D #snort / #suricata sig here: pastebin.com/xcm09Cyx all files here transfer.sh/S3XH1/_files.7z

James_inthe_box's tweet image. So this is version 2 of the same thing (version 1.2) from:

hybrid-analysis.com/sample/4d522c1…

I'm calling this jscript.phantom from ver 1.2, since it caught my eye :D

#snort / #suricata sig here:
pastebin.com/xcm09Cyx

all files here
transfer.sh/S3XH1/_files.7z


#interesting #JScript connects to a C2 (/pnl-01start.com/). It only accepts requests that have x-auth header with value #padrao). The script dls two #PE ( #CERTMGR and #malware) #deobfuscated script: pastebin.com/XiAaxLip hybrid-analysis.com/sample/5ff0529… hybrid-analysis.com/sample/515ef25…

DissectMalware's tweet image. #interesting #JScript connects to a C2 (/pnl-01start.com/). It only accepts requests that have x-auth header with value #padrao). The script dls two #PE ( #CERTMGR and #malware)
#deobfuscated script: pastebin.com/XiAaxLip

hybrid-analysis.com/sample/5ff0529…

hybrid-analysis.com/sample/515ef25…
DissectMalware's tweet image. #interesting #JScript connects to a C2 (/pnl-01start.com/). It only accepts requests that have x-auth header with value #padrao). The script dls two #PE ( #CERTMGR and #malware)
#deobfuscated script: pastebin.com/XiAaxLip

hybrid-analysis.com/sample/5ff0529…

hybrid-analysis.com/sample/515ef25…
DissectMalware's tweet image. #interesting #JScript connects to a C2 (/pnl-01start.com/). It only accepts requests that have x-auth header with value #padrao). The script dls two #PE ( #CERTMGR and #malware)
#deobfuscated script: pastebin.com/XiAaxLip

hybrid-analysis.com/sample/5ff0529…

hybrid-analysis.com/sample/515ef25…

JScript : Excel の新しいブックのデフォルトのシートのセルに直接値をセットして、オートフィルを Range オブジェクトから実行する logicalerror.seesaa.net/article/478636… #jscript #excel #range #autofill #WSH

sworc's tweet image. JScript : Excel の新しいブックのデフォルトのシートのセルに直接値をセットして、オートフィルを Range オブジェクトから実行する logicalerror.seesaa.net/article/478636… 

#jscript #excel #range #autofill #WSH

Loading...

Something went wrong.


Something went wrong.


United States Trends