IOC Report
untrippingvT.ps1

loading gif

Files

File Path
Type
Category
Malicious
untrippingvT.ps1
ASCII text, with very long lines (4140), with CRLF line terminators
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_powershell.exe_a9c567789ad651e7b48413341b6e7a9ac98a27_e3b0f337_1beaffd2-f887-4017-9219-fc6a734818ee\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER78.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF8E5.tmp.dmp
Mini DuMP crash report, 16 streams, Tue Dec 3 08:17:04 2024, 0x1205a4 type
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_25ooazca.h2o.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_untyfegk.l5d.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDesusertions\590aee7bdd69b59b.customDesusertions-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDesusertions\K0FYLYR2YR7A6TG274FK.temp
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\untrippingvT.ps1"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7648 -s 1976

URLs

Name
IP
Malicious
https://www.italialife24.it/wp-content/uploads/2021/05/hypervitalizationVA.exe
46.254.34.201
malicious
https://www.italialife24.it
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://crl.micro
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://oneget.orgX
unknown
http://upx.sf.net
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
https://oneget.org
unknown
http://italialife24.it
unknown
http://www.italialife24.it
unknown
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
italialife24.it
46.254.34.201
malicious
s-part-0035.t-0009.t-msedge.net
13.107.246.63
www.italialife24.it
unknown

IPs

IP
Domain
Country
Malicious
46.254.34.201
italialife24.it
Italy
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
\REGISTRY\A\{e9e19b6c-b97f-967c-68ae-bc6f0bfb30e2}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
ProgramId
\REGISTRY\A\{e9e19b6c-b97f-967c-68ae-bc6f0bfb30e2}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
FileId
\REGISTRY\A\{e9e19b6c-b97f-967c-68ae-bc6f0bfb30e2}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
LowerCaseLongPath
\REGISTRY\A\{e9e19b6c-b97f-967c-68ae-bc6f0bfb30e2}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
LongPathHash
\REGISTRY\A\{e9e19b6c-b97f-967c-68ae-bc6f0bfb30e2}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Name
\REGISTRY\A\{e9e19b6c-b97f-967c-68ae-bc6f0bfb30e2}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
OriginalFileName
\REGISTRY\A\{e9e19b6c-b97f-967c-68ae-bc6f0bfb30e2}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Publisher
\REGISTRY\A\{e9e19b6c-b97f-967c-68ae-bc6f0bfb30e2}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Version
\REGISTRY\A\{e9e19b6c-b97f-967c-68ae-bc6f0bfb30e2}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
BinFileVersion
\REGISTRY\A\{e9e19b6c-b97f-967c-68ae-bc6f0bfb30e2}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
BinaryType
\REGISTRY\A\{e9e19b6c-b97f-967c-68ae-bc6f0bfb30e2}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
ProductName
\REGISTRY\A\{e9e19b6c-b97f-967c-68ae-bc6f0bfb30e2}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
ProductVersion
\REGISTRY\A\{e9e19b6c-b97f-967c-68ae-bc6f0bfb30e2}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
LinkDate
\REGISTRY\A\{e9e19b6c-b97f-967c-68ae-bc6f0bfb30e2}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
BinProductVersion
\REGISTRY\A\{e9e19b6c-b97f-967c-68ae-bc6f0bfb30e2}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
AppxPackageFullName
\REGISTRY\A\{e9e19b6c-b97f-967c-68ae-bc6f0bfb30e2}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
AppxPackageRelativeId
\REGISTRY\A\{e9e19b6c-b97f-967c-68ae-bc6f0bfb30e2}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Size
\REGISTRY\A\{e9e19b6c-b97f-967c-68ae-bc6f0bfb30e2}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Language
\REGISTRY\A\{e9e19b6c-b97f-967c-68ae-bc6f0bfb30e2}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
IsOsComponent
\REGISTRY\A\{e9e19b6c-b97f-967c-68ae-bc6f0bfb30e2}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Usn
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF887E50000
trusted library allocation
page read and write
1F9CF113000
trusted library allocation
page read and write
1F9CB8A0000
heap
page read and write
1F9DD7B1000
trusted library allocation
page read and write
1F9CB91D000
heap
page read and write
5033579000
stack
page read and write
7FF887F00000
trusted library allocation
page read and write
7FF887E10000
trusted library allocation
page read and write
1F9E5B50000
heap
page read and write
503460F000
stack
page read and write
1F9E5AC0000
trusted library allocation
page read and write
7FF887EF0000
trusted library allocation
page read and write
1F9CB740000
heap
page read and write
7FF887C13000
trusted library allocation
page execute and read and write
7FF887E90000
trusted library allocation
page read and write
503337B000
stack
page read and write
1F9CB954000
heap
page read and write
1F9CB995000
heap
page read and write
1F9CD220000
trusted library allocation
page read and write
1F9CD210000
heap
page readonly
1F9E5B71000
heap
page read and write
1F9CB968000
heap
page read and write
503387E000
stack
page read and write
7FF887E70000
trusted library allocation
page read and write
7FF887C1D000
trusted library allocation
page execute and read and write
5034303000
stack
page read and write
1F9CD380000
heap
page execute and read and write
1F9CD250000
heap
page read and write
50343CD000
stack
page read and write
503347E000
stack
page read and write
1F9CDBAE000
trusted library allocation
page read and write
1F9CE2FE000
trusted library allocation
page read and write
503450C000
stack
page read and write
7FF887E60000
trusted library allocation
page read and write
1F9E5900000
heap
page read and write
503377E000
stack
page read and write
7FF887C14000
trusted library allocation
page read and write
7FF887DCA000
trusted library allocation
page read and write
7FF887F20000
trusted library allocation
page read and write
1F9DD823000
trusted library allocation
page read and write
7FF887F30000
trusted library allocation
page read and write
1F9CD2C5000
heap
page read and write
7FF887FA0000
trusted library allocation
page read and write
503327E000
stack
page read and write
1F9E598E000
heap
page read and write
1F9E5C0E000
heap
page read and write
1F9CF3EF000
trusted library allocation
page read and write
7FF887CF6000
trusted library allocation
page execute and read and write
1F9E5C28000
heap
page read and write
50337FF000
stack
page read and write
50338FB000
stack
page read and write
1F9CF16D000
trusted library allocation
page read and write
7FF887DF2000
trusted library allocation
page read and write
1F9E5BAF000
heap
page read and write
1F9CEE56000
trusted library allocation
page read and write
50336F8000
stack
page read and write
1F9CEE73000
trusted library allocation
page read and write
50335F7000
stack
page read and write
1F9CEE68000
trusted library allocation
page read and write
7FF887DF7000
trusted library allocation
page read and write
7FF887F50000
trusted library allocation
page read and write
1F9E5B47000
heap
page execute and read and write
5032EB5000
stack
page read and write
1F9CB950000
heap
page read and write
7FF887EE0000
trusted library allocation
page read and write
1F9CB94E000
heap
page read and write
1F9CD460000
heap
page read and write
7FF887F40000
trusted library allocation
page read and write
7FF887C20000
trusted library allocation
page read and write
7FF887CC0000
trusted library allocation
page read and write
7FF887C12000
trusted library allocation
page read and write
1F9E5BBE000
heap
page read and write
1F9CDBA1000
trusted library allocation
page read and write
7FF887ED0000
trusted library allocation
page read and write
1F9CD2C0000
heap
page read and write
1F9E59E0000
heap
page read and write
1F9CD403000
trusted library allocation
page read and write
1F9E5941000
heap
page read and write
1F9CDBC6000
trusted library allocation
page read and write
1F9CD2D0000
trusted library allocation
page read and write
5032FFE000
stack
page read and write
1F9CEE86000
trusted library allocation
page read and write
1F9CEE5A000
trusted library allocation
page read and write
1F9E58C0000
heap
page read and write
1F9E5AD0000
trusted library allocation
page read and write
7FF887C10000
trusted library allocation
page read and write
7FF887F60000
trusted library allocation
page read and write
1F9CECFE000
trusted library allocation
page read and write
1F9E57B7000
heap
page read and write
7FF887F54000
trusted library allocation
page read and write
1F9E5997000
heap
page read and write
503434F000
stack
page read and write
5032FBE000
stack
page read and write
7FF887DFA000
trusted library allocation
page read and write
1F9DDA9E000
trusted library allocation
page read and write
503367C000
stack
page read and write
1F9E5C67000
heap
page read and write
1F9CBA30000
heap
page read and write
7FF887E40000
trusted library allocation
page read and write
1F9E5C31000
heap
page read and write
7FF887F70000
trusted library allocation
page read and write
1F9E5B85000
heap
page read and write
50332FD000
stack
page read and write
1F9CB990000
heap
page read and write
1F9CEE82000
trusted library allocation
page read and write
1F9CB820000
heap
page read and write
1F9CF0E8000
trusted library allocation
page read and write
7DF49EC40000
trusted library allocation
page execute and read and write
7FF887DD0000
trusted library allocation
page execute and read and write
7FF887E30000
trusted library allocation
page read and write
1F9E5C9E000
heap
page read and write
7FF887CC6000
trusted library allocation
page read and write
1F9CD1E0000
trusted library section
page read and write
7FF887DE0000
trusted library allocation
page execute and read and write
7FF887E20000
trusted library allocation
page read and write
1F9CD450000
direct allocation
page execute and read and write
1F9DD99B000
trusted library allocation
page read and write
7FF887DF5000
trusted library allocation
page read and write
1F9E5B6C000
heap
page read and write
1F9CEE96000
trusted library allocation
page read and write
1F9CF4B8000
trusted library allocation
page read and write
1F9CDB94000
trusted library allocation
page read and write
1F9E5B81000
heap
page read and write
1F9CD7B1000
trusted library allocation
page read and write
1F9E5B89000
heap
page read and write
503458B000
stack
page read and write
7FF887CCC000
trusted library allocation
page execute and read and write
1F9CB948000
heap
page read and write
1F9CD200000
trusted library allocation
page read and write
1F9DDAAD000
trusted library allocation
page read and write
1F9CBA35000
heap
page read and write
1F9E5CA1000
heap
page read and write
50333FE000
stack
page read and write
1F9CD400000
trusted library allocation
page read and write
1F9CD360000
heap
page execute and read and write
7FF887E00000
trusted library allocation
page execute and read and write
503397B000
stack
page read and write
7FF887E80000
trusted library allocation
page read and write
1F9CB8A8000
heap
page read and write
7FF887C2B000
trusted library allocation
page read and write
1F9E5B75000
heap
page read and write
1F9CEE88000
trusted library allocation
page read and write
7FF887D30000
trusted library allocation
page execute and read and write
1F9E5C04000
heap
page read and write
1F9CD9D9000
trusted library allocation
page read and write
1F9E5935000
heap
page read and write
503440F000
stack
page read and write
7FF887DC1000
trusted library allocation
page read and write
50334FE000
stack
page read and write
7FF887F90000
trusted library allocation
page read and write
7FF887CD0000
trusted library allocation
page execute and read and write
1F9CB92B000
heap
page read and write
1F9CD1F0000
trusted library section
page read and write
7FF887F10000
trusted library allocation
page read and write
1F9CD838000
trusted library allocation
page read and write
1F9E5932000
heap
page read and write
7FF887EC0000
trusted library allocation
page read and write
1F9CF4B4000
trusted library allocation
page read and write
1F9CBA20000
trusted library allocation
page read and write
1F9CB840000
heap
page read and write
1F9E5B40000
heap
page execute and read and write
7FF887EA0000
trusted library allocation
page read and write
1F9DD7C0000
trusted library allocation
page read and write
7FF887EB0000
trusted library allocation
page read and write
1F9CD300000
trusted library allocation
page read and write
1F9CB8B2000
heap
page read and write
5032F3E000
stack
page read and write
1F9E5C63000
heap
page read and write
7FF887DB0000
trusted library allocation
page read and write
1F9CEE8A000
trusted library allocation
page read and write
7FF887F80000
trusted library allocation
page read and write
1F9CB880000
heap
page read and write
503448F000
stack
page read and write
There are 163 hidden memdumps, click here to show them.