IOC Report
lzsVg6vGuu.ps1

loading gif

Files

File Path
Type
Category
Malicious
lzsVg6vGuu.ps1
ASCII text, with very long lines (65529)
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kjux4bn4.0o0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uvq4xlyl.e44.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\B5GHTFVJH0N36ICQZ8FQ.temp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\lzsVg6vGuu.ps1"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
vecotr.viewdns.net
malicious
http://nuget.org/NuGet.exe
unknown
https://aka.ms/pscore68
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://github.com/Pester/Pester
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
vecotr.viewdns.net
191.96.207.180
malicious

IPs

IP
Domain
Country
Malicious
191.96.207.180
vecotr.viewdns.net
Chile
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2F51000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
1EF4DE18000
trusted library allocation
page read and write
malicious
1EF4FCF4000
trusted library allocation
page read and write
malicious
1EF4F615000
trusted library allocation
page read and write
malicious
1EF66360000
trusted library section
page read and write
malicious
1EF65BF7000
heap
page read and write
1EF5E4B0000
trusted library allocation
page read and write
1EF4D8A5000
heap
page read and write
7FF848DE0000
trusted library allocation
page read and write
681A000
heap
page read and write
125C000
heap
page read and write
1EF4BF10000
heap
page readonly
7FF848E30000
trusted library allocation
page read and write
1215000
heap
page read and write
1EF4BD00000
heap
page read and write
1EF4BC00000
heap
page read and write
7FF848BA2000
trusted library allocation
page read and write
66C0000
heap
page read and write
1EF4BC48000
heap
page read and write
7FF848E40000
trusted library allocation
page read and write
7F1E0000
trusted library allocation
page execute and read and write
55BE000
stack
page read and write
1EF5DBF1000
trusted library allocation
page read and write
1EF4BF20000
trusted library allocation
page read and write
5E2E000
stack
page read and write
129E000
stack
page read and write
6579000
trusted library allocation
page read and write
3010000
trusted library allocation
page read and write
124C000
heap
page read and write
1EF65FA2000
heap
page read and write
11A1000
heap
page read and write
1EF4BBF0000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
5BD0000
heap
page read and write
12A0000
heap
page read and write
2CCA000
trusted library allocation
page execute and read and write
1EF65F57000
heap
page execute and read and write
12ED000
trusted library allocation
page execute and read and write
1EF4BCEA000
heap
page read and write
2F30000
trusted library allocation
page execute and read and write
6DA1D5000
stack
page read and write
6DA879000
stack
page read and write
7FF848D5A000
trusted library allocation
page read and write
1EF4BC52000
heap
page read and write
2F2C000
stack
page read and write
53A0000
trusted library allocation
page read and write
7FF848E70000
trusted library allocation
page read and write
300E000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
1EF4BED0000
trusted library allocation
page read and write
61EC000
stack
page read and write
12E3000
trusted library allocation
page execute and read and write
5450000
heap
page read and write
D98000
stack
page read and write
1EF4BF00000
trusted library allocation
page read and write
6DB70A000
stack
page read and write
400000
remote allocation
page execute and read and write
7FF848E00000
trusted library allocation
page read and write
7FF848C56000
trusted library allocation
page read and write
1310000
heap
page read and write
1EF4E1DF000
trusted library allocation
page read and write
C9B000
stack
page read and write
1010000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
1EF4D7F0000
heap
page read and write
2CC2000
trusted library allocation
page read and write
2DE0000
heap
page read and write
7FF848E80000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page execute and read and write
1EF4BCAC000
heap
page read and write
118D000
heap
page read and write
141E000
stack
page read and write
7FF848D82000
trusted library allocation
page read and write
1EF65D00000
heap
page read and write
7FF848D90000
trusted library allocation
page execute and read and write
1EF5DC70000
trusted library allocation
page read and write
7FF848C60000
trusted library allocation
page execute and read and write
5453000
heap
page read and write
553E000
stack
page read and write
7DF4D5550000
trusted library allocation
page execute and read and write
6DA6FF000
stack
page read and write
1EF4BCDF000
heap
page read and write
6817000
heap
page read and write
1EF4FBAF000
trusted library allocation
page read and write
5F6C000
stack
page read and write
57E9000
stack
page read and write
2CD0000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
1EF4BF85000
heap
page read and write
3F51000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
1EF4FCEB000
trusted library allocation
page read and write
6DABBA000
stack
page read and write
6DAABE000
stack
page read and write
3F59000
trusted library allocation
page read and write
7FF848CC0000
trusted library allocation
page execute and read and write
1EF5DC00000
trusted library allocation
page read and write
66D4000
trusted library allocation
page read and write
11CD000
heap
page read and write
1EF65F60000
heap
page read and write
1EF4BE30000
heap
page read and write
6DA77E000
stack
page read and write
61AD000
stack
page read and write
7FF848DD0000
trusted library allocation
page read and write
1EF5E185000
trusted library allocation
page read and write
123B000
heap
page read and write
2D48000
trusted library allocation
page read and write
2CDB000
trusted library allocation
page execute and read and write
1EF4DBF1000
trusted library allocation
page read and write
7FF848D70000
trusted library allocation
page execute and read and write
1EF4BC20000
heap
page read and write
5AEE000
stack
page read and write
7FF848BB0000
trusted library allocation
page read and write
6810000
heap
page read and write
1EF4E1DA000
trusted library allocation
page read and write
1EF65F00000
heap
page execute and read and write
1EF65D41000
heap
page read and write
7FF848C86000
trusted library allocation
page execute and read and write
1EF4BF70000
heap
page execute and read and write
12D0000
trusted library allocation
page read and write
1EF5DD6B000
trusted library allocation
page read and write
1EF4D760000
trusted library allocation
page read and write
7FF848BA4000
trusted library allocation
page read and write
1EF4FD20000
trusted library allocation
page read and write
12E4000
trusted library allocation
page read and write
2CD7000
trusted library allocation
page execute and read and write
6705000
trusted library allocation
page read and write
1300000
heap
page read and write
7FF848C5C000
trusted library allocation
page execute and read and write
7FF848E60000
trusted library allocation
page read and write
6DAC3E000
stack
page read and write
1EF4BD27000
heap
page read and write
1EF65D89000
heap
page read and write
1EF65D38000
heap
page read and write
58EF000
stack
page read and write
1240000
heap
page read and write
56ED000
stack
page read and write
5B10000
heap
page read and write
6DA5FE000
stack
page read and write
119D000
heap
page read and write
1EF5DC64000
trusted library allocation
page read and write
1168000
heap
page read and write
7FF848F10000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
2CF0000
trusted library allocation
page read and write
1EF4E215000
trusted library allocation
page read and write
6DAA39000
stack
page read and write
5CEE000
trusted library allocation
page read and write
6720000
trusted library allocation
page read and write
1130000
heap
page read and write
1317000
heap
page read and write
7FF848F20000
trusted library allocation
page read and write
7FF848BA0000
trusted library allocation
page read and write
606D000
stack
page read and write
7FF848BBB000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page read and write
7FF848E50000
trusted library allocation
page read and write
6DA937000
stack
page read and write
7FF848DB0000
trusted library allocation
page read and write
62EE000
stack
page read and write
1EF4EC15000
trusted library allocation
page read and write
53EE000
stack
page read and write
6DA67B000
stack
page read and write
2D3E000
stack
page read and write
6DA47E000
stack
page read and write
60AC000
stack
page read and write
7FF848D51000
trusted library allocation
page read and write
642D000
stack
page read and write
632E000
stack
page read and write
1EF65F50000
heap
page execute and read and write
7FF848EC0000
trusted library allocation
page read and write
5B30000
heap
page read and write
504D000
stack
page read and write
112C000
stack
page read and write
5F2F000
stack
page read and write
5D2E000
stack
page read and write
2CC6000
trusted library allocation
page execute and read and write
59EE000
stack
page read and write
6815000
heap
page read and write
7FF848C50000
trusted library allocation
page read and write
1EF65FBC000
heap
page read and write
6DA4FE000
stack
page read and write
6DA9B7000
stack
page read and write
6910000
trusted library allocation
page execute and read and write
7FF848DC0000
trusted library allocation
page read and write
7FF848EE0000
trusted library allocation
page read and write
7FF848D40000
trusted library allocation
page read and write
1EF4FBB5000
trusted library allocation
page read and write
1EF4BD2D000
heap
page read and write
6570000
trusted library allocation
page read and write
1EF4BC40000
heap
page read and write
1EF5DD5C000
trusted library allocation
page read and write
1EF65E20000
heap
page read and write
119A000
heap
page read and write
2F40000
heap
page execute and read and write
6DA7FD000
stack
page read and write
7FF848DA0000
trusted library allocation
page read and write
1EF4BF80000
heap
page read and write
542C000
stack
page read and write
7FF848BA3000
trusted library allocation
page execute and read and write
6DA57D000
stack
page read and write
1EF65DFB000
heap
page read and write
1EF65D87000
heap
page read and write
7FF848EF0000
trusted library allocation
page read and write
1EF4DC78000
trusted library allocation
page read and write
7FF848BAD000
trusted library allocation
page execute and read and write
557E000
stack
page read and write
6DB68F000
stack
page read and write
6576000
trusted library allocation
page read and write
123D000
heap
page read and write
151E000
stack
page read and write
5EAF000
stack
page read and write
12E0000
trusted library allocation
page read and write
12F3000
trusted library allocation
page read and write
1EF4D890000
heap
page read and write
1197000
heap
page read and write
1EF65D44000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page read and write
1EF4BD29000
heap
page read and write
55E0000
heap
page execute and read and write
5EEE000
stack
page read and write
6710000
trusted library allocation
page read and write
1EF4BCC9000
heap
page read and write
5CE0000
trusted library allocation
page read and write
1EF5E3DA000
trusted library allocation
page read and write
5E6D000
stack
page read and write
1306000
heap
page read and write
1EF4D8A0000
heap
page read and write
2EEE000
stack
page read and write
1EF4FD16000
trusted library allocation
page read and write
1EF4BCE2000
heap
page read and write
6DAB3E000
stack
page read and write
DF0000
heap
page read and write
6DA8BF000
stack
page read and write
6DACBC000
stack
page read and write
DF6000
heap
page read and write
2CC0000
trusted library allocation
page read and write
1EF4FD26000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
1EF66160000
heap
page read and write
1160000
heap
page read and write
There are 233 hidden memdumps, click here to show them.