IOC Report
7lFbTUxX9m.ps1

loading gif

Files

File Path
Type
Category
Malicious
7lFbTUxX9m.ps1
ASCII text, with very long lines (65526), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qitkjwak.5ze.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wscdnfu5.ycl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PE4PKYK3L29P2XP9WUHY.temp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\7lFbTUxX9m.ps1"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
vecotr.viewdns.net
malicious
http://nuget.org/NuGet.exe
unknown
https://aka.ms/pscore68
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://crl.v
unknown
https://github.com/Pester/Pester
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
vecotr.viewdns.net
191.96.207.180
malicious

IPs

IP
Domain
Country
Malicious
191.96.207.180
vecotr.viewdns.net
Chile
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
247D12A7000
trusted library allocation
page read and write
malicious
247E93C0000
trusted library section
page read and write
malicious
247D310C000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
32E1000
trusted library allocation
page read and write
malicious
247D2AA5000
trusted library allocation
page read and write
malicious
247D0BB0000
trusted library allocation
page read and write
67CE000
stack
page read and write
B9D433E000
stack
page read and write
7FFB4B04D000
trusted library allocation
page execute and read and write
1860000
trusted library allocation
page read and write
14C6000
heap
page read and write
19B0000
heap
page read and write
7FFB4B200000
trusted library allocation
page execute and read and write
B9D4239000
stack
page read and write
7FFB4B1E0000
trusted library allocation
page read and write
6CF5000
trusted library allocation
page read and write
13B0000
heap
page read and write
B9D4078000
stack
page read and write
B9D43BA000
stack
page read and write
32D0000
heap
page read and write
6B50000
heap
page read and write
247E9224000
heap
page read and write
B9D41BB000
stack
page read and write
247E1939000
trusted library allocation
page read and write
5CCE000
stack
page read and write
7FFB4B0F0000
trusted library allocation
page read and write
247E1863000
trusted library allocation
page read and write
247D1070000
heap
page read and write
14B2000
heap
page read and write
14C9000
heap
page read and write
1543000
heap
page read and write
7FFB4B290000
trusted library allocation
page read and write
325E000
stack
page read and write
247E10ED000
trusted library allocation
page read and write
1400000
heap
page read and write
624F000
stack
page read and write
6A6D000
heap
page read and write
42E9000
trusted library allocation
page read and write
247E1090000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
247E97DC000
heap
page read and write
7FFB4B250000
trusted library allocation
page read and write
247CF130000
heap
page read and write
247E92C0000
heap
page read and write
6D00000
trusted library allocation
page read and write
7F250000
trusted library allocation
page execute and read and write
247D0B20000
trusted library allocation
page read and write
640E000
stack
page read and write
1557000
heap
page read and write
1874000
trusted library allocation
page read and write
247E9799000
heap
page read and write
7FFB4B044000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
7FFB4B0FC000
trusted library allocation
page execute and read and write
7FFB4B310000
trusted library allocation
page read and write
14AE000
heap
page read and write
247E92A0000
heap
page read and write
1896000
trusted library allocation
page execute and read and write
5FE0000
heap
page read and write
59C0000
heap
page execute and read and write
6D11000
trusted library allocation
page read and write
628E000
stack
page read and write
247CF250000
heap
page read and write
1337000
stack
page read and write
247CF1C9000
heap
page read and write
247D0A90000
heap
page read and write
123B000
stack
page read and write
1883000
trusted library allocation
page read and write
247E93E0000
heap
page execute and read and write
668E000
stack
page read and write
189A000
trusted library allocation
page execute and read and write
7FFB4B350000
trusted library allocation
page read and write
7FFB4B2C0000
trusted library allocation
page read and write
1497000
heap
page read and write
7FFB4B210000
trusted library allocation
page execute and read and write
247E908F000
heap
page read and write
18AB000
trusted library allocation
page execute and read and write
7FFB4B240000
trusted library allocation
page read and write
247D2FC4000
trusted library allocation
page read and write
630E000
stack
page read and write
7FFB4B042000
trusted library allocation
page read and write
1520000
heap
page read and write
247CF415000
heap
page read and write
58F3000
heap
page read and write
247E11E5000
trusted library allocation
page read and write
5FC0000
heap
page read and write
18A7000
trusted library allocation
page execute and read and write
247CF1D4000
heap
page read and write
18C0000
trusted library allocation
page read and write
247E9263000
heap
page read and write
7FFB4B230000
trusted library allocation
page execute and read and write
7FFB4B0F6000
trusted library allocation
page read and write
247D1020000
heap
page execute and read and write
7FFB4B2E0000
trusted library allocation
page read and write
247D0A40000
heap
page read and write
7FFB4B330000
trusted library allocation
page read and write
58BE000
stack
page read and write
247D0B30000
heap
page readonly
5720000
heap
page read and write
B9D4F0A000
stack
page read and write
60CE000
stack
page read and write
329C000
stack
page read and write
1880000
trusted library allocation
page read and write
247D166A000
trusted library allocation
page read and write
187D000
trusted library allocation
page execute and read and write
B9D443E000
stack
page read and write
247E979F000
heap
page read and write
6E00000
trusted library allocation
page execute and read and write
7FFB4B2A0000
trusted library allocation
page read and write
680C000
stack
page read and write
B9D3C7E000
stack
page read and write
7FFB4B320000
trusted library allocation
page read and write
7FFB4B280000
trusted library allocation
page read and write
247D0C25000
heap
page read and write
1500000
heap
page read and write
247CF1F0000
heap
page read and write
7FFB4B270000
trusted library allocation
page read and write
690E000
stack
page read and write
7FFB4B05C000
trusted library allocation
page read and write
6A50000
heap
page read and write
B9D3CFE000
stack
page read and write
B9D3DFB000
stack
page read and write
247CF150000
heap
page read and write
247E1081000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
61CD000
stack
page read and write
247D16A5000
trusted library allocation
page read and write
175E000
stack
page read and write
247E91A0000
heap
page read and write
6080000
trusted library allocation
page read and write
153F000
heap
page read and write
247D0AF0000
trusted library allocation
page read and write
247CF050000
heap
page read and write
7FFB4B340000
trusted library allocation
page read and write
7FFB4B1F1000
trusted library allocation
page read and write
7FFB4B380000
trusted library allocation
page read and write
32A0000
trusted library allocation
page execute and read and write
32B0000
heap
page execute and read and write
62CF000
stack
page read and write
7FFB4B360000
trusted library allocation
page read and write
7FFB4B222000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
247D1698000
trusted library allocation
page read and write
247E920D000
heap
page read and write
247E93F0000
heap
page read and write
7FFB4B300000
trusted library allocation
page read and write
247E11F4000
trusted library allocation
page read and write
247CF210000
heap
page read and write
185E000
stack
page read and write
247D2FBF000
trusted library allocation
page read and write
247D0C20000
heap
page read and write
58F0000
heap
page read and write
7FFB4B2D0000
trusted library allocation
page read and write
654D000
stack
page read and write
53DD000
stack
page read and write
658C000
stack
page read and write
B9D4E8E000
stack
page read and write
247E91E9000
heap
page read and write
1490000
heap
page read and write
247E91DA000
heap
page read and write
644C000
stack
page read and write
247E977C000
heap
page read and write
B9D44BB000
stack
page read and write
1870000
trusted library allocation
page read and write
7FFB4B2F0000
trusted library allocation
page read and write
247CF1F4000
heap
page read and write
247D0B70000
trusted library allocation
page read and write
6B79000
trusted library allocation
page read and write
247CF162000
heap
page read and write
1873000
trusted library allocation
page execute and read and write
1892000
trusted library allocation
page read and write
7FFB4B3A0000
trusted library allocation
page read and write
B9D3D7E000
stack
page read and write
578E000
stack
page read and write
7FFB4B370000
trusted library allocation
page read and write
247E9296000
heap
page read and write
1890000
trusted library allocation
page read and write
59A0000
heap
page read and write
66CC000
stack
page read and write
18A0000
trusted library allocation
page read and write
247CF238000
heap
page read and write
1410000
heap
page read and write
620E000
stack
page read and write
247D1108000
trusted library allocation
page read and write
247E97E1000
heap
page read and write
5ACD000
stack
page read and write
7FFB4B3C0000
trusted library allocation
page read and write
B9D3FFD000
stack
page read and write
247D20A5000
trusted library allocation
page read and write
6CC4000
trusted library allocation
page read and write
7FFB4B260000
trusted library allocation
page read and write
1406000
heap
page read and write
7FFB4B160000
trusted library allocation
page execute and read and write
13FE000
stack
page read and write
7DF4B5330000
trusted library allocation
page execute and read and write
B9D3F7E000
stack
page read and write
5BC9000
stack
page read and write
7FFB4B100000
trusted library allocation
page execute and read and write
B9D4136000
stack
page read and write
247E91E2000
heap
page read and write
247CF158000
heap
page read and write
7FFB4B2B0000
trusted library allocation
page read and write
247E9760000
heap
page read and write
247CF410000
heap
page read and write
7FFB4B126000
trusted library allocation
page execute and read and write
1918000
trusted library allocation
page read and write
247D1081000
trusted library allocation
page read and write
247D1060000
heap
page execute and read and write
13B7000
heap
page read and write
13A0000
heap
page read and write
B9D39DE000
stack
page read and write
247E97E6000
heap
page read and write
247D166F000
trusted library allocation
page read and write
7FFB4B1FA000
trusted library allocation
page read and write
7FFB4B390000
trusted library allocation
page read and write
B9D42BE000
stack
page read and write
247E93E7000
heap
page execute and read and write
14BB000
heap
page read and write
B9D3955000
stack
page read and write
6A68000
heap
page read and write
247CF1F8000
heap
page read and write
B9D3EFE000
stack
page read and write
247E160E000
trusted library allocation
page read and write
247CF1FE000
heap
page read and write
B9D40BE000
stack
page read and write
7FFB4B040000
trusted library allocation
page read and write
7FFB4B3B0000
trusted library allocation
page read and write
B9D3E7E000
stack
page read and write
145E000
stack
page read and write
247E9226000
heap
page read and write
42E1000
trusted library allocation
page read and write
7FFB4B043000
trusted library allocation
page execute and read and write
247E91D1000
heap
page read and write
190E000
stack
page read and write
7FFB4B050000
trusted library allocation
page read and write
247E91E7000
heap
page read and write
6A62000
heap
page read and write
57CC000
stack
page read and write
19B6000
heap
page read and write
6A6B000
heap
page read and write
There are 231 hidden memdumps, click here to show them.