IOC Report
1ZhE3yY8rV.ps1

loading gif

Files

File Path
Type
Category
Malicious
1ZhE3yY8rV.ps1
ASCII text, with very long lines (4140), with CRLF line terminators
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_powershell.exe_5bc72c5f64839fc18b3a4df19d39ebd45ce3fdf_e3b0f337_08931ada-a270-4980-913c-625c1f123ee4\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBC7F.tmp.dmp
Mini DuMP crash report, 16 streams, Fri Oct 25 18:05:28 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBF5F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBFDD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iwlhj2gb.4al.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uavqn0lg.tef.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\BMBGDFPUTMDU8FTQYSF7.temp
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1ZhE3yY8rV.ps1"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7552 -s 2028

URLs

Name
IP
Malicious
http://217.195.153.196/assets/paleo
unknown
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://217.195.153.196/assets/paleochorologyma.exe
217.195.153.196
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://upx.sf.net
unknown
https://aka.ms/pscore68
unknown
http://217.195.153.196
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 5 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
217.195.153.196
unknown
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
\REGISTRY\A\{237e2807-30c2-5043-0f8d-5cada8033ce8}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
ProgramId
\REGISTRY\A\{237e2807-30c2-5043-0f8d-5cada8033ce8}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
FileId
\REGISTRY\A\{237e2807-30c2-5043-0f8d-5cada8033ce8}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
LowerCaseLongPath
\REGISTRY\A\{237e2807-30c2-5043-0f8d-5cada8033ce8}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
LongPathHash
\REGISTRY\A\{237e2807-30c2-5043-0f8d-5cada8033ce8}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Name
\REGISTRY\A\{237e2807-30c2-5043-0f8d-5cada8033ce8}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
OriginalFileName
\REGISTRY\A\{237e2807-30c2-5043-0f8d-5cada8033ce8}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Publisher
\REGISTRY\A\{237e2807-30c2-5043-0f8d-5cada8033ce8}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Version
\REGISTRY\A\{237e2807-30c2-5043-0f8d-5cada8033ce8}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
BinFileVersion
\REGISTRY\A\{237e2807-30c2-5043-0f8d-5cada8033ce8}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
BinaryType
\REGISTRY\A\{237e2807-30c2-5043-0f8d-5cada8033ce8}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
ProductName
\REGISTRY\A\{237e2807-30c2-5043-0f8d-5cada8033ce8}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
ProductVersion
\REGISTRY\A\{237e2807-30c2-5043-0f8d-5cada8033ce8}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
LinkDate
\REGISTRY\A\{237e2807-30c2-5043-0f8d-5cada8033ce8}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
BinProductVersion
\REGISTRY\A\{237e2807-30c2-5043-0f8d-5cada8033ce8}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
AppxPackageFullName
\REGISTRY\A\{237e2807-30c2-5043-0f8d-5cada8033ce8}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
AppxPackageRelativeId
\REGISTRY\A\{237e2807-30c2-5043-0f8d-5cada8033ce8}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Size
\REGISTRY\A\{237e2807-30c2-5043-0f8d-5cada8033ce8}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Language
\REGISTRY\A\{237e2807-30c2-5043-0f8d-5cada8033ce8}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
IsOsComponent
\REGISTRY\A\{237e2807-30c2-5043-0f8d-5cada8033ce8}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Usn
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
866FF7D000
stack
page read and write
199527AF000
trusted library allocation
page read and write
1995A856000
heap
page read and write
199424C1000
trusted library allocation
page read and write
866FEFE000
stack
page read and write
7FFD9B950000
trusted library allocation
page read and write
19943B89000
trusted library allocation
page read and write
1995A5E0000
heap
page read and write
7FFD9B69C000
trusted library allocation
page execute and read and write
19942463000
trusted library allocation
page read and write
866FE7E000
stack
page read and write
19940497000
heap
page read and write
7FFD9B660000
trusted library allocation
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
7FFD9B822000
trusted library allocation
page read and write
199403F8000
heap
page read and write
1995A82D000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
19940402000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
8670139000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
86700B6000
stack
page read and write
19940635000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B643000
trusted library allocation
page execute and read and write
199406A0000
trusted library allocation
page read and write
1995A548000
heap
page read and write
19952677000
trusted library allocation
page read and write
19940360000
heap
page read and write
19940670000
trusted library section
page read and write
7FFD9B810000
trusted library allocation
page execute and read and write
7FFD9B7F1000
trusted library allocation
page read and write
199404DE000
heap
page read and write
19940380000
heap
page read and write
7FFD9B890000
trusted library allocation
page read and write
1995A7F3000
heap
page read and write
1994049D000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
19940680000
trusted library allocation
page read and write
1995A4C0000
heap
page read and write
19943322000
trusted library allocation
page read and write
7FFD9B827000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
199524C1000
trusted library allocation
page read and write
1995A807000
heap
page read and write
867104A000
stack
page read and write
7FFD9B850000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page execute and read and write
866F9FE000
stack
page read and write
1995A59F000
heap
page read and write
19940690000
heap
page readonly
7FFD9B8C0000
trusted library allocation
page read and write
867023E000
stack
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
1995A6C0000
direct allocation
page execute and read and write
199403C0000
heap
page read and write
19943D1A000
trusted library allocation
page read and write
8670ECF000
stack
page read and write
86701B7000
stack
page read and write
7FFD9B726000
trusted library allocation
page execute and read and write
7FFD9B6FC000
trusted library allocation
page execute and read and write
7FFD9B880000
trusted library allocation
page read and write
7FFD9B7FA000
trusted library allocation
page read and write
7FFD9B8D0000
trusted library allocation
page read and write
19940630000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
7FFD9B825000
trusted library allocation
page read and write
19942210000
trusted library allocation
page read and write
19943CB7000
trusted library allocation
page read and write
7FFD9B640000
trusted library allocation
page read and write
19940660000
trusted library section
page read and write
199527BE000
trusted library allocation
page read and write
199404AF000
heap
page read and write
8670DC1000
stack
page read and write
19940493000
heap
page read and write
867043C000
stack
page read and write
867033E000
stack
page read and write
8670F4E000
stack
page read and write
7FFD9B900000
trusted library allocation
page read and write
19940620000
heap
page read and write
866FDFB000
stack
page read and write
866FCFE000
stack
page read and write
7FFD9B6F6000
trusted library allocation
page read and write
8670E0F000
stack
page read and write
199403F0000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
86702BE000
stack
page read and write
1995A770000
heap
page execute and read and write
19942213000
trusted library allocation
page read and write
19943B6E000
trusted library allocation
page read and write
19942440000
heap
page execute and read and write
86703BE000
stack
page read and write
7FFD9B9F0000
trusted library allocation
page execute and read and write
866FFF9000
stack
page read and write
1994048F000
heap
page read and write
7FFD9B642000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
866FD7D000
stack
page read and write
7FFD9B7F4000
trusted library allocation
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
1995A84A000
heap
page read and write
867003E000
stack
page read and write
19943B67000
trusted library allocation
page read and write
7FFD9B65B000
trusted library allocation
page read and write
8670E8D000
stack
page read and write
19952535000
trusted library allocation
page read and write
19943D23000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
1995A7E9000
heap
page read and write
19940650000
trusted library allocation
page read and write
199404D8000
heap
page read and write
199406F0000
heap
page read and write
866F975000
stack
page read and write
866FC7E000
stack
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
7FFD9B860000
trusted library allocation
page read and write
1995A84C000
heap
page read and write
7FFD9B64D000
trusted library allocation
page execute and read and write
19942460000
trusted library allocation
page read and write
1995A875000
heap
page read and write
19942922000
trusted library allocation
page read and write
7FFD9B82A000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page read and write
1995A777000
heap
page execute and read and write
19942320000
heap
page read and write
19942331000
heap
page read and write
7FFD9B870000
trusted library allocation
page read and write
199426F2000
trusted library allocation
page read and write
19940350000
heap
page read and write
7FFD9B650000
trusted library allocation
page read and write
199406F5000
heap
page read and write
199424B0000
heap
page execute and read and write
1995A7DA000
heap
page read and write
1995A780000
heap
page read and write
1995A5A8000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
199524D0000
trusted library allocation
page read and write
19940499000
heap
page read and write
7DF4FD2C0000
trusted library allocation
page execute and read and write
1995A803000
heap
page read and write
1994254B000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
8670FC7000
stack
page read and write
7FFD9B644000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page execute and read and write
7FFD9B6F0000
trusted library allocation
page read and write
There are 140 hidden memdumps, click here to show them.