IOC Report
FreeCs2Skins.ps1

loading gif

Files

File Path
Type
Category
Malicious
FreeCs2Skins.ps1
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4tledjns.kss.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hxz4i341.os2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\file.exe
HTML document, Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3POJUI906RL1T6UDZTGF.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\FreeCs2Skins.ps1"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://cia.tf/1d5ad9c8d3fee874d0feb8bfac220a11.exe
172.67.129.178
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://cia.tf
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://coquettte.com
unknown
https://bad.is-having.fun
unknown
https://contoso.com/Icon
unknown
https://cia.tf
unknown
http://upx.sf.net
unknown
https://aka.ms/pscore68
unknown
https://cia.tf/1d5ad9c8d3fee874d0feb8bfac220a11.exeP
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
https://cia.tf/
172.67.129.178
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cia.tf
172.67.129.178

IPs

IP
Domain
Country
Malicious
172.67.129.178
cia.tf
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFD34AA0000
trusted library allocation
page read and write
1AD2AD50000
heap
page read and write
7FFD349A0000
trusted library allocation
page read and write
1AD43221000
heap
page read and write
1AD29139000
heap
page read and write
1AD29178000
heap
page read and write
7FFD34830000
trusted library allocation
page execute and read and write
737407B000
stack
page read and write
7FFD3482C000
trusted library allocation
page execute and read and write
1AD29135000
heap
page read and write
1AD29310000
heap
page readonly
1AD2C71D000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
7FFD34A50000
trusted library allocation
page read and write
7FFD34A40000
trusted library allocation
page read and write
1AD3B0A1000
trusted library allocation
page read and write
7373DFD000
stack
page read and write
7FFD34921000
trusted library allocation
page read and write
1AD2C6C1000
trusted library allocation
page read and write
7373A7E000
stack
page read and write
1AD2C6A7000
trusted library allocation
page read and write
1AD2CABC000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
7FFD34A20000
trusted library allocation
page read and write
1AD2C6AF000
trusted library allocation
page read and write
1AD29350000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
1AD29010000
heap
page read and write
1AD4352D000
heap
page read and write
1AD2CDEB000
trusted library allocation
page read and write
1AD2CC0F000
trusted library allocation
page read and write
1AD2C729000
trusted library allocation
page read and write
7FFD349F0000
trusted library allocation
page read and write
1AD3B251000
trusted library allocation
page read and write
7374C0E000
stack
page read and write
1AD3B10E000
trusted library allocation
page read and write
7373FFE000
stack
page read and write
7FFD347CC000
trusted library allocation
page execute and read and write
1AD2C6BD000
trusted library allocation
page read and write
1AD2CC18000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
7FFD34940000
trusted library allocation
page execute and read and write
1AD2B2D3000
trusted library allocation
page read and write
1AD43567000
heap
page read and write
7373EFE000
stack
page read and write
7FFD3478B000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
1AD2C719000
trusted library allocation
page read and write
1AD29090000
heap
page read and write
1AD434E3000
heap
page read and write
7FFD34930000
trusted library allocation
page execute and read and write
1AD43487000
heap
page execute and read and write
1AD2CDE5000
trusted library allocation
page read and write
7FFD34AE0000
trusted library allocation
page read and write
73735CE000
stack
page read and write
1AD43288000
heap
page read and write
1AD2C6B9000
trusted library allocation
page read and write
1AD431DB000
heap
page read and write
1AD29390000
trusted library allocation
page read and write
1AD292C0000
trusted library allocation
page read and write
7373E79000
stack
page read and write
73738FE000
stack
page read and write
1AD2B0A1000
trusted library allocation
page read and write
1AD2B12B000
trusted library allocation
page read and write
7DF474B20000
trusted library allocation
page execute and read and write
7FFD34960000
trusted library allocation
page execute and read and write
1AD2AC80000
heap
page execute and read and write
7FFD34790000
trusted library allocation
page read and write
7FFD34A30000
trusted library allocation
page read and write
1AD292E0000
heap
page read and write
7374B4D000
stack
page read and write
1AD2C694000
trusted library allocation
page read and write
1AD2917E000
heap
page read and write
1AD29131000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
1AD430AD000
heap
page read and write
1AD293E5000
heap
page read and write
737397E000
stack
page read and write
7FFD34AB0000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
1AD29098000
heap
page read and write
1AD2AC70000
heap
page execute and read and write
7FFD34A90000
trusted library allocation
page read and write
1AD43480000
heap
page execute and read and write
7FFD34AC0000
trusted library allocation
page read and write
1AD292E5000
heap
page read and write
1AD43490000
heap
page read and write
7374D8C000
stack
page read and write
1AD432D0000
heap
page read and write
7FFD34952000
trusted library allocation
page read and write
1AD29353000
trusted library allocation
page read and write
7FFD34A10000
trusted library allocation
page read and write
7373CF9000
stack
page read and write
7FFD34772000
trusted library allocation
page read and write
7373C7D000
stack
page read and write
1AD4358C000
heap
page read and write
1AD29300000
trusted library allocation
page read and write
7374ACE000
stack
page read and write
7FFD34A80000
trusted library allocation
page read and write
7FFD34826000
trusted library allocation
page read and write
1AD4357F000
heap
page read and write
73739FD000
stack
page read and write
7FFD3477D000
trusted library allocation
page execute and read and write
1AD2C6D5000
trusted library allocation
page read and write
1AD43499000
heap
page read and write
7FFD34773000
trusted library allocation
page execute and read and write
7FFD34774000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page read and write
73740FB000
stack
page read and write
1AD3B389000
trusted library allocation
page read and write
1AD290A2000
heap
page read and write
1AD28FF0000
heap
page read and write
1AD4358E000
heap
page read and write
1AD434A9000
heap
page read and write
1AD29113000
heap
page read and write
7FFD34A70000
trusted library allocation
page read and write
7373AFB000
stack
page read and write
1AD2ACD0000
heap
page read and write
7FFD34856000
trusted library allocation
page execute and read and write
7FFD34990000
trusted library allocation
page read and write
1AD293E0000
heap
page read and write
7373D76000
stack
page read and write
7374D0E000
stack
page read and write
1AD2BCD3000
trusted library allocation
page read and write
7FFD34A60000
trusted library allocation
page read and write
1AD43295000
heap
page read and write
7FFD34AD0000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
7373B7F000
stack
page read and write
1AD3B0B0000
trusted library allocation
page read and write
7373F7E000
stack
page read and write
1AD434F0000
heap
page read and write
7373BFE000
stack
page read and write
1AD43573000
heap
page read and write
1AD29050000
heap
page read and write
1AD4321F000
heap
page read and write
7FFD34890000
trusted library allocation
page execute and read and write
7374B8E000
stack
page read and write
1AD431B0000
heap
page read and write
7FFD3492A000
trusted library allocation
page read and write
7FFD34910000
trusted library allocation
page read and write
1AD2913F000
heap
page read and write
7374C8A000
stack
page read and write
7373875000
stack
page read and write
1AD29151000
heap
page read and write
1AD2C691000
trusted library allocation
page read and write
1AD28FE0000
heap
page read and write
There are 137 hidden memdumps, click here to show them.