IOC Report
install[1].ps1

loading gif

Files

File Path
Type
Category
Malicious
install[1].ps1
ASCII text, with CRLF line terminators
initial sample
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3datf0m3.ahy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_avqeql2d.cox.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1J7WQ43L2S93MVAX3ZAT.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\install[1].ps1"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://raw.githubusercontent.com/spicetify/spicetify-marketplace/main/resources/install.ps1
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://github.com/spicetify/cli/releases/download/v
unknown
https://contoso.com/Icon
unknown
https://oneget.orgX
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://go.m
unknown
https://github.com/Pester/Pester
unknown
https://github.com/spicetify/cli/releases/download/v$targetVersion/spicetify-$targetVersion-windows-
unknown
https://oneget.org
unknown
https://api.github.com/repos/spicetify/cli/releases/latest
unknown
There are 9 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1E8CBA20000
heap
page execute and read and write
7FF848FD0000
trusted library allocation
page execute and read and write
1E8CB9A0000
heap
page read and write
1E8CBAFA000
trusted library allocation
page read and write
CA818BE000
stack
page read and write
7FF849120000
trusted library allocation
page read and write
CA814FE000
stack
page read and write
1E8C9CE3000
heap
page read and write
7FF848DFB000
trusted library allocation
page read and write
1E8C9C3E000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
1E8E3C7B000
heap
page read and write
1E8CB500000
trusted library allocation
page read and write
1E8CD26B000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page execute and read and write
7FF848E00000
trusted library allocation
page read and write
1E8C9A40000
heap
page read and write
CA80EE5000
stack
page read and write
7FF849100000
trusted library allocation
page read and write
1E8E3E02000
heap
page read and write
1E8C9B20000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
1E8C9C03000
heap
page read and write
7FF848DE4000
trusted library allocation
page read and write
1E8CB5C0000
heap
page read and write
1E8E3D80000
heap
page execute and read and write
1E8C9CB9000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
1E8CCCC4000
trusted library allocation
page read and write
7FF848DE2000
trusted library allocation
page read and write
1E8E3D90000
heap
page read and write
1E8C9CA5000
heap
page read and write
1E8CD475000
trusted library allocation
page read and write
1E8E3CA0000
heap
page read and write
CA8240F000
stack
page read and write
1E8CC6A2000
trusted library allocation
page read and write
1E8CD7C0000
trusted library allocation
page read and write
7FF848F91000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
1E8DBA80000
trusted library allocation
page read and write
1E8E3D87000
heap
page execute and read and write
CA8157E000
stack
page read and write
CA823C3000
stack
page read and write
7FF848F00000
trusted library allocation
page execute and read and write
CA81A3C000
stack
page read and write
1E8CCEAD000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page execute and read and write
7FF848E90000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
1E8C9BA0000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
7FF848E9C000
trusted library allocation
page execute and read and write
1E8CBA71000
trusted library allocation
page read and write
1E8CB5A0000
trusted library allocation
page read and write
1E8CBA60000
heap
page execute and read and write
7FF848DE3000
trusted library allocation
page execute and read and write
7FF848E3C000
trusted library allocation
page execute and read and write
1E8DBAE3000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
1E8CB550000
trusted library allocation
page read and write
1E8E3A75000
heap
page read and write
1E8DBC25000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
1E8CB4E0000
trusted library section
page read and write
1E8C9CE7000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
1E8E3E4B000
heap
page read and write
1E8CB510000
heap
page readonly
CA80F6E000
stack
page read and write
1E8CB4D0000
trusted library allocation
page read and write
1E8E3DB8000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
1E8E3DF3000
heap
page read and write
7DF4C8E60000
trusted library allocation
page execute and read and write
1E8C9BF0000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
1E8E3C10000
heap
page read and write
1E8E3E0B000
heap
page read and write
1E8E3E2E000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
1E8DBA71000
trusted library allocation
page read and write
1E8CBA40000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page execute and read and write
1E8C9BF8000
heap
page read and write
1E8CB553000
trusted library allocation
page read and write
CA819BF000
stack
page read and write
1E8E3BFE000
heap
page read and write
7FF848FC2000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
1E8CBA43000
trusted library allocation
page read and write
1E8CD564000
trusted library allocation
page read and write
1E8CD7BC000
trusted library allocation
page read and write
7FF848F9A000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
1E8C9C9F000
heap
page read and write
1E8C9C99000
heap
page read and write
1E8DBAEF000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
1E8C9C83000
heap
page read and write
1E8C9B40000
heap
page read and write
1E8E3DEE000
heap
page read and write
1E8CD6F6000
trusted library allocation
page read and write
1E8C9C6A000
heap
page read and write
1E8E3BBD000
heap
page read and write
1E8CBCA2000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
1E8CD41A000
trusted library allocation
page read and write
1E8E3B80000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF848DED000
trusted library allocation
page execute and read and write
1E8CB5C5000
heap
page read and write
1E8CB590000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
1E8E3C12000
heap
page read and write
1E8E3BC9000
heap
page read and write
1E8CD26D000
trusted library allocation
page read and write
1E8C9BA5000
heap
page read and write
1E8E3E5A000
heap
page read and write
1E8C9C81000
heap
page read and write
1E8CD3EF000
trusted library allocation
page read and write
1E8C9CE1000
heap
page read and write
1E8C9B80000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
7FF848E96000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
1E8E3BBB000
heap
page read and write
1E8CB4F0000
trusted library section
page read and write
There are 122 hidden memdumps, click here to show them.