IOC Report
hy.ps1

loading gif

Files

File Path
Type
Category
Malicious
hy.ps1
ASCII text, with very long lines (65441), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\notepad.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bkawl2pe.cxf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j30tmlh1.bex.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jk1cj3jc.qq5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xo5uo42e.2ly.ps1
ASCII text, with no line terminators
modified
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3EC1V92W5H6258ESQE6M.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
\Device\ConDrv
ASCII text
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\hy.ps1"
malicious
C:\Windows\System32\notepad.exe
C:\Windows\System32\notepad.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1FEDD340000
trusted library section
page read and write
malicious
1FEDD370000
trusted library allocation
page read and write
1F0CF279000
trusted library allocation
page read and write
4D4EF7D000
stack
page read and write
7FFAAC432000
trusted library allocation
page read and write
1FEDD244000
heap
page read and write
1FEDD230000
trusted library allocation
page read and write
1F0C81F2000
heap
page read and write
7B6427E000
stack
page read and write
1FEED421000
trusted library allocation
page read and write
7FFAAC605000
trusted library allocation
page read and write
1FEDB630000
unkown
page execute read
7B6417E000
stack
page read and write
1FEED42E000
trusted library allocation
page read and write
1F0C8150000
heap
page read and write
1FEDD353000
trusted library allocation
page read and write
1FEDD380000
trusted library allocation
page read and write
7B644FE000
stack
page read and write
1F0C8287000
heap
page read and write
1FEDD6E1000
trusted library allocation
page read and write
7B643FE000
stack
page read and write
1FEDD390000
trusted library allocation
page read and write
1FEDD390000
trusted library allocation
page read and write
1FEDD370000
trusted library allocation
page read and write
1F0CAC79000
trusted library allocation
page read and write
1F0C9C70000
heap
page execute and read and write
7B646FE000
stack
page read and write
1FEDD373000
trusted library allocation
page read and write
1FEDB72B000
heap
page read and write
7B642FE000
stack
page read and write
7B6467E000
stack
page read and write
1FEDB6BC000
heap
page read and write
7B640FE000
stack
page read and write
1F0C8480000
heap
page read and write
7DF417120000
trusted library allocation
page execute and read and write
7B641FD000
stack
page read and write
7FFAAC5D0000
trusted library allocation
page read and write
1F0C9CF0000
heap
page read and write
1FEDD248000
heap
page read and write
1FEDB766000
heap
page read and write
1FEDB763000
heap
page read and write
1F0C8420000
heap
page read and write
7FFAAC5F0000
trusted library allocation
page read and write
1FEDD360000
trusted library allocation
page read and write
1F0C9C30000
trusted library allocation
page read and write
1FEDD380000
trusted library allocation
page read and write
1F0CD479000
trusted library allocation
page read and write
7FFAAC4EC000
trusted library allocation
page execute and read and write
1FEF5B83000
heap
page read and write
1F0C8283000
heap
page read and write
7B6477E000
stack
page read and write
1FEDD0E0000
trusted library allocation
page read and write
1F0D1A79000
trusted library allocation
page read and write
1FEDD390000
trusted library allocation
page read and write
7B6487E000
stack
page read and write
1FEDD030000
heap
page read and write
1F0CA0D8000
trusted library allocation
page read and write
1FEDD360000
trusted library allocation
page read and write
1F0C9D00000
heap
page read and write
1FEDB770000
heap
page read and write
1F0CC079000
trusted library allocation
page read and write
1FEDB751000
heap
page read and write
7FFAAC5E6000
trusted library allocation
page execute and read and write
1FEDB680000
heap
page read and write
7FFAAC5E2000
trusted library allocation
page read and write
7FFAAC516000
trusted library allocation
page execute and read and write
1F0C8485000
heap
page read and write
1FEDB75F000
heap
page read and write
7DF417100000
trusted library allocation
page execute and read and write
7FFAAC5E8000
trusted library allocation
page execute and read and write
1FEDD360000
trusted library allocation
page read and write
1F0C9D05000
heap
page read and write
1FEDD360000
trusted library allocation
page read and write
7B647FE000
stack
page read and write
7B6457E000
stack
page read and write
1FEDB688000
heap
page read and write
1FEDB6CF000
heap
page read and write
1F0C8258000
heap
page read and write
1FEDB6C0000
heap
page read and write
1FEDD020000
heap
page read and write
1F0C8170000
heap
page read and write
1FEDD210000
trusted library allocation
page read and write
1FEF5AE0000
heap
page read and write
1FEDD370000
trusted library allocation
page read and write
7FFAAC5E0000
trusted library allocation
page read and write
1F0CA051000
trusted library allocation
page read and write
4D4EFFE000
stack
page read and write
1FEDD370000
trusted library allocation
page read and write
1FEDD380000
trusted library allocation
page read and write
1FEDD380000
trusted library allocation
page read and write
1FEDD363000
trusted library allocation
page read and write
1FEDD410000
heap
page execute and read and write
1FEDB6D2000
heap
page read and write
7FFAAC610000
trusted library allocation
page execute and read and write
1FEDD249000
heap
page read and write
1F0C82D3000
heap
page read and write
1F0C8470000
heap
page readonly
1FEDD380000
trusted library allocation
page read and write
7FFAAC445000
trusted library allocation
page read and write
7FFAAC4F0000
trusted library allocation
page execute and read and write
1FEDD380000
trusted library allocation
page read and write
1FEDB6B9000
heap
page read and write
4D4F17E000
stack
page read and write
7B648FB000
stack
page read and write
7FFAAC434000
trusted library allocation
page read and write
1FEDD350000
trusted library allocation
page read and write
1F0CDE79000
trusted library allocation
page read and write
7DF417110000
trusted library allocation
page execute and read and write
1FEDB770000
heap
page read and write
1F0C828B000
heap
page read and write
1F0C81B0000
heap
page read and write
1F0CFC79000
trusted library allocation
page read and write
1FEDD370000
trusted library allocation
page read and write
7B63DCE000
stack
page read and write
7FFAAC4E6000
trusted library allocation
page read and write
1FEDD247000
heap
page read and write
7FFAAC550000
trusted library allocation
page execute and read and write
1F0C81E0000
heap
page read and write
1F0CCA79000
trusted library allocation
page read and write
1FEDB660000
heap
page read and write
1F0CA279000
trusted library allocation
page read and write
1FEDB75C000
heap
page read and write
7B6437E000
stack
page read and write
1F0D1079000
trusted library allocation
page read and write
1FEDD109000
heap
page read and write
1FEDD363000
trusted library allocation
page read and write
1FEDD383000
trusted library allocation
page read and write
1FEF5B84000
heap
page read and write
1FEDD240000
heap
page read and write
1FEDD3B0000
heap
page execute and read and write
1FEDD241000
heap
page read and write
7FFAAC600000
trusted library allocation
page read and write
1F0C827E000
heap
page read and write
1FEDD054000
heap
page read and write
4D4EB33000
stack
page read and write
4D4F0FE000
stack
page read and write
1FEDD024000
heap
page read and write
1F0C8281000
heap
page read and write
7B652CE000
stack
page read and write
1FEDD050000
heap
page read and write
1FEED429000
trusted library allocation
page read and write
4D4EBBE000
stack
page read and write
7B645FC000
stack
page read and write
1F0D0679000
trusted library allocation
page read and write
1F0C8140000
heap
page read and write
1FEDB690000
heap
page read and write
1FEDD360000
trusted library allocation
page read and write
1F0CE879000
trusted library allocation
page read and write
4D4F07E000
stack
page read and write
1FEDD0F0000
heap
page readonly
4D4EE7E000
stack
page read and write
1FEDB850000
heap
page read and write
1FEDD390000
trusted library allocation
page read and write
1F0C83D0000
trusted library allocation
page read and write
1FEDD370000
trusted library allocation
page read and write
1FEDD370000
trusted library allocation
page read and write
1F0C8460000
trusted library allocation
page read and write
7FFAAC4E0000
trusted library allocation
page read and write
4D4EEFE000
stack
page read and write
1FEDB772000
heap
page read and write
1FEDD3A0000
trusted library allocation
page read and write
1F0C82C7000
heap
page read and write
1FEDD390000
trusted library allocation
page read and write
1F0C9C80000
direct allocation
page execute and read and write
1FEDB75C000
heap
page read and write
1FEDB75F000
heap
page read and write
1FEDD090000
heap
page read and write
1FEDD220000
heap
page read and write
7FFAAC43D000
trusted library allocation
page execute and read and write
1F0C8430000
trusted library allocation
page read and write
1FEDD421000
trusted library allocation
page read and write
1FEDD0C0000
trusted library allocation
page read and write
7FFAAC433000
trusted library allocation
page execute and read and write
1F0CB679000
trusted library allocation
page read and write
1FEDB6FD000
heap
page read and write
7FFAAC5D4000
trusted library allocation
page read and write
7B64075000
stack
page read and write
7FFAAC5DD000
trusted library allocation
page execute and read and write
7B64479000
stack
page read and write
1FEDB744000
heap
page read and write
7FFAAC440000
trusted library allocation
page read and write
1F0C829F000
heap
page read and write
There are 172 hidden memdumps, click here to show them.