IOC Report
script.ps1

loading gif

Files

File Path
Type
Category
Malicious
script.ps1
Unicode text, UTF-8 text, with very long lines (11724)
initial sample
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3lzrlpei.u5a.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xpumcbu2.euy.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6KV3ER4DHL09F2229XEM.temp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\script.ps1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
2AACE193000
heap
page read and write
2AACDFF0000
trusted library allocation
page read and write
2AAB65BC000
trusted library allocation
page read and write
2AAB62E3000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AACE149000
heap
page read and write
2AACDFF0000
trusted library allocation
page read and write
2AAB5F53000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
7FFBAD410000
trusted library allocation
page read and write
7FFBAD430000
trusted library allocation
page read and write
2AAB40C8000
heap
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AACE000000
trusted library allocation
page read and write
2AAB4140000
trusted library allocation
page read and write
7FFBAD490000
trusted library allocation
page read and write
7FFBAD230000
trusted library allocation
page execute and read and write
2AAB5F60000
trusted library allocation
page read and write
7FFBAD3E0000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
FD74E7E000
stack
page read and write
7FFBAD256000
trusted library allocation
page execute and read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB63FB000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AAB5F6A000
trusted library allocation
page read and write
7FFBAD470000
trusted library allocation
page read and write
2AAB3E20000
heap
page read and write
2AAB5F54000
trusted library allocation
page read and write
2AACE0EB000
heap
page read and write
2AAB59A0000
trusted library allocation
page read and write
7FFBAD4B0000
trusted library allocation
page read and write
2AAB5A70000
heap
page read and write
2AAB65CD000
trusted library allocation
page read and write
2AACE12A000
heap
page read and write
2AACDFF0000
trusted library allocation
page read and write
2AAB3FB0000
heap
page read and write
2AAB5FE2000
trusted library allocation
page read and write
FD74EF8000
stack
page read and write
FD74DFD000
stack
page read and write
FD74BFE000
stack
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB65E6000
trusted library allocation
page read and write
2AAB5F66000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB640C000
trusted library allocation
page read and write
2AAB5F51000
trusted library allocation
page read and write
2AAB650A000
trusted library allocation
page read and write
2AAB5A80000
trusted library allocation
page read and write
2AACE15D000
heap
page read and write
FD750B8000
stack
page read and write
7FFBAD4D0000
trusted library allocation
page read and write
2AAB6610000
trusted library allocation
page read and write
2AAB6502000
trusted library allocation
page read and write
2AACE000000
trusted library allocation
page read and write
2AAB5F59000
trusted library allocation
page read and write
2AAB5F5C000
trusted library allocation
page read and write
7FFBAD312000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AAB5F54000
trusted library allocation
page read and write
2AAB4071000
heap
page read and write
2AACDFF0000
trusted library allocation
page read and write
2AAB6592000
trusted library allocation
page read and write
FD74C7F000
stack
page read and write
2AACE123000
heap
page read and write
2AACDFF6000
trusted library allocation
page read and write
2AAB5A60000
trusted library allocation
page read and write
2AACE068000
heap
page read and write
2AAB5F6C000
trusted library allocation
page read and write
2AAB65FF000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AAC5F90000
trusted library allocation
page read and write
2AACDFFC000
trusted library allocation
page read and write
2AAB6332000
trusted library allocation
page read and write
2AAB5F67000
trusted library allocation
page read and write
7FFBAD380000
trusted library allocation
page read and write
2AAB63B7000
trusted library allocation
page read and write
2AAB5F6B000
trusted library allocation
page read and write
2AAB5F6C000
trusted library allocation
page read and write
2AAB5F54000
trusted library allocation
page read and write
2AACE141000
heap
page read and write
7DF43A540000
trusted library allocation
page execute and read and write
2AACDFFC000
trusted library allocation
page read and write
2AAB5F5E000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB5F51000
trusted library allocation
page read and write
2AAB65D5000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AACE160000
heap
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AAB6512000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB4044000
heap
page read and write
7FFBAD174000
trusted library allocation
page read and write
7FFBAD440000
trusted library allocation
page read and write
2AAB5F51000
trusted library allocation
page read and write
2AAB5F5E000
trusted library allocation
page read and write
7FFBAD400000
trusted library allocation
page read and write
2AAB6585000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AACE14C000
heap
page read and write
2AACE010000
trusted library allocation
page read and write
2AAB5F51000
trusted library allocation
page read and write
2AACE163000
heap
page read and write
7FFBAD352000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AAB5F52000
trusted library allocation
page read and write
2AACE132000
heap
page read and write
7FFBAD17D000
trusted library allocation
page execute and read and write
FD752BC000
stack
page read and write
2AAB639E000
trusted library allocation
page read and write
7FFBAD407000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AACE14A000
heap
page read and write
FD74FB7000
stack
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB5AC5000
heap
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB5F54000
trusted library allocation
page read and write
7FFBAD3D0000
trusted library allocation
page read and write
2AAB4180000
heap
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
7FFBAD321000
trusted library allocation
page read and write
2AACDFF0000
trusted library allocation
page read and write
FD74D7E000
stack
page read and write
7FFBAD173000
trusted library allocation
page execute and read and write
2AAB5F55000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB6569000
trusted library allocation
page read and write
2AAB5F51000
trusted library allocation
page read and write
2AAB5F67000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AACDFF2000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AAB3FE2000
heap
page read and write
7FFBAD450000
trusted library allocation
page read and write
2AAB5960000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AACDFF0000
trusted library allocation
page read and write
2AAB406C000
heap
page read and write
7FFBAD3B0000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AACE000000
trusted library allocation
page read and write
2AAB65C4000
trusted library allocation
page read and write
2AAB65A3000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AAB3FEB000
heap
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB5F51000
trusted library allocation
page read and write
7FFBAD3A5000
trusted library allocation
page read and write
2AAB65DE000
trusted library allocation
page read and write
7FFBAD170000
trusted library allocation
page read and write
2AAB5F51000
trusted library allocation
page read and write
2AACE050000
heap
page execute and read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB3FD0000
heap
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AAB4185000
heap
page read and write
2AAB5F56000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB6607000
trusted library allocation
page read and write
2AAB5A90000
heap
page execute and read and write
2AAB5F59000
trusted library allocation
page read and write
2AACE060000
heap
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB6382000
trusted library allocation
page read and write
2AAB5F51000
trusted library allocation
page read and write
2AAB6618000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB647A000
trusted library allocation
page read and write
2AAB5F56000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
7FFBAD390000
trusted library allocation
page read and write
7FFBAD4C0000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AAB5F51000
trusted library allocation
page read and write
2AACDFF0000
trusted library allocation
page read and write
7FFBAD180000
trusted library allocation
page read and write
2AAB6396000
trusted library allocation
page read and write
2AAB5F67000
trusted library allocation
page read and write
2AAB6354000
trusted library allocation
page read and write
2AACE000000
trusted library allocation
page read and write
2AAB5F70000
heap
page read and write
2AAB62DB000
trusted library allocation
page read and write
2AACE460000
heap
page read and write
2AAB5F50000
trusted library allocation
page read and write
7FFBAD460000
trusted library allocation
page read and write
2AACE480000
heap
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB5F55000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AACE100000
heap
page read and write
2AAB6472000
trusted library allocation
page read and write
2AAB633A000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AAC5F81000
trusted library allocation
page read and write
2AACE000000
trusted library allocation
page read and write
2AACE157000
heap
page read and write
2AACDFF0000
trusted library allocation
page read and write
7FFBAD290000
trusted library allocation
page execute and read and write
7FFBAD226000
trusted library allocation
page read and write
7FFBAD370000
trusted library allocation
page read and write
2AAB3F80000
heap
page read and write
2AAB5F63000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AAB62AE000
trusted library allocation
page read and write
7FFBAD3C0000
trusted library allocation
page read and write
2AACE000000
trusted library allocation
page read and write
2AACE057000
heap
page execute and read and write
2AACDFF0000
trusted library allocation
page read and write
2AAB4160000
trusted library allocation
page read and write
2AAB5F51000
trusted library allocation
page read and write
2AACDFF3000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AACDFFD000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AAB5A00000
heap
page execute and read and write
2AAB5F50000
trusted library allocation
page read and write
2AAB5F51000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
FD74CFE000
stack
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
FD74A75000
stack
page read and write
7FFBAD220000
trusted library allocation
page read and write
2AAB6488000
trusted library allocation
page read and write
7FFBAD3A0000
trusted library allocation
page read and write
2AACDFF2000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AACDFF0000
trusted library allocation
page read and write
7FFBAD360000
trusted library allocation
page execute and read and write
2AAB5F50000
trusted library allocation
page read and write
2AACDFF0000
trusted library allocation
page read and write
2AAB5F81000
trusted library allocation
page read and write
2AAB65B4000
trusted library allocation
page read and write
7FFBAD32D000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB5F59000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
FD74F3E000
stack
page read and write
2AAB6189000
trusted library allocation
page read and write
2AAC5FDE000
trusted library allocation
page read and write
2AAB65F7000
trusted library allocation
page read and write
2AACE123000
heap
page read and write
2AAB4170000
heap
page readonly
2AAB5F50000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AAB5F52000
trusted library allocation
page read and write
2AAB5F6B000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB4098000
heap
page read and write
2AAB5F5A000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB5F53000
trusted library allocation
page read and write
2AAB637A000
trusted library allocation
page read and write
2AAB5F52000
trusted library allocation
page read and write
2AACDFF0000
trusted library allocation
page read and write
7FFBAD480000
trusted library allocation
page read and write
2AACDFF0000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
7FFBAD340000
trusted library allocation
page execute and read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
FD75039000
stack
page read and write
2AAB657B000
trusted library allocation
page read and write
2AAB5F55000
trusted library allocation
page read and write
2AACDFF0000
trusted library allocation
page read and write
7FFBAD190000
trusted library allocation
page read and write
FD7523E000
stack
page read and write
2AAB4008000
heap
page read and write
2AAB4019000
heap
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AACE13B000
heap
page read and write
FD74B7E000
stack
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB659B000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AACE0CB000
heap
page read and write
2AAB6225000
trusted library allocation
page read and write
2AAB4015000
heap
page read and write
FD7513F000
stack
page read and write
7FFBAD420000
trusted library allocation
page read and write
2AAB5F60000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AAB5F6A000
trusted library allocation
page read and write
2AACDFF0000
trusted library allocation
page read and write
2AAB5AC0000
heap
page read and write
2AAB65AB000
trusted library allocation
page read and write
2AAB6520000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
7FFBAD4A0000
trusted library allocation
page read and write
7FFBAD183000
trusted library allocation
page read and write
2AACE12D000
heap
page read and write
2AAB3F60000
heap
page read and write
2AAB6538000
trusted library allocation
page read and write
2AAB63A7000
trusted library allocation
page read and write
2AAB40A4000
heap
page read and write
2AACE147000
heap
page read and write
2AAB4042000
heap
page read and write
2AACDFF0000
trusted library allocation
page read and write
2AAB5F54000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
2AAB3FD8000
heap
page read and write
2AACDFF0000
trusted library allocation
page read and write
7FFBAD22C000
trusted library allocation
page execute and read and write
2AAB406E000
heap
page read and write
2AAB5A64000
trusted library allocation
page read and write
2AAB6329000
trusted library allocation
page read and write
2AACE020000
trusted library allocation
page read and write
2AAB402F000
heap
page read and write
2AAB5E10000
heap
page read and write
7FFBAD1CC000
trusted library allocation
page execute and read and write
2AAB5F50000
trusted library allocation
page read and write
FD751BE000
stack
page read and write
2AACE15D000
heap
page read and write
2AAB6403000
trusted library allocation
page read and write
2AAB5F59000
trusted library allocation
page read and write
2AACE108000
heap
page read and write
2AAB5F51000
trusted library allocation
page read and write
2AAB5F61000
trusted library allocation
page read and write
FD74AFE000
stack
page read and write
2AACE139000
heap
page read and write
2AACE168000
heap
page read and write
2AAB6469000
trusted library allocation
page read and write
2AAB64A4000
trusted library allocation
page read and write
2AAB65EE000
trusted library allocation
page read and write
2AAB5F51000
trusted library allocation
page read and write
7FFBAD4E0000
trusted library allocation
page read and write
2AAB5F50000
trusted library allocation
page read and write
7FFBAD3F0000
trusted library allocation
page read and write
2AACE157000
heap
page read and write
2AACE071000
heap
page read and write
2AAB5F59000
trusted library allocation
page read and write
There are 336 hidden memdumps, click here to show them.