IOC Report
load_startup_camper.txt.ps1

loading gif

Files

File Path
Type
Category
Malicious
load_startup_camper.txt.ps1
ASCII text
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0pxpbh21.pun.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wmyrilbp.ozv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\42AX6XYNXC96WRVY1YGQ.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\load_startup_camper.txt.ps1"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://194.163.130.194:8088
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://194.163.130.194:8088/gco_startup.bat
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 4 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
194.163.130.194
unknown
Germany

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF848ED0000
trusted library allocation
page execute and read and write
7FF848EC0000
trusted library allocation
page read and write
78D897E000
stack
page read and write
1CB817DD000
trusted library allocation
page read and write
7FF848FF2000
trusted library allocation
page read and write
78D978E000
stack
page read and write
1CB81619000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
7FF849000000
trusted library allocation
page execute and read and write
7FF848FCA000
trusted library allocation
page read and write
1CBF567F000
heap
page read and write
1CBF7020000
heap
page read and write
1CBF6FE0000
trusted library allocation
page read and write
1CBF56E0000
heap
page read and write
7FF848E2B000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
1CBF78FA000
heap
page read and write
78D970E000
stack
page read and write
78D810E000
stack
page read and write
7FF849170000
trusted library allocation
page read and write
1CBF74AD000
heap
page read and write
78D857B000
stack
page read and write
1CBF5683000
heap
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
78D867E000
stack
page read and write
1CB81854000
trusted library allocation
page read and write
1CBF5775000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
1CBF7871000
heap
page read and write
7FF848E12000
trusted library allocation
page read and write
78D85FF000
stack
page read and write
1CBF7906000
heap
page read and write
78D81CE000
stack
page read and write
78D8B7C000
stack
page read and write
1CBF5580000
heap
page read and write
1CBF7471000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
1CB8008A000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
78D847D000
stack
page read and write
7DF4EA910000
trusted library allocation
page execute and read and write
1CB80C32000
trusted library allocation
page read and write
1CB902FB000
trusted library allocation
page read and write
1CBF741A000
heap
page read and write
78D960F000
stack
page read and write
1CBF74B6000
heap
page read and write
7FF848E30000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
1CB90010000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
1CB81D72000
trusted library allocation
page read and write
7FF848FC1000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
78D87F7000
stack
page read and write
7FF848FB0000
trusted library allocation
page read and write
1CBF5668000
heap
page read and write
1CB90072000
trusted library allocation
page read and write
1CBF6F30000
trusted library allocation
page read and write
1CBF569F000
heap
page read and write
1CB902EC000
trusted library allocation
page read and write
78D968F000
stack
page read and write
78D89FE000
stack
page read and write
1CB81A30000
trusted library allocation
page read and write
1CBF74F5000
heap
page read and write
1CBF56C8000
heap
page read and write
1CBF74D4000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
1CBF746F000
heap
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
1CBF55E0000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
78D980A000
stack
page read and write
1CBF7090000
heap
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
1CB81620000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
1CB901B4000
trusted library allocation
page read and write
1CBF7770000
heap
page read and write
1CBF76A0000
heap
page execute and read and write
1CBF73E0000
heap
page read and write
1CB80001000
trusted library allocation
page read and write
78D88F9000
stack
page read and write
78D954E000
stack
page read and write
1CBF6FE3000
trusted library allocation
page read and write
78D988A000
stack
page read and write
1CBF56CE000
heap
page read and write
78D8877000
stack
page read and write
7FF849040000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
1CBF7740000
heap
page execute and read and write
78D8779000
stack
page read and write
78D8A7E000
stack
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
1CB90001000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
78D95CD000
stack
page read and write
78D818E000
stack
page read and write
1CBF6F70000
heap
page readonly
7FF849160000
trusted library allocation
page read and write
1CB81D08000
trusted library allocation
page read and write
78D8AF8000
stack
page read and write
1CBF54A0000
heap
page read and write
1CBF7850000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
7FF849020000
trusted library allocation
page read and write
1CBF6FA0000
heap
page read and write
1CBF55A0000
heap
page read and write
1CBF74E0000
heap
page execute and read and write
1CBF78F3000
heap
page read and write
1CBF5770000
heap
page read and write
78D84FD000
stack
page read and write
1CBF55E8000
heap
page read and write
1CB80232000
trusted library allocation
page read and write
78D86FD000
stack
page read and write
7FF8490E0000
trusted library allocation
page read and write
1CBF55F2000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
1CB81CDC000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page read and write
1CBF6F60000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
7FF8490D0000
trusted library allocation
page read and write
1CBF6F80000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
1CB81D70000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
1CBF7747000
heap
page execute and read and write
1CBF78C7000
heap
page read and write
78D8085000
stack
page read and write
1CBF7095000
heap
page read and write
There are 127 hidden memdumps, click here to show them.