IOC Report
out.ps1

loading gif

Files

File Path
Type
Category
Malicious
out.ps1
ASCII text, with CRLF line terminators
initial sample
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e0cataul.khf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nmdfldxj.asq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MLDESZF1PHYFYUMBZZX3.temp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\out.ps1"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://tox.chat/
unknown
https://aka.ms/pscore6
unknown
https://aka.ms/pscore68
unknown
https://tox.chat/X
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1D3039E0000
heap
page read and write
1D31DA57000
heap
page execute and read and write
1D3158F4000
trusted library allocation
page read and write
1D305E6F000
trusted library allocation
page read and write
1D31D965000
heap
page read and write
1D305D76000
trusted library allocation
page read and write
123ED7D000
stack
page read and write
1D31DB91000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
1D3058A3000
trusted library allocation
page read and write
1D305D6E000
trusted library allocation
page read and write
1D305D35000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1D305F4F000
trusted library allocation
page read and write
123F3BE000
stack
page read and write
1D31D977000
heap
page read and write
7FFD9B782000
trusted library allocation
page read and write
1D31DBAE000
heap
page read and write
1D303898000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1D30592C000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
1D303931000
heap
page read and write
7FFD9B931000
trusted library allocation
page read and write
1D31D880000
heap
page read and write
1D303981000
heap
page read and write
1D3058CC000
trusted library allocation
page read and write
123EEFE000
stack
page read and write
123F0BE000
stack
page read and write
1D305DBB000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1D31D8CF000
heap
page read and write
123F33E000
stack
page read and write
1D3059A6000
trusted library allocation
page read and write
123EE7B000
stack
page read and write
123EDFE000
stack
page read and write
123F1BC000
stack
page read and write
1D303957000
heap
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
1D31D8C9000
heap
page read and write
1D3059AD000
trusted library allocation
page read and write
1D31D968000
heap
page read and write
123EF7F000
stack
page read and write
1D306138000
trusted library allocation
page read and write
123F136000
stack
page read and write
123F4BB000
stack
page read and write
1D305220000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
1D303951000
heap
page read and write
1D315881000
trusted library allocation
page read and write
1D3039E5000
heap
page read and write
1D305C70000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
123F239000
stack
page read and write
1D30591F000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1D31DA50000
heap
page execute and read and write
7FFD9B9A0000
trusted library allocation
page read and write
1D31D940000
heap
page read and write
1D3059ED000
trusted library allocation
page read and write
1D305380000
heap
page read and write
1D303941000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
1D305210000
heap
page readonly
1D305881000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
1D305BA4000
trusted library allocation
page read and write
1D3038A2000
heap
page read and write
1D305999000
trusted library allocation
page read and write
1D31D8C4000
heap
page read and write
123F2BE000
stack
page read and write
1D3058CF000
trusted library allocation
page read and write
1D305360000
heap
page execute and read and write
123E9D5000
stack
page read and write
7DF4A34B0000
trusted library allocation
page execute and read and write
7FFD9B920000
trusted library allocation
page read and write
1D305870000
heap
page read and write
1D303840000
heap
page read and write
1D303740000
heap
page read and write
123F077000
stack
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
1D303820000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
1D30393D000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1D3058ED000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1D31D8CC000
heap
page read and write
7FFD9B93A000
trusted library allocation
page read and write
1D305240000
heap
page read and write
1D31DB7C000
heap
page read and write
1D305E10000
trusted library allocation
page read and write
123ECFE000
stack
page read and write
1D31DB60000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
1D306132000
trusted library allocation
page read and write
123F43E000
stack
page read and write
1D3038D8000
heap
page read and write
1D303890000
heap
page read and write
123EFFD000
stack
page read and write
1D30397B000
heap
page read and write
1D31D95D000
heap
page read and write
1D303990000
heap
page read and write
1D305D66000
trusted library allocation
page read and write
1D3059A9000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
1D31D971000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1D305200000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
1D305245000
heap
page read and write
1D31D914000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
1D305A86000
trusted library allocation
page read and write
1D3051D0000
trusted library allocation
page read and write
1D30589B000
trusted library allocation
page read and write
7FFD9B962000
trusted library allocation
page read and write
1D30391B000
heap
page read and write
1D31D916000
heap
page read and write
1D305290000
heap
page execute and read and write
123EC7E000
stack
page read and write
1D31DA80000
heap
page read and write
1D315890000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
There are 128 hidden memdumps, click here to show them.