Malware Analysis Report

2024-11-13 18:50

Sample ID 240713-qd4w3asapm
Target f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
SHA256 f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48
Tags
remcos 5764576 execution rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48

Threat Level: Known bad

The file f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe was found to be: Known bad.

Malicious Activity Summary

remcos 5764576 execution rat

Remcos

Command and Scripting Interpreter: PowerShell

Checks computer location settings

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Scheduled Task/Job: Scheduled Task

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-07-13 13:09

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-13 13:09

Reported

2024-07-13 13:12

Platform

win7-20240705-en

Max time kernel

149s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe"

Signatures

Remcos

rat remcos

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Enumerates physical storage devices

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2508 wrote to memory of 1988 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2508 wrote to memory of 1988 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2508 wrote to memory of 1988 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2508 wrote to memory of 1988 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2508 wrote to memory of 2868 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Windows\SysWOW64\schtasks.exe
PID 2508 wrote to memory of 2868 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Windows\SysWOW64\schtasks.exe
PID 2508 wrote to memory of 2868 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Windows\SysWOW64\schtasks.exe
PID 2508 wrote to memory of 2868 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Windows\SysWOW64\schtasks.exe
PID 2508 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 2508 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 2508 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 2508 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 2508 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 2508 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 2508 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 2508 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 2508 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 2508 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 2508 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 2508 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 2508 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe

Processes

C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe

"C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ppUSXdJgAIFILG.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ppUSXdJgAIFILG" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3C07.tmp"

C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe

"C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe"

Network

Country Destination Domain Proto
SG 172.93.218.178:45667 tcp
US 8.8.8.8:53 geoplugin.net udp
NL 178.237.33.50:80 geoplugin.net tcp

Files

memory/2508-0-0x0000000073ECE000-0x0000000073ECF000-memory.dmp

memory/2508-1-0x0000000000F50000-0x0000000001050000-memory.dmp

memory/2508-2-0x0000000073EC0000-0x00000000745AE000-memory.dmp

memory/2508-3-0x00000000004D0000-0x00000000004E0000-memory.dmp

memory/2508-4-0x0000000000640000-0x000000000064E000-memory.dmp

memory/2508-5-0x0000000005070000-0x000000000512E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp3C07.tmp

MD5 dc5c8be200286eb526a5f958ef0ecd85
SHA1 93e2babcc32e4caef2e806bb4a6cdde6aad65bd2
SHA256 b5d98f74df457536761b1fa5badaee5ec5cfc64e087eb39b6babdce5831d267f
SHA512 42b04c99a5a1bd36472253bb6c6845326b78becd84408289f11a8fe68f0ed49cfea147c1fbdc316e60482ead2155fe62a4ee06fabec043df664c25c5cf714c5d

memory/2732-11-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2732-13-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2732-28-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2732-33-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2732-32-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2732-31-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2732-25-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2732-23-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2732-22-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2732-19-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2732-17-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2508-34-0x0000000073EC0000-0x00000000745AE000-memory.dmp

memory/2732-15-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2732-27-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2732-35-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2732-36-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2732-37-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2732-40-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2732-41-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2732-42-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2732-43-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2732-44-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2732-45-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2732-46-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2732-47-0x0000000000400000-0x000000000047F000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-13 13:09

Reported

2024-07-13 13:12

Platform

win10v2004-20240709-en

Max time kernel

150s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe"

Signatures

Remcos

rat remcos

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe N/A

Enumerates physical storage devices

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4528 wrote to memory of 2200 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4528 wrote to memory of 2200 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4528 wrote to memory of 2200 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4528 wrote to memory of 3468 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Windows\SysWOW64\schtasks.exe
PID 4528 wrote to memory of 3468 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Windows\SysWOW64\schtasks.exe
PID 4528 wrote to memory of 3468 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Windows\SysWOW64\schtasks.exe
PID 4528 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 4528 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 4528 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 4528 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 4528 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 4528 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 4528 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 4528 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 4528 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 4528 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 4528 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe
PID 4528 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe

Processes

C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe

"C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ppUSXdJgAIFILG.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ppUSXdJgAIFILG" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9E24.tmp"

C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe

"C:\Users\Admin\AppData\Local\Temp\f6bf4471924e9dba31be59f8b96df06d02c69416c4c0518148507ff5b8f7cd48.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 25.140.123.92.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
SG 172.93.218.178:45667 tcp
US 8.8.8.8:53 178.218.93.172.in-addr.arpa udp
US 8.8.8.8:53 geoplugin.net udp
NL 178.237.33.50:80 geoplugin.net tcp
US 8.8.8.8:53 50.33.237.178.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 udp

Files

memory/4528-0-0x000000007445E000-0x000000007445F000-memory.dmp

memory/4528-1-0x00000000008E0000-0x00000000009E0000-memory.dmp

memory/4528-2-0x00000000059F0000-0x0000000005F94000-memory.dmp

memory/4528-3-0x0000000005440000-0x00000000054D2000-memory.dmp

memory/4528-4-0x0000000074450000-0x0000000074C00000-memory.dmp

memory/4528-5-0x00000000053E0000-0x00000000053EA000-memory.dmp

memory/4528-6-0x00000000056D0000-0x00000000056E0000-memory.dmp

memory/4528-7-0x0000000005700000-0x000000000570E000-memory.dmp

memory/4528-8-0x0000000006760000-0x000000000681E000-memory.dmp

memory/4528-9-0x0000000006960000-0x00000000069FC000-memory.dmp

memory/2200-14-0x0000000002590000-0x00000000025C6000-memory.dmp

memory/2200-15-0x00000000050F0000-0x0000000005718000-memory.dmp

memory/2200-16-0x0000000074450000-0x0000000074C00000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp9E24.tmp

MD5 22336515782c54107af57d050566f8a2
SHA1 bcf9f0a1866be3a6476e689090dd0e0c8ac78250
SHA256 d122629189476e01acef90f9c22271206fb8f482765471815669ba6239381e68
SHA512 752bf021e196d434ff36d3d1409c369f7f0b9a542033c10cfc8525f26e58dd08777bbc57a1da2eceba46d82d3aa866a1883c6055c7d215df7d09940126c53def

memory/2944-23-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2944-24-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2200-29-0x00000000058E0000-0x0000000005C34000-memory.dmp

memory/4528-30-0x0000000074450000-0x0000000074C00000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_whafgwn2.ej1.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2200-28-0x0000000074450000-0x0000000074C00000-memory.dmp

memory/2944-27-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2944-26-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2200-40-0x0000000005E90000-0x0000000005EAE000-memory.dmp

memory/2944-22-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2200-21-0x0000000074450000-0x0000000074C00000-memory.dmp

memory/2200-41-0x0000000005F70000-0x0000000005FBC000-memory.dmp

memory/2200-20-0x0000000005870000-0x00000000058D6000-memory.dmp

memory/2200-19-0x0000000005790000-0x00000000057F6000-memory.dmp

memory/2200-18-0x0000000004FF0000-0x0000000005012000-memory.dmp

memory/2944-43-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2944-42-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2944-44-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2200-45-0x0000000006E40000-0x0000000006E72000-memory.dmp

memory/2200-46-0x0000000074CD0000-0x0000000074D1C000-memory.dmp

memory/2200-56-0x0000000006E20000-0x0000000006E3E000-memory.dmp

memory/2200-57-0x0000000007080000-0x0000000007123000-memory.dmp

memory/2200-60-0x0000000007820000-0x0000000007E9A000-memory.dmp

memory/2200-61-0x00000000071D0000-0x00000000071EA000-memory.dmp

memory/2200-62-0x0000000007240000-0x000000000724A000-memory.dmp

memory/2200-63-0x0000000007450000-0x00000000074E6000-memory.dmp

memory/2200-64-0x00000000073D0000-0x00000000073E1000-memory.dmp

memory/2200-65-0x0000000007400000-0x000000000740E000-memory.dmp

memory/2200-66-0x0000000007410000-0x0000000007424000-memory.dmp

memory/2200-67-0x0000000007510000-0x000000000752A000-memory.dmp

memory/2200-68-0x00000000074F0000-0x00000000074F8000-memory.dmp

memory/2200-71-0x0000000074450000-0x0000000074C00000-memory.dmp

memory/2944-72-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2944-73-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2944-74-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2944-75-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2944-76-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2944-77-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2944-78-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2944-79-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2944-80-0x0000000000400000-0x000000000047F000-memory.dmp