Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2025, 15:37

General

  • Target

    BootstrapperNew.exe

  • Size

    2.5MB

  • MD5

    12c778168de4cb227283338609cce591

  • SHA1

    dd8226c477ac4a4d86c1d79dd66b8f82752b408d

  • SHA256

    3b0edfc4834e5e6e0d71cdb38b150d9a8c457dd3d9a6ce180bba01615e2da3d0

  • SHA512

    b0872ad258ad8edc68313b481ea091333d05b35ac3a17b912cd6b77ac77e6d1e7fb2ddd3be6c851761285fe1f69292b5dc781823dddca77f180d500c7d0322fe

  • SSDEEP

    49152:VZPjorfOAfRxx13BIq8IYpSqxN7XGQKoBaJ3RIrMQJZipKE1p:VZkzD73i7pSqxNV5wQJwd1p

Malware Config

Extracted

Family

xworm

C2

cause-indexes.gl.at.ply.gg:17210

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 64 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 50 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 48 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
    "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4588
    • C:\Users\Admin\AppData\Local\Temp\XClient.exe
      "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3556
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4564
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2152
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:436
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3272
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9C75.tmp.bat""
        3⤵
          PID:1380
          • C:\Windows\system32\timeout.exe
            timeout 3
            4⤵
            • Delays execution with timeout.exe
            PID:3580
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1968
      • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
        "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
        2⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:1472
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2504
        • C:\Users\Admin\AppData\Local\Temp\XClient.exe
          "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3692
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4816
        • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
          "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
          3⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:1540
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2924
          • C:\Users\Admin\AppData\Local\Temp\XClient.exe
            "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2968
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4080
          • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
            "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
            4⤵
            • Checks computer location settings
            • Suspicious use of WriteProcessMemory
            PID:4336
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4588
            • C:\Users\Admin\AppData\Local\Temp\XClient.exe
              "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2856
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2760
            • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
              "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
              5⤵
              • Checks computer location settings
              • Suspicious use of WriteProcessMemory
              PID:2228
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                6⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1964
              • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:3844
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                6⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3028
              • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                6⤵
                • Checks computer location settings
                • Suspicious use of WriteProcessMemory
                PID:4484
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                  7⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4080
                • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                  "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2560
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                  7⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4248
                • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                  "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                  7⤵
                  • Checks computer location settings
                  • Suspicious use of WriteProcessMemory
                  PID:3116
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                    8⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3464
                  • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                    "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4620
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                    8⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1984
                  • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                    "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                    8⤵
                    • Checks computer location settings
                    PID:1036
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                      9⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4672
                    • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                      "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                      9⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5016
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                      9⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1072
                    • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                      "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                      9⤵
                      • Checks computer location settings
                      PID:2416
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                        10⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2440
                      • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                        "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                        10⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4100
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                        10⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2656
                      • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                        "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                        10⤵
                        • Checks computer location settings
                        PID:4004
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                          11⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2032
                        • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                          "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                          11⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4400
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                          11⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2608
                        • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                          "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                          11⤵
                          • Checks computer location settings
                          PID:4388
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                            12⤵
                            • Command and Scripting Interpreter: PowerShell
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2416
                          • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                            "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                            12⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4640
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                            12⤵
                            • Command and Scripting Interpreter: PowerShell
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2624
                          • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                            "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                            12⤵
                            • Checks computer location settings
                            PID:4128
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                              13⤵
                              • Command and Scripting Interpreter: PowerShell
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4896
                            • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                              "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                              13⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4308
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                              13⤵
                              • Command and Scripting Interpreter: PowerShell
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1376
                            • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                              "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                              13⤵
                              • Checks computer location settings
                              PID:4244
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                14⤵
                                • Command and Scripting Interpreter: PowerShell
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4156
                              • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                14⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2856
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                14⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3752
                              • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                14⤵
                                • Checks computer location settings
                                PID:3444
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                  15⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3492
                                • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                  "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                  15⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1028
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                  15⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3012
                                • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                  "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                  15⤵
                                  • Checks computer location settings
                                  PID:2284
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                    16⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4724
                                  • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                    "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                    16⤵
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1716
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                    16⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:436
                                  • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                    "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                    16⤵
                                    • Checks computer location settings
                                    PID:3008
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                      17⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4928
                                    • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                      "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                      17⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4632
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                      17⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4852
                                    • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                      "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                      17⤵
                                      • Checks computer location settings
                                      PID:2016
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                        18⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1916
                                      • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                        "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                        18⤵
                                        • Executes dropped EXE
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1216
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                        18⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2384
                                      • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                        "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                        18⤵
                                        • Checks computer location settings
                                        PID:808
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                          19⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4724
                                        • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                          "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                          19⤵
                                          • Executes dropped EXE
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4620
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                          19⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4504
                                        • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                          "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                          19⤵
                                          • Checks computer location settings
                                          PID:2020
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                            20⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:3704
                                          • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                            "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                            20⤵
                                            • Executes dropped EXE
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:5100
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                            20⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:5048
                                          • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                            "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                            20⤵
                                            • Checks computer location settings
                                            PID:2264
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                              21⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2240
                                            • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                              "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                              21⤵
                                              • Executes dropped EXE
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3084
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                              21⤵
                                                PID:4444
                                              • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                21⤵
                                                • Checks computer location settings
                                                PID:3564
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                  22⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  PID:1456
                                                • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                  22⤵
                                                  • Executes dropped EXE
                                                  PID:4308
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                  22⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  PID:1808
                                                • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                  22⤵
                                                  • Checks computer location settings
                                                  PID:2260
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                    23⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    PID:2284
                                                  • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                    23⤵
                                                    • Executes dropped EXE
                                                    PID:2744
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                    23⤵
                                                      PID:4648
                                                    • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                      23⤵
                                                      • Checks computer location settings
                                                      PID:3956
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                        24⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:3104
                                                      • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                        24⤵
                                                        • Executes dropped EXE
                                                        PID:3016
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                        24⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:5004
                                                      • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                        24⤵
                                                        • Checks computer location settings
                                                        PID:740
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                          25⤵
                                                            PID:4640
                                                          • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                            25⤵
                                                            • Executes dropped EXE
                                                            PID:1996
                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                            25⤵
                                                              PID:1864
                                                            • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                              25⤵
                                                              • Checks computer location settings
                                                              PID:4440
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                26⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                PID:1540
                                                              • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                26⤵
                                                                • Executes dropped EXE
                                                                PID:3328
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                26⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                PID:1660
                                                              • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                26⤵
                                                                • Checks computer location settings
                                                                PID:2240
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                  27⤵
                                                                  • Command and Scripting Interpreter: PowerShell
                                                                  PID:2440
                                                                • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                  27⤵
                                                                  • Executes dropped EXE
                                                                  PID:4692
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                  27⤵
                                                                    PID:4444
                                                                  • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                    27⤵
                                                                    • Checks computer location settings
                                                                    PID:1012
                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                      28⤵
                                                                        PID:4712
                                                                      • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                        28⤵
                                                                        • Executes dropped EXE
                                                                        PID:752
                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                        28⤵
                                                                          PID:3996
                                                                        • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                          28⤵
                                                                          • Checks computer location settings
                                                                          PID:4936
                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                            29⤵
                                                                            • Command and Scripting Interpreter: PowerShell
                                                                            PID:3236
                                                                          • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                            29⤵
                                                                            • Executes dropped EXE
                                                                            PID:1076
                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                            29⤵
                                                                              PID:2656
                                                                            • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                              29⤵
                                                                              • Checks computer location settings
                                                                              PID:3616
                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                30⤵
                                                                                  PID:4416
                                                                                • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                  30⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:5060
                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                                  30⤵
                                                                                    PID:3928
                                                                                  • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                                    30⤵
                                                                                    • Checks computer location settings
                                                                                    PID:5100
                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                      31⤵
                                                                                        PID:3492
                                                                                      • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                        31⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:4100
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                                        31⤵
                                                                                          PID:3696
                                                                                        • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                                          31⤵
                                                                                          • Checks computer location settings
                                                                                          PID:2520
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                            32⤵
                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                            PID:4724
                                                                                          • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                            32⤵
                                                                                            • Executes dropped EXE
                                                                                            PID:4956
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                                            32⤵
                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                            PID:4896
                                                                                          • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                                            32⤵
                                                                                            • Checks computer location settings
                                                                                            PID:4736
                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                              33⤵
                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                              PID:3748
                                                                                            • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                              33⤵
                                                                                              • Executes dropped EXE
                                                                                              PID:2264
                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                                              33⤵
                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                              PID:4924
                                                                                            • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                                              33⤵
                                                                                              • Checks computer location settings
                                                                                              PID:2724
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                                34⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                PID:4488
                                                                                              • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                                34⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:968
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                                                34⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                PID:2480
                                                                                              • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                                                34⤵
                                                                                                • Checks computer location settings
                                                                                                PID:4244
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                                  35⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  PID:3916
                                                                                                • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                                  35⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:2384
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                                                  35⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  PID:812
                                                                                                • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                                                  35⤵
                                                                                                  • Checks computer location settings
                                                                                                  PID:4240
                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                                    36⤵
                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                    PID:4128
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                                    36⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:384
                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                                                    36⤵
                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                    PID:3752
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                                                    36⤵
                                                                                                    • Checks computer location settings
                                                                                                    PID:4424
                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                                      37⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      PID:2364
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                                      37⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:4364
                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                                                      37⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      PID:4324
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                                                      37⤵
                                                                                                      • Checks computer location settings
                                                                                                      PID:2416
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                                        38⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        PID:3904
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                                        38⤵
                                                                                                        • Checks computer location settings
                                                                                                        • Drops startup file
                                                                                                        • Executes dropped EXE
                                                                                                        • Adds Run key to start application
                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                        PID:2012
                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                                          39⤵
                                                                                                            PID:2504
                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
                                                                                                            39⤵
                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                            PID:4588
                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'
                                                                                                            39⤵
                                                                                                              PID:2620
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
                                                                                                              39⤵
                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                              PID:3636
                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                                                            38⤵
                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                            PID:3404
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                                                            38⤵
                                                                                                            • Checks computer location settings
                                                                                                            PID:3512
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                                              39⤵
                                                                                                                PID:1188
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                                                39⤵
                                                                                                                • Executes dropped EXE
                                                                                                                PID:3164
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                                                                39⤵
                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                PID:1492
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                                                                39⤵
                                                                                                                • Checks computer location settings
                                                                                                                PID:2412
                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                                                  40⤵
                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                  PID:4248
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                                                  40⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  PID:3324
                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                                                                  40⤵
                                                                                                                    PID:3420
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                                                                    40⤵
                                                                                                                    • Checks computer location settings
                                                                                                                    PID:468
                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                                                      41⤵
                                                                                                                        PID:1948
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                                                        41⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        PID:4504
                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                                                                        41⤵
                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                        PID:1564
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                                                                        41⤵
                                                                                                                        • Checks computer location settings
                                                                                                                        PID:4808
                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                                                          42⤵
                                                                                                                            PID:400
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                                                            42⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:4652
                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                                                                            42⤵
                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                            PID:1916
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                                                                            42⤵
                                                                                                                            • Checks computer location settings
                                                                                                                            PID:404
                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                                                              43⤵
                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                              PID:1556
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                                                              43⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              PID:680
                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                                                                              43⤵
                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                              PID:1684
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                                                                              43⤵
                                                                                                                              • Checks computer location settings
                                                                                                                              PID:1340
                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                                                                44⤵
                                                                                                                                  PID:864
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                                                                  44⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  PID:1504
                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                                                                                  44⤵
                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                  PID:5004
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                                                                                  44⤵
                                                                                                                                  • Checks computer location settings
                                                                                                                                  PID:3748
                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                                                                    45⤵
                                                                                                                                      PID:4564
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                                                                      45⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      PID:232
                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                                                                                      45⤵
                                                                                                                                        PID:872
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                                                                                        45⤵
                                                                                                                                        • Checks computer location settings
                                                                                                                                        PID:5064
                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                                                                          46⤵
                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                          PID:1556
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                                                                          46⤵
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          PID:1540
                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                                                                                          46⤵
                                                                                                                                            PID:2304
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                                                                                            46⤵
                                                                                                                                            • Checks computer location settings
                                                                                                                                            PID:4324
                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                                                                              47⤵
                                                                                                                                                PID:2388
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                                                                                47⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                PID:1032
                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                                                                                                47⤵
                                                                                                                                                  PID:4368
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                                                                                                  47⤵
                                                                                                                                                  • Checks computer location settings
                                                                                                                                                  PID:4020
                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                                                                                    48⤵
                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                    PID:764
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                                                                                    48⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    PID:2080
                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                                                                                                    48⤵
                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                    PID:3144
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                                                                                                                    48⤵
                                                                                                                                                    • Checks computer location settings
                                                                                                                                                    PID:4680
                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                                                                                      49⤵
                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                      PID:2856
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                                                                                      49⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      PID:664
                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe'
                                                                                                                                                      49⤵
                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                      PID:4756

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\BootstrapperNew.exe.log

                                                      Filesize

                                                      654B

                                                      MD5

                                                      2ff39f6c7249774be85fd60a8f9a245e

                                                      SHA1

                                                      684ff36b31aedc1e587c8496c02722c6698c1c4e

                                                      SHA256

                                                      e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

                                                      SHA512

                                                      1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      d85ba6ff808d9e5444a4b369f5bc2730

                                                      SHA1

                                                      31aa9d96590fff6981b315e0b391b575e4c0804a

                                                      SHA256

                                                      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                      SHA512

                                                      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      eb1ad317bd25b55b2bbdce8a28a74a94

                                                      SHA1

                                                      98a3978be4d10d62e7411946474579ee5bdc5ea6

                                                      SHA256

                                                      9e94e7c9ac6134ee30e79498558aa1a5a1ac79a643666c3f8922eed215dd3a98

                                                      SHA512

                                                      d011f266c0240d84470c0f9577cd9e4927309bd19bb38570ca9704ed8e1d159f9bea982a59d3eefef72ce7a10bd81208b82e88ef57c7af587f7437a89769adc0

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      54522d22658e4f8f87ecb947b71b8feb

                                                      SHA1

                                                      6a6144bdf9c445099f52211b6122a2ecf72b77e9

                                                      SHA256

                                                      af18fc4864bc2982879aed928c960b6266f372c928f8c9632c5a4eecd64e448a

                                                      SHA512

                                                      55f2c5a455be20dcb4cb93a29e5389e0422237bdd7ac40112fec6f16a36e5e19df50d25d39a6d5acb2d41a96514c7ecd8631ce8e67c4ff04997282f49d947aba

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      96e3b86880fedd5afc001d108732a3e5

                                                      SHA1

                                                      8fc17b39d744a9590a6d5897012da5e6757439a3

                                                      SHA256

                                                      c3077e4cadb4ed246c02abe55aa6cf832fee4c2546b7addb7d22cd1c7c8c1294

                                                      SHA512

                                                      909b1968f7204fa7029109b02232d8cc5438f6b4dc7c9044e4e47c59fcee538199b13029e36592b12ed573d48a308dd4822d2ced4129ab08d4111897e02be55d

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      15dde0683cd1ca19785d7262f554ba93

                                                      SHA1

                                                      d039c577e438546d10ac64837b05da480d06bf69

                                                      SHA256

                                                      d6fa39eab7ee36f44dc3f9f2839d098433db95c1eba924e4bcf4e5c0d268d961

                                                      SHA512

                                                      57c0e1b87bc1c136f0d39f3ce64bb8f8274a0491e4ca6e45e5c7f9070aa9d9370c6f590ce37cd600b252df2638d870205249a514c43245ca7ed49017024a4672

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      dcac476fa19b9b7e00d97d937daf7e9f

                                                      SHA1

                                                      2753854fb9097e0c50667c4df11e336bada512e2

                                                      SHA256

                                                      ebbf20b0c098d467090c4115109b5f707b559a8006e9c17f00235a5d23d60399

                                                      SHA512

                                                      81d587000267413d0b829d783aa2ea4d6f7dfdf991d0463cd49bae3090f36db0b16a63b1ca28ae9a8e52fe2a516bffbad3ff624d5b55e8956d728bb44ed5ea4f

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      10890cda4b6eab618e926c4118ab0647

                                                      SHA1

                                                      1e1d63b73a0e6c7575f458b3c7917a9ce5ba776d

                                                      SHA256

                                                      00f8a035324d39bd62e6dee5e1b480069015471c487ebee4479e6990ea9ddb14

                                                      SHA512

                                                      a2ee84006c24a36f25e0bca0772430d64e3791f233da916aecdeae6712763e77d55bbbd00dc8f6b2b3887f3c26ab3980b96c5f46cc823e81e28abbbc5fc78221

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      a2c8179aaa149c0b9791b73ce44c04d1

                                                      SHA1

                                                      703361b0d43ec7f669304e7c0ffbbfdeb1e484ff

                                                      SHA256

                                                      c1d30342a40a2b6e7553da30ceb85754d33820f6fbb3bbbed1ceb30d6390de4a

                                                      SHA512

                                                      2e201dd457d055baad86f68c15bcc7beb48d6dc2ffc10db7f304eb93f697e7b45991cbde857d25da2c9c60c23f3e13df8b5ed5809c1753737a23096e296cc9e3

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      465286a9b31a4fa4831f9d3a2925c88e

                                                      SHA1

                                                      4ba832802f83872ff47a59ace1057bceb38a1955

                                                      SHA256

                                                      24522f12ccd8284ed705803f2c1a3b12ba7d675d300fed443ca9eb55fead55fb

                                                      SHA512

                                                      84e4d5f00257670fea86e4397f3b814174609daf24488a82c4ce726f81b5891561a8c56d4053c76a8bc27318685d482dae5e15ba28c1cd14049c15bd552f95f5

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      60945d1a2e48da37d4ce8d9c56b6845a

                                                      SHA1

                                                      83e80a6acbeb44b68b0da00b139471f428a9d6c1

                                                      SHA256

                                                      314b91c00997034d6e015f40230d90ebbf57de5dc938b62c1a214d591793dbe3

                                                      SHA512

                                                      5d068f1d6443e26ae3cad1c80f969e50e5860967b314153c4d3b6efd1cfa39f0907c6427bec7fa43db079f258b6357e4e9a1b0b1a36b1481d2049ea0e67909ed

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      a1008cfb29cdc25b4180c736ec404335

                                                      SHA1

                                                      39760fbcc8c1a64e856e98d61ce194d39b727438

                                                      SHA256

                                                      0eb4209b0f8c0dce02580b4d3ec5692d33be08b1a61858aad0413116afc95558

                                                      SHA512

                                                      00c2cde1601217c28fd71c2daefb21c7fcfeeee7e6badcd1b7f353f4e6df7817f5c4665148a1468b10ea31547642b999e3db5914d6e5f0cb1123243fd9ef213f

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      98baf5117c4fcec1692067d200c58ab3

                                                      SHA1

                                                      5b33a57b72141e7508b615e17fb621612cb8e390

                                                      SHA256

                                                      30bf8496e9a08f4fdfe4767abcd565f92b6da06ca1c7823a70cb7cab16262e51

                                                      SHA512

                                                      344a70bfc037d54176f12db91f05bf4295bb587a5062fd1febe6f52853571170bd8ef6042cb87b893185bbae1937cf77b679d7970f8cc1c2666b0b7c1b32987d

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      01fff31a70e26012f37789b179059e32

                                                      SHA1

                                                      555b6f05cce7daf46920df1c01eb5c55dc62c9e6

                                                      SHA256

                                                      adf65afaf1c83572f05a99bf2ede8eb7be1aab0717d5254f501d5e09ba6f587b

                                                      SHA512

                                                      ac310c9bc5c1effc45e1e425972b09d1f961af216b50e1a504caa046b7f1a5f3179760e0b29591d83756ecb686d17a24770cf06fcea57e6f287ca5bbf6b6971b

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      8ac2774493ffb4489983d3f6dc2a3241

                                                      SHA1

                                                      9a27e9ed279b3494f9964638cb0138f5ed3b7adf

                                                      SHA256

                                                      5055352f75e942b8cac302cef812b089a7172b7d327edda491c82343abda540f

                                                      SHA512

                                                      b8caac9024381da085f131652690eac73b469451f310c19c661f5cf11cea11175dd2be4209e6c9d39c82516769c7c5f29389650862f6ab35bd1b07a8f5a68a32

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      47605a4dda32c9dff09a9ca441417339

                                                      SHA1

                                                      4f68c895c35b0dc36257fc8251e70b968c560b62

                                                      SHA256

                                                      e6254c2bc9846a76a4567ab91b6eae76e937307ff9301b65d577ffe6e15fe40a

                                                      SHA512

                                                      b6823b6e794a2fe3e4c4ecfb3f0d61a54821de7feb4f9e3e7fd463e7fbb5e6848f59865b487dafebeac431e4f4db81ef56836d94cac67da39852c566ed34a885

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      2d06ce10e4e5b9e174b5ebbdad300fad

                                                      SHA1

                                                      bcc1c231e22238cef02ae25331320060ada2f131

                                                      SHA256

                                                      87d1dd56f12a88907ba5aebca8d555443d6f77ed214497277cc8bcd31c669f2c

                                                      SHA512

                                                      38cfbeb59605854ae4fcfae8619a6b26bd916148acfb5636383672a3960b45ca41fed5c241f97465129e92eaf78c4c85dcf258f1ab501a2bf771287ce04f76a7

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      be67063c62a242565760a02a642a9f02

                                                      SHA1

                                                      d1043a892b44d6676f71b568f578fff947266a19

                                                      SHA256

                                                      56f158298dc5f781d6636a0b15d040f9cffb1d46cd11079aa40a26b662217f48

                                                      SHA512

                                                      90d2cbd882ff8043412ad25e74df0cf6b71d6f3fbdfa6f1efa0efc8eed86a925606c7d2e967f112a34d3f0e04f01a396898508571400dcf7e6fd69e78f406638

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      19e1e2a79d89d1a806d9f998551c82a8

                                                      SHA1

                                                      3ea8c6b09bcaa874efc3a220f6f61eed4be85ebd

                                                      SHA256

                                                      210f353fbdf0ed0f95aec9d76a455c1e92f96000551a875c5de55cfa712f4adc

                                                      SHA512

                                                      da427ad972596f8f795ae978337e943cb07f9c5a2ed1c8d1f1cad27c07dcec2f4d4ffe9424db2b90fcba3c2f301524f52931a863efae38fca2bef1def53567b8

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      d8cb3e9459807e35f02130fad3f9860d

                                                      SHA1

                                                      5af7f32cb8a30e850892b15e9164030a041f4bd6

                                                      SHA256

                                                      2b139c74072ccbdaa17b950f32a6dbc934dfb7af9973d97c9b0d9c498012ba68

                                                      SHA512

                                                      045239ba31367fbdd59e883f74eafc05724e23bd6e8f0c1e7171ea2496a497eb9e0cfcb57285bb81c4d569daadba43d6ef64c626ca48f1e2a59e8d97f0cc9184

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      07ab6cc81c5230a598c0ad1711b6bd97

                                                      SHA1

                                                      de7e270e12d447dfc5896b7c96777eb32725778a

                                                      SHA256

                                                      900aa2c83ec8773c3f9705f75b28fff0eaca57f7adb33dc82564d7ea8f8069a3

                                                      SHA512

                                                      ffef0ad0824ea0fdab29eb3c44448100f79365a1729c7665eba9aef85a88e60901bc6a6c248de15a28d21be9ce5839d68861e4449ff557d8845927c740ba3a25

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      77d622bb1a5b250869a3238b9bc1402b

                                                      SHA1

                                                      d47f4003c2554b9dfc4c16f22460b331886b191b

                                                      SHA256

                                                      f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                                                      SHA512

                                                      d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      0342b267f79ac6d33bf583a0b3b04dd1

                                                      SHA1

                                                      78ef2010a90ff2fa10d68628b39647d9773983ab

                                                      SHA256

                                                      dc0ea9007b6ac003b0f10a0f34361ee5defb05495c29a35d2951c4e4a604f1c5

                                                      SHA512

                                                      c484d055c44f353d1eeb1b626751d8863b0ed5af13376f46b62726568e8c7e4589986a7badf1a3de40f69c40ae6a4fa8fd4b2e47180a7cad17daa3943faf00d4

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      e25058a5d8ac6b42d8c7c9883c598303

                                                      SHA1

                                                      bd9e6194a36a959772fc020f905244900ffc3d57

                                                      SHA256

                                                      9f6fe2203df58ba90b512b436fd74f5eeb4f39f4f9f54a41e882fc54e5f35d51

                                                      SHA512

                                                      0146f2d1298acf189005217784e952d6e99bf7c8bf24ae9e9af1a2ca3d881dca39f19f3ecd06c7d0ad919bc929edaf6e97e0ab2d7f71733b9422527c594ea0c5

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      28960b97082c0672f10c400a39d01a30

                                                      SHA1

                                                      9ecc5627915ef1ca2ce78019f575574fd0bd4e25

                                                      SHA256

                                                      c18f62539bb72644b8aa389a623770348e0fa19f1ef6ae6192e7d59975fcafa8

                                                      SHA512

                                                      74529db64b20232c33b69c40b0838dd4bcf9f5f20ab52c2734f54bcbdc60dc64c840ef022545e267008686ae1d524aa82ee44f6e26a07df9e0e363b0e7eb1985

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      92075279f2dbcaa5724ee5a47e49712f

                                                      SHA1

                                                      8dd3e2faa8432dde978946ebaf9054f7c6e0b2cb

                                                      SHA256

                                                      fd985ddd090621af25aa77aebff689c95ea7679ff0e81887124b2802ae3e9442

                                                      SHA512

                                                      744c62556233d9872f43ffb5a5a98aee20a44834436306f0a948c8c4072bdb46ef8044616593747edd645caaee60faf8b14fedb2d6df5f6019b5c73357d80d22

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      dd1d0b083fedf44b482a028fb70b96e8

                                                      SHA1

                                                      dc9c027937c9f6d52268a1504cbae42a39c8d36a

                                                      SHA256

                                                      cab7944d29e0501dc0db904ac460ca7a87700e0ec7eb62298b7b97cbf40c424c

                                                      SHA512

                                                      96bec38bfda176292ae65dcf735103e7888baa212038737c1d1e215fcb76e4c0355e4a827a1934303e7aecae91012fa412f13e38f382b732758bae985cc67973

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      9bc110200117a3752313ca2acaf8a9e1

                                                      SHA1

                                                      fda6b7da2e7b0175b391475ca78d1b4cf2147cd3

                                                      SHA256

                                                      c88e4bbb64f7fa31429ebe82c1cf07785c44486f37576f783a26ac856e02a4eb

                                                      SHA512

                                                      1f1af32aa18a8cbfcc65b0d4fb7e6ca2705f125eaa85789e981ee68b90c64522e954825abf460d4b4f97567715dfae8d9b0a25a4d54d10bc4c257c472f2e80fb

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      e60eb305a7b2d9907488068b7065abd3

                                                      SHA1

                                                      1643dd7f915ac50c75bc01c53d68c5dafb9ce28d

                                                      SHA256

                                                      ad07460e061642c0dd4e7dfa7b821aacce873e290389e72f708e9f3504f9d135

                                                      SHA512

                                                      95c45afec6fa4e0b2a21edd10a6b2dc30568810c67bc9bc34d98ab111c48261f377a370583adb27e08616b0108026c119493b1b093b52ce931117e646b46cb7b

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      5662b95a323fca1b396cec19c9f52d2d

                                                      SHA1

                                                      264bb61f1b1d276d3c9135a3eb5065c7012ce559

                                                      SHA256

                                                      18ef5eee1622b1fe07c024db37c1bf890af76a27d6948927043e840d3c5dde3b

                                                      SHA512

                                                      7830e42248ba8c462ef7b1ef8c564289807396ac2619f3b55fd26a4e75cbb9724680ae53c29ca6488820181272e78b56acea192fb1c3adcfc5fb22c8775b581a

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      1400b7208465e875d44190b9b465fcfb

                                                      SHA1

                                                      ffd77f7fe78207e5a862b4f536d902019a155e26

                                                      SHA256

                                                      4fc3a908a25bf9861afb2ec7b3f854fadd986ac281b134cb4e89e46ba6aed0c5

                                                      SHA512

                                                      57596642a72347985ae9dda5a9e8d01a5c6cbeb5fac227d69fa1fbf38ae867ea4f434f9aec8b990ca397295886ce503abad49efed2f6ea7fdd6bf5d803bf1f38

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      22310ad6749d8cc38284aa616efcd100

                                                      SHA1

                                                      440ef4a0a53bfa7c83fe84326a1dff4326dcb515

                                                      SHA256

                                                      55b1d8021c4eb4c3c0d75e3ed7a4eb30cd0123e3d69f32eeb596fe4ffec05abf

                                                      SHA512

                                                      2ef08e2ee15bb86695fe0c10533014ffed76ececc6e579d299d3365fafb7627f53e32e600bb6d872b9f58aca94f8cb7e1e94cdfd14777527f7f0aa019d9c6def

                                                    • C:\Users\Admin\AppData\Local\Temp\XClient.exe

                                                      Filesize

                                                      77KB

                                                      MD5

                                                      1fdd77cb12693ba80efbe8a5463b34b0

                                                      SHA1

                                                      a28daa287556525ef8d54f4244fac761b9be9dc3

                                                      SHA256

                                                      03075f33cfb3ba600a7312a2c6ed5a26dd2e2d210913f70a471f1a120e501891

                                                      SHA512

                                                      e635f719d5e4a3a394ef348e5324c4e407427f00354e0ba9bc7cd25a3e966ecbd045211141a2c3156d1caf4459fd813b772595e74df06426bc9fd884e7e0f7d1

                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_y4pr1tlr.hez.ps1

                                                      Filesize

                                                      60B

                                                      MD5

                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                      SHA1

                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                      SHA256

                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                      SHA512

                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                    • memory/1732-0-0x00007FF9AF9C3000-0x00007FF9AF9C5000-memory.dmp

                                                      Filesize

                                                      8KB

                                                    • memory/1732-45-0x00007FF9AF9C0000-0x00007FF9B0481000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/1732-1-0x0000000000020000-0x00000000002A4000-memory.dmp

                                                      Filesize

                                                      2.5MB

                                                    • memory/1732-21-0x00007FF9AF9C0000-0x00007FF9B0481000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/3556-30-0x0000000000E10000-0x0000000000E2A000-memory.dmp

                                                      Filesize

                                                      104KB

                                                    • memory/4588-13-0x00007FF9AF9C0000-0x00007FF9B0481000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4588-12-0x00007FF9AF9C0000-0x00007FF9B0481000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4588-14-0x00007FF9AF9C0000-0x00007FF9B0481000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4588-2-0x00000201F1AE0000-0x00000201F1B02000-memory.dmp

                                                      Filesize

                                                      136KB

                                                    • memory/4588-17-0x00007FF9AF9C0000-0x00007FF9B0481000-memory.dmp

                                                      Filesize

                                                      10.8MB