Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2s -
max time network
41s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2025, 16:36
Static task
static1
Behavioral task
behavioral1
Sample
AlisInjector(x64).exe
Resource
win10v2004-20250217-en
General
-
Target
AlisInjector(x64).exe
-
Size
540KB
-
MD5
5d577543e14898862de2fc5f4976af91
-
SHA1
38569f433469a7b9d04acc52158523ce7b3e6cf3
-
SHA256
61493f2dac1330b7b853c4af5298dbcfbdef56f4cbd44c2266e0d23ba9d44483
-
SHA512
223a01dc8c67da3889140a6e77a3a4721c35ba4254c165675053627dc5a558b790fdda286a545b92424a5690b6e0e3df8eacca21da67dea44a490170adacc165
-
SSDEEP
12288:IepEAmsrIPR7Ifas9YFu7QHzs1vnVRLhjg0BX:I2S4taanVHB
Malware Config
Extracted
xworm
5.0
cR9KWMfVyMWGAarG
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
pastebin_url
https://pastebin.com/raw/fSgk0zpE
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000c000000023c14-4.dat family_xworm behavioral1/memory/1152-12-0x00000000007E0000-0x000000000080E000-memory.dmp family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation AlisInjector(x64).exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation AlisInjector(x64).exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation AlisInjector(x64).exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation AlisInjector(x64).exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation AlisInjector(x64).exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation AlisInjector(x64).exe -
Executes dropped EXE 5 IoCs
pid Process 1152 msedge.exe 4648 msedge.exe 3736 msedge.exe 3316 msedge.exe 1420 msedge.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 9 pastebin.com 11 pastebin.com 8 pastebin.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AlisInjector(x64).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AlisInjector(x64).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AlisInjector(x64).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AlisInjector(x64).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AlisInjector(x64).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AlisInjector(x64).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4212 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2300 powershell.exe 5100 powershell.exe 2572 powershell.exe 2572 powershell.exe 776 powershell.exe 2300 powershell.exe 2300 powershell.exe 5100 powershell.exe 5100 powershell.exe 728 powershell.exe 728 powershell.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 1152 msedge.exe Token: SeDebugPrivilege 4648 msedge.exe Token: SeDebugPrivilege 3736 msedge.exe Token: SeDebugPrivilege 2572 powershell.exe Token: SeDebugPrivilege 2300 powershell.exe Token: SeDebugPrivilege 5100 powershell.exe Token: SeDebugPrivilege 3316 msedge.exe Token: SeDebugPrivilege 1420 msedge.exe Token: SeDebugPrivilege 776 powershell.exe Token: SeDebugPrivilege 728 powershell.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 4744 wrote to memory of 2300 4744 AlisInjector(x64).exe 85 PID 4744 wrote to memory of 2300 4744 AlisInjector(x64).exe 85 PID 4744 wrote to memory of 2300 4744 AlisInjector(x64).exe 85 PID 4744 wrote to memory of 1152 4744 AlisInjector(x64).exe 87 PID 4744 wrote to memory of 1152 4744 AlisInjector(x64).exe 87 PID 4744 wrote to memory of 1732 4744 AlisInjector(x64).exe 88 PID 4744 wrote to memory of 1732 4744 AlisInjector(x64).exe 88 PID 4744 wrote to memory of 1732 4744 AlisInjector(x64).exe 88 PID 1732 wrote to memory of 2572 1732 AlisInjector(x64).exe 89 PID 1732 wrote to memory of 2572 1732 AlisInjector(x64).exe 89 PID 1732 wrote to memory of 2572 1732 AlisInjector(x64).exe 89 PID 1732 wrote to memory of 4648 1732 AlisInjector(x64).exe 91 PID 1732 wrote to memory of 4648 1732 AlisInjector(x64).exe 91 PID 1732 wrote to memory of 4960 1732 AlisInjector(x64).exe 92 PID 1732 wrote to memory of 4960 1732 AlisInjector(x64).exe 92 PID 1732 wrote to memory of 4960 1732 AlisInjector(x64).exe 92 PID 4960 wrote to memory of 5100 4960 AlisInjector(x64).exe 93 PID 4960 wrote to memory of 5100 4960 AlisInjector(x64).exe 93 PID 4960 wrote to memory of 5100 4960 AlisInjector(x64).exe 93 PID 4960 wrote to memory of 3736 4960 AlisInjector(x64).exe 95 PID 4960 wrote to memory of 3736 4960 AlisInjector(x64).exe 95 PID 4960 wrote to memory of 3488 4960 AlisInjector(x64).exe 96 PID 4960 wrote to memory of 3488 4960 AlisInjector(x64).exe 96 PID 4960 wrote to memory of 3488 4960 AlisInjector(x64).exe 96 PID 3488 wrote to memory of 776 3488 AlisInjector(x64).exe 97 PID 3488 wrote to memory of 776 3488 AlisInjector(x64).exe 97 PID 3488 wrote to memory of 776 3488 AlisInjector(x64).exe 97 PID 3488 wrote to memory of 3316 3488 AlisInjector(x64).exe 99 PID 3488 wrote to memory of 3316 3488 AlisInjector(x64).exe 99 PID 3488 wrote to memory of 2904 3488 AlisInjector(x64).exe 100 PID 3488 wrote to memory of 2904 3488 AlisInjector(x64).exe 100 PID 3488 wrote to memory of 2904 3488 AlisInjector(x64).exe 100 PID 2904 wrote to memory of 728 2904 AlisInjector(x64).exe 101 PID 2904 wrote to memory of 728 2904 AlisInjector(x64).exe 101 PID 2904 wrote to memory of 728 2904 AlisInjector(x64).exe 101 PID 2904 wrote to memory of 1420 2904 AlisInjector(x64).exe 103 PID 2904 wrote to memory of 1420 2904 AlisInjector(x64).exe 103 PID 2904 wrote to memory of 1948 2904 AlisInjector(x64).exe 104 PID 2904 wrote to memory of 1948 2904 AlisInjector(x64).exe 104 PID 2904 wrote to memory of 1948 2904 AlisInjector(x64).exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1152 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4212
-
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:728
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1948 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="7⤵PID:2468
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"7⤵PID:3208
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"7⤵PID:2244
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="8⤵PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"8⤵PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"8⤵PID:60
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="9⤵PID:4364
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"9⤵PID:5064
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"9⤵PID:3040
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="10⤵PID:3432
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"10⤵PID:936
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"10⤵PID:5084
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="11⤵PID:5048
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"11⤵PID:1404
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"11⤵PID:4232
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="12⤵PID:468
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"12⤵PID:2936
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"12⤵PID:1824
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="13⤵PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"13⤵PID:3408
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"13⤵PID:3808
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="14⤵PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"14⤵PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"14⤵PID:4552
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="15⤵PID:3972
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"15⤵PID:384
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"15⤵PID:4324
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="16⤵PID:1128
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"16⤵PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"16⤵PID:4436
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="17⤵PID:3824
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"17⤵PID:1824
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"17⤵PID:4780
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="18⤵PID:5220
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"18⤵PID:5252
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"18⤵PID:5344
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="19⤵PID:5584
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"19⤵PID:5632
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"19⤵PID:5652
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="20⤵PID:5920
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"20⤵PID:5932
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"20⤵PID:5948
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="21⤵PID:5236
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"21⤵PID:5060
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"21⤵PID:4500
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="22⤵PID:5360
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"22⤵PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"22⤵PID:5744
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="23⤵PID:6128
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"23⤵PID:936
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"23⤵PID:6016
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="24⤵PID:4524
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"24⤵PID:5828
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"24⤵PID:5832
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="25⤵PID:5480
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"25⤵PID:5468
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"25⤵PID:6016
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="26⤵PID:5956
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"26⤵PID:5632
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"26⤵PID:5656
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="27⤵PID:6396
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"27⤵PID:6428
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"27⤵PID:6436
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="28⤵PID:6656
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"28⤵PID:6664
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"28⤵PID:6676
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="29⤵PID:6924
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"29⤵PID:6932
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"29⤵PID:6944
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="30⤵PID:7152
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"30⤵PID:5676
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"30⤵PID:4380
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="31⤵PID:6416
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"31⤵PID:6232
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"31⤵PID:6568
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="32⤵PID:6888
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"32⤵PID:6896
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"32⤵PID:6904
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="33⤵PID:6160
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"33⤵PID:936
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"33⤵PID:6304
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="34⤵PID:6776
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"34⤵PID:5308
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"34⤵PID:6832
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="35⤵PID:6508
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"35⤵PID:1824
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"35⤵PID:5472
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="36⤵PID:5448
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"36⤵PID:6112
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"36⤵PID:7208
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="37⤵PID:7432
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"37⤵PID:7444
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"37⤵PID:7452
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="38⤵PID:7636
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"38⤵PID:7660
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"38⤵PID:7672
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="39⤵PID:7852
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"39⤵PID:7860
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"39⤵PID:7868
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="40⤵PID:8096
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"40⤵PID:8176
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"40⤵PID:6732
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="41⤵PID:3196
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"41⤵PID:7592
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"41⤵PID:7056
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="42⤵PID:7412
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"42⤵PID:7912
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"42⤵PID:8188
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="43⤵PID:3720
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"43⤵PID:3320
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"43⤵PID:2684
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="44⤵PID:7348
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"44⤵PID:7584
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"44⤵PID:7352
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="45⤵PID:7144
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"45⤵PID:7508
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"45⤵PID:7480
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="46⤵PID:4400
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"46⤵PID:3388
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"46⤵PID:4336
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="47⤵PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"47⤵PID:4984
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"47⤵PID:2152
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="48⤵PID:5188
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"48⤵PID:7824
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"48⤵PID:1868
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="49⤵PID:6116
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"49⤵PID:6680
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"49⤵PID:2376
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="50⤵PID:60
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"50⤵PID:1124
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"50⤵PID:4352
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="51⤵PID:7572
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"51⤵PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"51⤵PID:1644
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="52⤵PID:4284
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"52⤵PID:908
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"52⤵PID:2664
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="53⤵PID:7904
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"53⤵PID:4252
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"53⤵PID:6092
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="54⤵PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"54⤵PID:3520
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"54⤵PID:5972
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="55⤵PID:384
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"55⤵PID:5920
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"55⤵PID:5976
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="56⤵PID:6812
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"56⤵PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"56⤵PID:4196
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="57⤵PID:5544
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"57⤵PID:5752
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"57⤵PID:6048
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="58⤵PID:6984
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"58⤵PID:7252
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"58⤵PID:7692
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="59⤵PID:5732
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"59⤵PID:5884
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"59⤵PID:3400
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵PID:6552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
53KB
MD5124edf3ad57549a6e475f3bc4e6cfe51
SHA180f5187eeebb4a304e9caa0ce66fcd78c113d634
SHA256638c51e173ca6b3469494a7e2e0b656021a761f77b4a83f3e430e82e7b9af675
SHA512b6c1a9051feeffad54ba1092fd799d34a9578368d7e66b31780fe478c1def0eb4094dce2879003f7389f2f9d86b94a3ef3975e78092a604597841c9b8db120ee
-
Filesize
18KB
MD5a23e00a2f42d420cb1730ace1beebb79
SHA1a8c3939962e128bc5a15445e6a6c4ac3fc0d5457
SHA2568522da8c7563bf05623687c24c0b138d4703a7c82ffebfad60d90f19222d6cb4
SHA51278018229ce9a2bf76be514520eb9d38c5414b1dcc4598244f5a85755470337161b815d56977deefef4a0efc79107bc45917fcc9ed7054ae104fd55830218558f
-
Filesize
18KB
MD577b89658d13b3ae46330dc31b1625769
SHA189b3af9691f39edb928175548cffada71028d052
SHA256b2974336a1f9c4942c1ead18d8356054853a4d14daa8d1249998e3db8c7a9964
SHA512b71765668578d7c9316e2bf7b3e560ab012595ce748d9bc6f2c167d3729251a46cdcf25b76b0446618a759c51bff048cbf6e8d99543debeac9d4e792d319df7a
-
Filesize
18KB
MD539781fdd0a5839cd10383f539411df04
SHA1a3519103aa18f011d9eae3b024bbb97e16a3e672
SHA25641356662932a4a61bfc9a280f177273d5aaa74fab1cc8118237c2eebc5c65b0a
SHA5128abe637729c8473ac7914d4f7f89d3ab9d0ed0eb6c15d480da106197cfdfeefcb61d979d290addfbe2499235bdc0c7d1168c870d3c0228cfc6516e9f565cab86
-
Filesize
18KB
MD5c409bcd950e55b28dbe1fd1b9f917fa9
SHA1e25162cf5563bb106b108846d5caebf10ff93c50
SHA25667125a9ac42140796a76baa874c4aacb1f17f02bdb7f60073a2e78084f5458c9
SHA512aa3b07f0725b25c4c59945e35896aae9dafbfa385551ed1e458d31c5822fde5008dfd09d4d7af8e33c18be7498b8817fe89db2c820dc3bb007d387b647430213
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
161KB
MD571c938b1700643db88bf57abf2df0efb
SHA12be0624b4a6d813daa0183d9df5dfeaa9f86a32b
SHA25653c8644bcdec5d0acc598497d86737bac723da0489e61a547dfd02eaea56b459
SHA51233c83e2606086a61e75293dd59173f9ffeee4a9806911223289dfdfd9470a568e4f7f743afc7553ed3e3140be0508908b5c54288ff3bf53fb9d0a16ac10d35db