Analysis

  • max time kernel
    716s
  • max time network
    898s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2025, 22:10

General

  • Target

    rat/SilverClient - Copy (14).exe

  • Size

    43KB

  • MD5

    44a5ff2feda2634ae7d9fadc97ebd0a0

  • SHA1

    9a763aefd806585e11a36203e575ae142f38bc6c

  • SHA256

    5dde6801897a7d76c16e64c0b36a3280fbf5371642a690b85ddd31538c4458d8

  • SHA512

    cebc24998c33d7fe8bcdba5183d60c36b3ccaac247d0ee206a73485236453c109dc269522df01d85f58efd3d7a28358221f2139f11356f95f9b8283475f576ca

  • SSDEEP

    768:GdmcASe38zJ/Ol6IoZmtPHJm7+avCJ8eEPNRULQD9PUGa7AB6Sh/lE:GdmcASeuOtvhmeZKNGsD9pYAoS/lE

Malware Config

Extracted

Family

silverrat

Version

1.0.0.0

C2

if-eventually.gl.at.ply.gg:17094

Mutex

Mutex_DthEiIseBZ

Attributes
  • certificate

    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

  • decrypted_key

    -|S.S.S|-

  • key

    yy6zDjAUmbB09pKvo5Hhug==

  • key_x509

    eGlwZU1BZVJwdkFBdllxYmdRQUJ2eWtsbVVURFhE

  • reconnect_delay

    0

  • server_signature

    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

Signatures

  • SilverRat

    SilverRat is trojan written in C#.

  • Silverrat family
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 52 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rat\SilverClient - Copy (14).exe
    "C:\Users\Admin\AppData\Local\Temp\rat\SilverClient - Copy (14).exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:532
    • C:\Windows\System32\attrib.exe
      "C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64"
      2⤵
      • Sets file to hidden
      • Views/modifies file attributes
      PID:228
    • C:\Windows\System32\attrib.exe
      "C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe"
      2⤵
      • Sets file to hidden
      • Views/modifies file attributes
      PID:3740
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpEAFC.tmp.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1284
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:3148
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3620
        • C:\Windows\SYSTEM32\schtasks.exe
          "schtasks.exe" /query /TN $77Runtime Broker.exe
          4⤵
            PID:1996
          • C:\Windows\SYSTEM32\schtasks.exe
            "schtasks.exe" /Create /SC ONCE /TN "$77Runtime Broker.exe" /TR "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe \"\$77Runtime Broker.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST
            4⤵
            • Scheduled Task/Job: Scheduled Task
            PID:4508
          • C:\Windows\SYSTEM32\schtasks.exe
            "schtasks.exe" /query /TN $77Runtime Broker.exe
            4⤵
              PID:2264
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit
              4⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1036
            • C:\Windows\System32\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /create /sc hourly /mo 1 /tn "Runtime Broker_Task-HOURLY-01" /tr "%MyFile%" /st 00:00
              4⤵
              • Scheduled Task/Job: Scheduled Task
              PID:5032
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe"
              4⤵
                PID:1824
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3664
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe"
                4⤵
                  PID:3156
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3784
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe"
                  4⤵
                    PID:3276
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                    4⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4812
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe"
                    4⤵
                      PID:4256
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                      4⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1728
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe"
                      4⤵
                        PID:2200
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                        4⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1752
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe"
                        4⤵
                          PID:2000
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                          4⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:316
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe"
                          4⤵
                            PID:2948
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                            4⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4932
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe"
                            4⤵
                              PID:4584
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                              4⤵
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4080
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe"
                              4⤵
                                PID:2264
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                4⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1788
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe"
                                4⤵
                                  PID:1640
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                  4⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3672
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe"
                                  4⤵
                                    PID:1140
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                    4⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4828
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe"
                                    4⤵
                                      PID:1208
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                      4⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1300
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe"
                                      4⤵
                                        PID:1740
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                        4⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3780
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe"
                                        4⤵
                                          PID:3240
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                          4⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4092
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe"
                                          4⤵
                                            PID:1952
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                            4⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:292
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe"
                                            4⤵
                                              PID:2376
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                              4⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4476
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe"
                                              4⤵
                                                PID:4192
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                4⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:3004
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe"
                                                4⤵
                                                  PID:2504
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                  4⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5144
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe"
                                                  4⤵
                                                    PID:5304
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                    4⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5368
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe"
                                                    4⤵
                                                      PID:5508
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                      4⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:5624
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe"
                                                      4⤵
                                                        PID:5724
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                        4⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:5888
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe"
                                                        4⤵
                                                          PID:6024
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                          4⤵
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:6080
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe"
                                                          4⤵
                                                            PID:5204
                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                            4⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:1636
                                                            • C:\Windows\system32\WerFault.exe
                                                              C:\Windows\system32\WerFault.exe -u -p 1636 -s 1940
                                                              5⤵
                                                                PID:9356
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe"
                                                              4⤵
                                                                PID:5188
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                4⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:1936
                                                              • C:\Windows\System32\cmd.exe
                                                                "C:\Windows\System32\cmd.exe"
                                                                4⤵
                                                                  PID:1856
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                  4⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:5564
                                                                  • C:\Windows\system32\wermgr.exe
                                                                    "C:\Windows\system32\wermgr.exe" "-outproc" "0" "5564" "2788" "2716" "2792" "0" "0" "2796" "0" "0" "0" "0" "0"
                                                                    5⤵
                                                                      PID:9208
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe"
                                                                    4⤵
                                                                      PID:4456
                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                      4⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:6228
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe"
                                                                      4⤵
                                                                        PID:6324
                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                        4⤵
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:6384
                                                                      • C:\Windows\System32\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe"
                                                                        4⤵
                                                                          PID:6572
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                          4⤵
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:6684
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe"
                                                                          4⤵
                                                                            PID:6720
                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                            4⤵
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:6884
                                                                            • C:\Windows\system32\wermgr.exe
                                                                              "C:\Windows\system32\wermgr.exe" "-outproc" "0" "6884" "2396" "2440" "2400" "0" "0" "2364" "0" "0" "0" "0" "0"
                                                                              5⤵
                                                                              • Checks processor information in registry
                                                                              • Enumerates system info in registry
                                                                              PID:9472
                                                                          • C:\Windows\System32\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe"
                                                                            4⤵
                                                                              PID:7000
                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                              4⤵
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:4004
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe"
                                                                              4⤵
                                                                                PID:6464
                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                4⤵
                                                                                • Drops file in System32 directory
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:6760
                                                                              • C:\Windows\System32\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe"
                                                                                4⤵
                                                                                  PID:7048
                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                  4⤵
                                                                                  • Drops file in System32 directory
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:5660
                                                                                • C:\Windows\System32\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe"
                                                                                  4⤵
                                                                                    PID:7200
                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                    4⤵
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:7292
                                                                                  • C:\Windows\System32\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe"
                                                                                    4⤵
                                                                                      PID:7444
                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                      4⤵
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:7568
                                                                                    • C:\Windows\System32\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe"
                                                                                      4⤵
                                                                                        PID:7620
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                        4⤵
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:7680
                                                                                      • C:\Windows\System32\cmd.exe
                                                                                        "C:\Windows\System32\cmd.exe"
                                                                                        4⤵
                                                                                          PID:7784
                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                          4⤵
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:7928
                                                                                        • C:\Windows\System32\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe"
                                                                                          4⤵
                                                                                            PID:8028
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                            4⤵
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:8060
                                                                                          • C:\Windows\System32\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe"
                                                                                            4⤵
                                                                                              PID:3472
                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                              4⤵
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:7488
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe"
                                                                                              4⤵
                                                                                                PID:8072
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                4⤵
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:7772
                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe"
                                                                                                4⤵
                                                                                                  PID:8312
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                  4⤵
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:8408
                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe"
                                                                                                  4⤵
                                                                                                    PID:8576
                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                    4⤵
                                                                                                      PID:8680
                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe"
                                                                                                      4⤵
                                                                                                        PID:8732
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                        4⤵
                                                                                                          PID:8816
                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                          "C:\Windows\System32\cmd.exe"
                                                                                                          4⤵
                                                                                                            PID:8948
                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                            4⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:9136
                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                            "C:\Windows\System32\cmd.exe"
                                                                                                            4⤵
                                                                                                              PID:8224
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                              4⤵
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:8564
                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                              "C:\Windows\System32\cmd.exe"
                                                                                                              4⤵
                                                                                                                PID:7700
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                                4⤵
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:9060
                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                "C:\Windows\System32\cmd.exe"
                                                                                                                4⤵
                                                                                                                  PID:8624
                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                  "C:\Windows\System32\cmd.exe"
                                                                                                                  4⤵
                                                                                                                    PID:8924
                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                                    4⤵
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:8956
                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe"
                                                                                                                    4⤵
                                                                                                                      PID:10044
                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                                      4⤵
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:6632
                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                      "C:\Windows\System32\cmd.exe"
                                                                                                                      4⤵
                                                                                                                        PID:8088
                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                                        4⤵
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:7972
                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                        "C:\Windows\System32\cmd.exe"
                                                                                                                        4⤵
                                                                                                                          PID:8472
                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                                          4⤵
                                                                                                                            PID:9464
                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                            "C:\Windows\System32\cmd.exe"
                                                                                                                            4⤵
                                                                                                                              PID:7904
                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                                              4⤵
                                                                                                                                PID:224
                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                "C:\Windows\System32\cmd.exe"
                                                                                                                                4⤵
                                                                                                                                  PID:5400
                                                                                                                          • C:\Windows\system32\vssvc.exe
                                                                                                                            C:\Windows\system32\vssvc.exe
                                                                                                                            1⤵
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:4368

                                                                                                                          Network

                                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                                          Replay Monitor

                                                                                                                          Loading Replay Monitor...

                                                                                                                          Downloads

                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                            Filesize

                                                                                                                            2KB

                                                                                                                            MD5

                                                                                                                            d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                                            SHA1

                                                                                                                            31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                                            SHA256

                                                                                                                            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                                            SHA512

                                                                                                                            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                                                                                            Filesize

                                                                                                                            53KB

                                                                                                                            MD5

                                                                                                                            a26df49623eff12a70a93f649776dab7

                                                                                                                            SHA1

                                                                                                                            efb53bd0df3ac34bd119adf8788127ad57e53803

                                                                                                                            SHA256

                                                                                                                            4ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245

                                                                                                                            SHA512

                                                                                                                            e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c

                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                            Filesize

                                                                                                                            1KB

                                                                                                                            MD5

                                                                                                                            e0fcc76948edc7302ac02c12bb136f21

                                                                                                                            SHA1

                                                                                                                            426d1a5c34cc87c41e6407bce04eb623be835de7

                                                                                                                            SHA256

                                                                                                                            ce5de241e73937f8e470574657c3153dc54a7fb57df127cd85d6bd23fede4da3

                                                                                                                            SHA512

                                                                                                                            fb59f8e55297342c188ad3428a59a623845ee3919ff143d4bccc0752cb4a6636bef29227979e36e7be4aade9d5cbb0db1efd921d6a1687f2e8a5a479b3b960c9

                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                            Filesize

                                                                                                                            3KB

                                                                                                                            MD5

                                                                                                                            98a2836086ca47703ed935d8289ab35a

                                                                                                                            SHA1

                                                                                                                            76cbbbf55174653c9d3a8f82f3f19b2f8ab7bf8c

                                                                                                                            SHA256

                                                                                                                            d5682a5d403be783bece9ae553271ead12a011c8b5fabd576688e71bc5e40423

                                                                                                                            SHA512

                                                                                                                            52c57232cb16b9402f9843b316ffb604bcabe3052a693af226daf70d984ecdb57924d8dc27d498d5b71b0d06b989d4705c271dab84d3456f2d803266850695e6

                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xh3grdpf.hog.ps1

                                                                                                                            Filesize

                                                                                                                            60B

                                                                                                                            MD5

                                                                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                            SHA1

                                                                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                            SHA256

                                                                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                            SHA512

                                                                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpEAFC.tmp.bat

                                                                                                                            Filesize

                                                                                                                            199B

                                                                                                                            MD5

                                                                                                                            a2c2085da97c0fbdbbe479498f1be283

                                                                                                                            SHA1

                                                                                                                            1ddbc71976c6bb4bc3d8b6560dc28050bd073a89

                                                                                                                            SHA256

                                                                                                                            e70299b0a7d228ff313cc0fa09554d08c92dfdd038b685198babd997442eb4e1

                                                                                                                            SHA512

                                                                                                                            bda479a06b061f8c96bd611636b02a0bba4ee61a4dd885f646bd1fbba9942bc7e9041a41e98b12a690eed4810f1ace0e82e723a5dc726c063327a79488f9f225

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            56ce3a550767e2f3af930d9b550d4789

                                                                                                                            SHA1

                                                                                                                            1eec7c6234b9e253863f130a15e09046299e23fb

                                                                                                                            SHA256

                                                                                                                            467587b203953cda87f3dd4d07c57712fcff2618cf3183b994bcff417f6a1627

                                                                                                                            SHA512

                                                                                                                            32bc8d3ee3d7f5ed1abcd50f16af6a1514e99cd5c34ed952d60e9ebd864a1617af40a696bc5b54b9d7979e106e504ce37a5c4cdb12969a7c568d10a7a2770a1f

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            ddb61e3b1de67948eed687e24d7e7216

                                                                                                                            SHA1

                                                                                                                            b6fe691e924f101730febea4ee50fa2a4e0ef15c

                                                                                                                            SHA256

                                                                                                                            279cae8c279d025cf4b69110a38b7df27838a5c7de17310f82fcc35df3f88277

                                                                                                                            SHA512

                                                                                                                            09d94e912972a4766a3d35228697cf439c7139adc1a1bb490e40c03c7aecdf15c0b966c1941122e6074f6c87a52125b6ea843499037e71f94701e37658c845f7

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            0f4f13898119b2f8ec5a4fd76f425c8b

                                                                                                                            SHA1

                                                                                                                            555d238016db847073dcd7c7e2ac93cc088a6f87

                                                                                                                            SHA256

                                                                                                                            7da78664ff81ab7558411d2b602ac8473c103330c9f48cd8e485ed3ef4eff73c

                                                                                                                            SHA512

                                                                                                                            150a2e04f8547d2229d146222c0708d78879f95f7a41d9c50baaaee5a63e0000aa9a8e8721fd4eec90bd092a9b2baebc11b9e9db990f09653c50aa3a238d3f39

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            4489a24d5d575094fe33ec85e82a4e81

                                                                                                                            SHA1

                                                                                                                            21922832a0fcc7b758089e67ca5827060fbe8384

                                                                                                                            SHA256

                                                                                                                            d146cc7e21af693ef80f2bf9256260bdf93e6f97369e523a53ae25d73da642ad

                                                                                                                            SHA512

                                                                                                                            30777aee75a959644bba7c83f6912d7e8f5bb16776ef6482d94131d9f6982a3622b4730bbbf92ae3b11acd20b44f9b02df8cd241096811d8daf52614bae4b614

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            2e22f3d3308e5fa060dd95938ca56aa2

                                                                                                                            SHA1

                                                                                                                            36dbe28874711f02f5ddc4ba753b523e4538acc2

                                                                                                                            SHA256

                                                                                                                            48dff4f5b269101b4d21dc5ddd8f276c4eefc5d4dc7ed08bad6fef1e164f5cc6

                                                                                                                            SHA512

                                                                                                                            167bf3de567af320bc710190be81c444dedc9fe7e5ac4dd14576a75110de4aa0679fbfca22132d5a82ef9b98b230f7395f2264c12466ba22ea03dc6740bb9262

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            7fa7fcfd137dcacd5c3d4672f2d23133

                                                                                                                            SHA1

                                                                                                                            18803417ef952be8e6a749ae17e6dae62683145e

                                                                                                                            SHA256

                                                                                                                            1226e6680b72690ab569de91cd742f8f98da30a32ec6c018ef73c122352577c9

                                                                                                                            SHA512

                                                                                                                            ff4b46ec574183661f8d41396f22955a34a57ef7823d47cd782f20eeeb79440272355a1ab8c585ec12a27201c151f0657b44df76a54003c32be374d77ef29ec6

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            77f8d30f851443e815b9b92deb2dc484

                                                                                                                            SHA1

                                                                                                                            b75678c216954de5551830abcedf359a48742d0e

                                                                                                                            SHA256

                                                                                                                            376f6078d4d9f4f86b30b3d5ef7660886dce1c1d55cd7cb45cddf5180c1df59f

                                                                                                                            SHA512

                                                                                                                            d6e885460c5737dc617bcb71894863bc31a3e36b92c8e75b98155a57747856c18e57e96de1d513fade89b4f7ec1057d712708b5ea9f5e7d8e94491533e0d4790

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            55b27c563d57ec155ef8215e6e002e53

                                                                                                                            SHA1

                                                                                                                            27876cfd22623a72afea65842c92e329ba62bf08

                                                                                                                            SHA256

                                                                                                                            200288ea5bb4305cbf1b190f193453cda0882f1983b5b03f6f5489eb28958f58

                                                                                                                            SHA512

                                                                                                                            a3754d48935cc387340d12ddc4c863b4be14bbb863cff9567b87a2d30a1359068922d2ecf17dcc18604560dedfceef7262d332aa3986f135e6cd04c38bb06131

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            bfb6abc4a6e237c8371ec41b85c3a1ce

                                                                                                                            SHA1

                                                                                                                            a05941126458283caab672a35d5a11894e48d423

                                                                                                                            SHA256

                                                                                                                            631eaa54743d3dcbdbf05cb4e61cd3fd2bf01e34d0a1650d65147743508edcb3

                                                                                                                            SHA512

                                                                                                                            8833dddc26af436138a76274fa438fb28f21d748174b248b1dbeee4b9f17f30939d9ff933e0a7045b3b85fa44a2ff639f69a6eb973577001568b00b3540f0950

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            b9ae64ea555a9fb24d5f8d5d3feb76c1

                                                                                                                            SHA1

                                                                                                                            5337588df05e95c457b9dd5e40011400de1fd244

                                                                                                                            SHA256

                                                                                                                            80f1b33b10dfd610fef900e468d899b37308ed997bd2f8589965268eb62a2ebc

                                                                                                                            SHA512

                                                                                                                            c8acda94a797fc6fed9e92f43feb9c286c1fbeda6f52a0d116c37d1e6ed34bf55a39955c900f3fd4eccd250734e9c6e13342dad1cb099732d4bd5130a4239c1a

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            310e88dd9f9b31a1a942b4194d4fd2f7

                                                                                                                            SHA1

                                                                                                                            f0fd56d47a3826b6d66113d995633236ab15f0fa

                                                                                                                            SHA256

                                                                                                                            29192e0bf83a4097b450d2f1db0c747df51401ffd27a1fa5d022e7795992adda

                                                                                                                            SHA512

                                                                                                                            74f2b8ca2de9adb0b88d8cf8c2902d241ad4fe60b5b8cf2f1200c9c00ca77054263322ef8f6b33f924a6aebeff3edefbb1d63f578efc4fe1e3d7407601cf1ff7

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            9a951bd68a55dc0bfa145691c4f3a45d

                                                                                                                            SHA1

                                                                                                                            1a9f4d788c5030cd6662659e5356e6bb84450d9f

                                                                                                                            SHA256

                                                                                                                            d334175204ba660c0602b89f6b81268d5c8bd5f5b6d5bbfd9169a39a9a15cd06

                                                                                                                            SHA512

                                                                                                                            866d53770d9b3b5e104d63621ade9026f5649a52fb0203a97fa2ad3b976969ec4741014a52b3438626ffe4ce24e242f1346402ee4386fd5d65b94ab6c9f2c04c

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            12cafb96c211337e0a235ed0a7782c2e

                                                                                                                            SHA1

                                                                                                                            eacde1833325dce34f553f1add0b2b458910b1d7

                                                                                                                            SHA256

                                                                                                                            4822cd9a04da8f8c04a2e2a27e66f9a89783775c42af9479c1ef49041ecc7d0f

                                                                                                                            SHA512

                                                                                                                            63836e920d44887f3b77f38901f884bda26ebc40952ebfe6f0089b9a0175a09da58c94664c598574aec7ea33d8cca08e572c5df5556b590dae665bccedf5114d

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            53a646c8b5d65f6b64aaf2821c37f79b

                                                                                                                            SHA1

                                                                                                                            4fc29e6d55ca2883fcbd40fa7e447e76b2b37998

                                                                                                                            SHA256

                                                                                                                            ec897f0aa988806136e192bf7fd1b24f4184668f16b340ff4738da4718b28d19

                                                                                                                            SHA512

                                                                                                                            a58cd31b0ba92130f239b858c18ff5bd5cbed99547a94240360d271e1394e9c1ec2fcbfbf8827f3541820b3f83704ca280a0f19489eb0450e928698a554e5b11

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            6d1cdf6633fcd37bffa7516b843f306a

                                                                                                                            SHA1

                                                                                                                            c80eaf146178d32cb42a249621b0f012cb477b1c

                                                                                                                            SHA256

                                                                                                                            a945f17eb61f4496b28e59d04cd70b50247311299c221f2337e96c9b1994bb01

                                                                                                                            SHA512

                                                                                                                            7ccafdf41ad7f8e650bd17f5d6f5ff1f93e457ca96d98475fa2dfc258e04c080257c7be9c7b7e85e5abcd03aad605e8376b4fe0019b35823ec82087122de9c15

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            aa5d8802cc3dec3d7a90fa68bf84086e

                                                                                                                            SHA1

                                                                                                                            4a4512b68bdf1faf4c1b55dc4a2fe02e90becdd9

                                                                                                                            SHA256

                                                                                                                            940d28675e984fd4ce122d7d8a3bca8769ba1b6898bd7b79cf0bf075a1171598

                                                                                                                            SHA512

                                                                                                                            4399bc8c5ceb9f7aafc1f9c87796b5e09cae56e49ef63a054844d2bb4f1e490822c5cdba528705d8ad3b84ed214fb3797f8622404656cfc1de77f44bc7073125

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            5d3a2262d2f37c9d5b6cf7db79b8663b

                                                                                                                            SHA1

                                                                                                                            bf546ca96514c6213d1bb55805f85efe25f1cd12

                                                                                                                            SHA256

                                                                                                                            10edaa79c23791e9233b7a32508c9893c0de070ee279b516cfc64f94cf580255

                                                                                                                            SHA512

                                                                                                                            30ba8624364bce07c036b1769f1b7e983c8e1fbc709684c943c33b84202d0e1791684da1ce67ca644545a3eac28bacd8619919a39a3bdd57c63d66bef415489d

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            b7456a0a24358903782a687f6f8972e4

                                                                                                                            SHA1

                                                                                                                            b51abc8020ddc89ee269b946ea9bfa1773f1032b

                                                                                                                            SHA256

                                                                                                                            e6ca4419e2e034880120276cc5bc9157ab82b2636c9302b789b9869d41c604c2

                                                                                                                            SHA512

                                                                                                                            72fae1d041c6f29619d5f7ad22a281631da31d2b7affb03796a6e77cff67bd5f523e0f9a1540f25fcbda6f184a48f7100b5cd6b9e3616733f8b683f6a6495e3a

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            60a3cdef10b06bce2b01982e0fb6fe4e

                                                                                                                            SHA1

                                                                                                                            c43cdbe4ddf7a1156f51cd62e4a42628e721163e

                                                                                                                            SHA256

                                                                                                                            df49bbcfc1f2f3ef0445252cb51f8851dfe3dc94388aab5c9d68f5f34bdd51af

                                                                                                                            SHA512

                                                                                                                            4c2362d13b7460bdf7f8df5f3f36675e401edb6cb701fd8b5ca9cacfb2489d229265982f0661d961748397614a6a17767d08d973105f317e87624f53d94a0e43

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            c5fb3dc096444cfadfffb0ca24121227

                                                                                                                            SHA1

                                                                                                                            b114c4b6441b1e32173689e2af7fe4395f53c8b3

                                                                                                                            SHA256

                                                                                                                            701346b25258cd4374b03ec1cc51df24df006fa0f3e0a611b7897ad8d52cbe4c

                                                                                                                            SHA512

                                                                                                                            d5c58587ad74876dff6799f681ad501403d3b5adb78f799ec30df34b2dd32abc2e7d77708abca5c221b38657f68fb4d9c29506906f18826024f69b742a452058

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            a40e0fb5051ed76bd08939097c772a08

                                                                                                                            SHA1

                                                                                                                            77d4b4e244e96ce394d45b5a0d08fc6473020c46

                                                                                                                            SHA256

                                                                                                                            7f809cf90d344480c7be222ddc67a0bf089b68a1d934dd284d25126e49e35a22

                                                                                                                            SHA512

                                                                                                                            93ad6a0f89a13089764ab83ec2e3083bb05d19793c82d8bcc669b8737807ee841cc11036a9d4fb71f08ebc3e549f4db122879f84ed6fa640988e32976e9f5c87

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            28b717763badfcae99c9f63ff49640c1

                                                                                                                            SHA1

                                                                                                                            92b89d0c2788cbd0b1140b84b3338a6c9c22a66e

                                                                                                                            SHA256

                                                                                                                            e54b54e33de452b91dc14b9b61eebe733cbc3992ab033debc2fc7950035d43c6

                                                                                                                            SHA512

                                                                                                                            2cef25f791ae4c54bc3aba6e03166a64d41dd46152550ffc1ca9c9d5aec1fc2babe0de88a400e4f872de334366460a3c29d4ea5c430e664b6beeef202efb8e09

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            6KB

                                                                                                                            MD5

                                                                                                                            983e5bec9fbcceb002e9ed75ec1d7aa8

                                                                                                                            SHA1

                                                                                                                            407b41b8442cfffcd5deeed700ef6cc620582b09

                                                                                                                            SHA256

                                                                                                                            50e9cb152b394f58a4b807de9a569436d93e6b784597c14128e887acf78887b3

                                                                                                                            SHA512

                                                                                                                            df61e35b7e15f3b91a53ee1fc0e9be03c90d6c47f6822d77c0c3a0d2b5a5945120fe74c1f3aeaf8f5c62112fe87acf0d34b44b88d90dd84a409389cb79245c61

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe

                                                                                                                            Filesize

                                                                                                                            43KB

                                                                                                                            MD5

                                                                                                                            44a5ff2feda2634ae7d9fadc97ebd0a0

                                                                                                                            SHA1

                                                                                                                            9a763aefd806585e11a36203e575ae142f38bc6c

                                                                                                                            SHA256

                                                                                                                            5dde6801897a7d76c16e64c0b36a3280fbf5371642a690b85ddd31538c4458d8

                                                                                                                            SHA512

                                                                                                                            cebc24998c33d7fe8bcdba5183d60c36b3ccaac247d0ee206a73485236453c109dc269522df01d85f58efd3d7a28358221f2139f11356f95f9b8283475f576ca

                                                                                                                          • memory/532-10-0x00007FF935530000-0x00007FF935FF1000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            10.8MB

                                                                                                                          • memory/532-0-0x00007FF935533000-0x00007FF935535000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            8KB

                                                                                                                          • memory/532-4-0x00007FF935530000-0x00007FF935FF1000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            10.8MB

                                                                                                                          • memory/532-3-0x00007FF935533000-0x00007FF935535000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            8KB

                                                                                                                          • memory/532-2-0x00007FF935530000-0x00007FF935FF1000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            10.8MB

                                                                                                                          • memory/532-1-0x0000000000C90000-0x0000000000CA0000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            64KB

                                                                                                                          • memory/1036-19-0x000001F5652F0000-0x000001F565312000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            136KB

                                                                                                                          • memory/1728-161-0x000001766DEA0000-0x000001766DF16000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            472KB

                                                                                                                          • memory/1728-110-0x000001766DDD0000-0x000001766DE14000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            272KB

                                                                                                                          • memory/3620-28-0x000000001D890000-0x000000001D8B0000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            128KB