Overview
overview
10Static
static
10rat/Silver...0).exe
windows7-x64
rat/Silver...0).exe
windows10-2004-x64
10rat/Silver...1).exe
windows7-x64
10rat/Silver...1).exe
windows10-2004-x64
10rat/Silver...2).exe
windows7-x64
10rat/Silver...2).exe
windows10-2004-x64
10rat/Silver...3).exe
windows7-x64
10rat/Silver...3).exe
windows10-2004-x64
10rat/Silver...4).exe
windows7-x64
10rat/Silver...4).exe
windows10-2004-x64
10rat/Silver...5).exe
windows7-x64
10rat/Silver...5).exe
windows10-2004-x64
10rat/Silver...6).exe
windows7-x64
10rat/Silver...6).exe
windows10-2004-x64
10rat/Silver...7).exe
windows7-x64
10rat/Silver...7).exe
windows10-2004-x64
10rat/Silver...2).exe
windows7-x64
10rat/Silver...2).exe
windows10-2004-x64
10rat/Silver...3).exe
windows7-x64
10rat/Silver...3).exe
windows10-2004-x64
10rat/Silver...4).exe
windows7-x64
rat/Silver...4).exe
windows10-2004-x64
10rat/Silver...5).exe
windows7-x64
10rat/Silver...5).exe
windows10-2004-x64
10rat/Silver...6).exe
windows7-x64
10rat/Silver...6).exe
windows10-2004-x64
10rat/Silver...7).exe
windows7-x64
10rat/Silver...7).exe
windows10-2004-x64
10rat/Silver...8).exe
windows7-x64
10rat/Silver...8).exe
windows10-2004-x64
10rat/Silver...9).exe
windows7-x64
10rat/Silver...9).exe
windows10-2004-x64
10Analysis
-
max time kernel
898s -
max time network
899s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2025, 22:10
Behavioral task
behavioral1
Sample
rat/SilverClient - Copy (10).exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
rat/SilverClient - Copy (10).exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
rat/SilverClient - Copy (11).exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
rat/SilverClient - Copy (11).exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
rat/SilverClient - Copy (12).exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
rat/SilverClient - Copy (12).exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
rat/SilverClient - Copy (13).exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
rat/SilverClient - Copy (13).exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
rat/SilverClient - Copy (14).exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
rat/SilverClient - Copy (14).exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
rat/SilverClient - Copy (15).exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
rat/SilverClient - Copy (15).exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
rat/SilverClient - Copy (16).exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
rat/SilverClient - Copy (16).exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
rat/SilverClient - Copy (17).exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
rat/SilverClient - Copy (17).exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
rat/SilverClient - Copy (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
rat/SilverClient - Copy (2).exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
rat/SilverClient - Copy (3).exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
rat/SilverClient - Copy (3).exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
rat/SilverClient - Copy (4).exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
rat/SilverClient - Copy (4).exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
rat/SilverClient - Copy (5).exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
rat/SilverClient - Copy (5).exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
rat/SilverClient - Copy (6).exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
rat/SilverClient - Copy (6).exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
rat/SilverClient - Copy (7).exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
rat/SilverClient - Copy (7).exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
rat/SilverClient - Copy (8).exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
rat/SilverClient - Copy (8).exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
rat/SilverClient - Copy (9).exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
rat/SilverClient - Copy (9).exe
Resource
win10v2004-20250217-en
General
-
Target
rat/SilverClient - Copy (2).exe
-
Size
43KB
-
MD5
44a5ff2feda2634ae7d9fadc97ebd0a0
-
SHA1
9a763aefd806585e11a36203e575ae142f38bc6c
-
SHA256
5dde6801897a7d76c16e64c0b36a3280fbf5371642a690b85ddd31538c4458d8
-
SHA512
cebc24998c33d7fe8bcdba5183d60c36b3ccaac247d0ee206a73485236453c109dc269522df01d85f58efd3d7a28358221f2139f11356f95f9b8283475f576ca
-
SSDEEP
768:GdmcASe38zJ/Ol6IoZmtPHJm7+avCJ8eEPNRULQD9PUGa7AB6Sh/lE:GdmcASeuOtvhmeZKNGsD9pYAoS/lE
Malware Config
Extracted
silverrat
1.0.0.0
if-eventually.gl.at.ply.gg:17094
Mutex_DthEiIseBZ
-
certificate
MIIE4DCCAsigAwIBAgIQAKQYOfZd86J2BfNjhG4CWTANBgkqhkiG9w0BAQ0FADARMQ8wDQYDVQQDDAZTaWx2ZXIwIBcNMjIwODI2MTkwMTA4WhgPOTk5OTEyMzEyMzU5NTlaMBExDzANBgNVBAMMBlNpbHZlcjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAPbpOWfhZTuOfEaqqImTTe5dNHAAry7/mf00DCoI4lPZfypsc1tYraxSPFeayGu09a3qdhkWKSVIgwnu2n4GLQNOCY9fh/1oyrX4Iir3BIkYeU7pKTWgjhUlAmFAUAaNr0ca23Ku2kN79jrDzRznOgE2DEW4p7OiM4Mb097ma9lzu7MyssHbY4VCteAhj9HZiplqBxaC1vXDmzxqG+gUZ1aLcyG7ssdkOjtWVBgT3gD/gOl7KchRzCFB1egDC/vD9WZCG35U3Ngi+IkTznoXR1R06cq4v0UnGjE37R2vcB21qb0ZYNiZJXZHv5i9+R7xoPeNoLda5PqnfGGbhPvNEdD56mdcOKlzGIuyemLkUo8texdpiBWKbtc3JZf5VsKxjJtHDK3xW6gDGI+PAirzGkFPmwcf8WgsblvzLg8OZpVxVs8rmKWoi6qIrf4CXnyl73J4lgzW+ir7PjANAQXwLNGdNnvdMeLeo/muGQPdeNpr6OczGGnkWA4qniHeL51/Gx0a8A+jP9zKiyu+qHcsP2IotgWDH/KlzJVr7IAum+DV92uV8poTDcUNcHaKvhHA65KmEtsvLbK6lFZcAMC0eWC0VgpW44T1/16rOaaky5mP6rTMc3nSyOl/lU/XgAgGGQPe22bRLWYzd3WVeEpI1WnHYXS+tL9IOe4kJP+pYsWDAgMBAAGjMjAwMB0GA1UdDgQWBBR32TJj2LeUx9L+RcSOvmFV6VJq6TAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4ICAQA+qucSOi7ov7Q1FmAjMf925KuvKuCNwJiu3Sqo3FDGVAD1fAwAi2FdyuXEO2VIUPZCkalFcBna5rqyrc6tcS4T0IL2TsYLrsuGir7PWP7CAcft1urYS1HpNpHxeH/nixwnQaQs/MuRmdm2TeCj6G21P5BTW55U5y9sMPSYwhbD2N7XLgnSQd5Y+80TR7FUiye/k3D37fI9PRhSQGbfYFRQQTmxj84dPTnY5CVgaY9d8fNiFZkyjaZdf+mibK0xQTf+xLVVj+toDNCkc1F462TdmFhCrHd4PoMo0yLDNv4SC6NLRq4haWDRtORw6gd5GYIoCQ3m3oQvNlNxXhhIjsOyxkxOrkCD0c+57PIc7EmKXieJa/XxnkcIVxO8dvTY/vijuz/VaZYl/lPu9ckuqgJ1wRvvsHl70Trv4Mn4X5uCIqRFFlK/mSOZbLIguGkDN3QIZABvej89vlZMhrVfZOG2oawe23FskHjv7thF/WzOXtWw6RUVC1V+hCwbuxFNUjZmmOTUwdXHnus7I2AuiG6Jz1+y9aYiXBcVTdSljxjHRRmiRaAnY94h58vN8NJ4hKL2GVCo6LxkpuplmcntJN0cKraKTPxSXcCRrqWxX9qoIbfvBcUU4vH1jPJCCLNCuDyD3lgQkpPVvq0EMU1a2HFGgMEQMjpYpb38rcadDhT5ag==
-
decrypted_key
-|S.S.S|-
-
key
yy6zDjAUmbB09pKvo5Hhug==
-
key_x509
eGlwZU1BZVJwdkFBdllxYmdRQUJ2eWtsbVVURFhE
-
reconnect_delay
0
-
server_signature
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
Signatures
-
Silverrat family
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2780 attrib.exe 2576 attrib.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation $77Runtime Broker.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation SilverClient - Copy (2).exe -
Executes dropped EXE 1 IoCs
pid Process 284 $77Runtime Broker.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\SysTemp64\\$77Runtime Broker.exe\"" SilverClient - Copy (2).exe -
pid Process 4272 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 548 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 536 schtasks.exe 1480 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 988 SilverClient - Copy (2).exe 988 SilverClient - Copy (2).exe 988 SilverClient - Copy (2).exe 988 SilverClient - Copy (2).exe 988 SilverClient - Copy (2).exe 988 SilverClient - Copy (2).exe 988 SilverClient - Copy (2).exe 988 SilverClient - Copy (2).exe 988 SilverClient - Copy (2).exe 988 SilverClient - Copy (2).exe 988 SilverClient - Copy (2).exe 988 SilverClient - Copy (2).exe 988 SilverClient - Copy (2).exe 988 SilverClient - Copy (2).exe 988 SilverClient - Copy (2).exe 988 SilverClient - Copy (2).exe 988 SilverClient - Copy (2).exe 988 SilverClient - Copy (2).exe 988 SilverClient - Copy (2).exe 988 SilverClient - Copy (2).exe 988 SilverClient - Copy (2).exe 988 SilverClient - Copy (2).exe 988 SilverClient - Copy (2).exe 284 $77Runtime Broker.exe 284 $77Runtime Broker.exe 4272 powershell.exe 4272 powershell.exe 4272 powershell.exe 4476 powershell.exe 3424 powershell.exe 4932 powershell.exe 3404 powershell.exe 3404 powershell.exe 428 powershell.exe 428 powershell.exe 4476 powershell.exe 4476 powershell.exe 1992 powershell.exe 1992 powershell.exe 3424 powershell.exe 3424 powershell.exe 4932 powershell.exe 4932 powershell.exe 4416 powershell.exe 4416 powershell.exe 2308 powershell.exe 2308 powershell.exe 2964 powershell.exe 2964 powershell.exe 3404 powershell.exe 3404 powershell.exe 428 powershell.exe 428 powershell.exe 3192 powershell.exe 3192 powershell.exe 1992 powershell.exe 1992 powershell.exe 1492 powershell.exe 1492 powershell.exe 1160 powershell.exe 1160 powershell.exe 1884 powershell.exe 1884 powershell.exe 4416 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 284 $77Runtime Broker.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 3460 vssvc.exe Token: SeRestorePrivilege 3460 vssvc.exe Token: SeAuditPrivilege 3460 vssvc.exe Token: SeDebugPrivilege 988 SilverClient - Copy (2).exe Token: SeDebugPrivilege 284 $77Runtime Broker.exe Token: SeDebugPrivilege 4272 powershell.exe Token: SeDebugPrivilege 4476 powershell.exe Token: SeDebugPrivilege 3424 powershell.exe Token: SeDebugPrivilege 4932 powershell.exe Token: SeDebugPrivilege 3404 powershell.exe Token: SeDebugPrivilege 428 powershell.exe Token: SeDebugPrivilege 1992 powershell.exe Token: SeDebugPrivilege 4416 powershell.exe Token: SeDebugPrivilege 2308 powershell.exe Token: SeDebugPrivilege 2964 powershell.exe Token: SeDebugPrivilege 3192 powershell.exe Token: SeDebugPrivilege 1492 powershell.exe Token: SeDebugPrivilege 1160 powershell.exe Token: SeDebugPrivilege 1884 powershell.exe Token: SeDebugPrivilege 4648 powershell.exe Token: SeDebugPrivilege 372 powershell.exe Token: SeDebugPrivilege 4956 powershell.exe Token: SeDebugPrivilege 5200 powershell.exe Token: SeDebugPrivilege 1636 powershell.exe Token: SeDebugPrivilege 5420 powershell.exe Token: SeDebugPrivilege 5744 powershell.exe Token: SeDebugPrivilege 6132 powershell.exe Token: SeDebugPrivilege 5988 powershell.exe Token: SeDebugPrivilege 5432 powershell.exe Token: SeDebugPrivilege 6148 powershell.exe Token: SeDebugPrivilege 6368 powershell.exe Token: SeDebugPrivilege 6524 powershell.exe Token: SeDebugPrivilege 6708 powershell.exe Token: SeDebugPrivilege 6976 powershell.exe Token: SeDebugPrivilege 7104 powershell.exe Token: SeDebugPrivilege 6076 powershell.exe Token: SeDebugPrivilege 3812 powershell.exe Token: SeDebugPrivilege 6680 powershell.exe Token: SeDebugPrivilege 7336 powershell.exe Token: SeDebugPrivilege 7552 powershell.exe Token: SeDebugPrivilege 7836 powershell.exe Token: SeDebugPrivilege 8036 powershell.exe Token: SeDebugPrivilege 7396 powershell.exe Token: SeDebugPrivilege 7312 powershell.exe Token: SeDebugPrivilege 8232 powershell.exe Token: SeDebugPrivilege 8556 powershell.exe Token: SeCreateGlobalPrivilege 6696 dwm.exe Token: SeChangeNotifyPrivilege 6696 dwm.exe Token: 33 6696 dwm.exe Token: SeIncBasePriorityPrivilege 6696 dwm.exe Token: SeDebugPrivilege 8012 powershell.exe Token: SeDebugPrivilege 5448 powershell.exe Token: SeDebugPrivilege 5588 powershell.exe Token: SeDebugPrivilege 9404 powershell.exe Token: SeDebugPrivilege 9664 powershell.exe Token: SeShutdownPrivilege 6696 dwm.exe Token: SeCreatePagefilePrivilege 6696 dwm.exe Token: SeShutdownPrivilege 6696 dwm.exe Token: SeCreatePagefilePrivilege 6696 dwm.exe Token: SeDebugPrivilege 9932 powershell.exe Token: SeDebugPrivilege 6020 powershell.exe Token: SeShutdownPrivilege 6696 dwm.exe Token: SeCreatePagefilePrivilege 6696 dwm.exe Token: SeShutdownPrivilege 6696 dwm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 284 $77Runtime Broker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 988 wrote to memory of 2576 988 SilverClient - Copy (2).exe 90 PID 988 wrote to memory of 2576 988 SilverClient - Copy (2).exe 90 PID 988 wrote to memory of 2780 988 SilverClient - Copy (2).exe 92 PID 988 wrote to memory of 2780 988 SilverClient - Copy (2).exe 92 PID 988 wrote to memory of 4664 988 SilverClient - Copy (2).exe 102 PID 988 wrote to memory of 4664 988 SilverClient - Copy (2).exe 102 PID 284 wrote to memory of 2936 284 $77Runtime Broker.exe 107 PID 284 wrote to memory of 2936 284 $77Runtime Broker.exe 107 PID 284 wrote to memory of 536 284 $77Runtime Broker.exe 109 PID 284 wrote to memory of 536 284 $77Runtime Broker.exe 109 PID 284 wrote to memory of 3236 284 $77Runtime Broker.exe 111 PID 284 wrote to memory of 3236 284 $77Runtime Broker.exe 111 PID 284 wrote to memory of 4272 284 $77Runtime Broker.exe 113 PID 284 wrote to memory of 4272 284 $77Runtime Broker.exe 113 PID 284 wrote to memory of 1480 284 $77Runtime Broker.exe 114 PID 284 wrote to memory of 1480 284 $77Runtime Broker.exe 114 PID 284 wrote to memory of 2848 284 $77Runtime Broker.exe 127 PID 284 wrote to memory of 2848 284 $77Runtime Broker.exe 127 PID 284 wrote to memory of 4476 284 $77Runtime Broker.exe 129 PID 284 wrote to memory of 4476 284 $77Runtime Broker.exe 129 PID 284 wrote to memory of 4384 284 $77Runtime Broker.exe 131 PID 284 wrote to memory of 4384 284 $77Runtime Broker.exe 131 PID 284 wrote to memory of 3424 284 $77Runtime Broker.exe 133 PID 284 wrote to memory of 3424 284 $77Runtime Broker.exe 133 PID 284 wrote to memory of 2400 284 $77Runtime Broker.exe 135 PID 284 wrote to memory of 2400 284 $77Runtime Broker.exe 135 PID 284 wrote to memory of 4932 284 $77Runtime Broker.exe 137 PID 284 wrote to memory of 4932 284 $77Runtime Broker.exe 137 PID 284 wrote to memory of 4668 284 $77Runtime Broker.exe 139 PID 284 wrote to memory of 4668 284 $77Runtime Broker.exe 139 PID 284 wrote to memory of 428 284 $77Runtime Broker.exe 141 PID 284 wrote to memory of 428 284 $77Runtime Broker.exe 141 PID 284 wrote to memory of 824 284 $77Runtime Broker.exe 143 PID 284 wrote to memory of 824 284 $77Runtime Broker.exe 143 PID 284 wrote to memory of 3404 284 $77Runtime Broker.exe 145 PID 284 wrote to memory of 3404 284 $77Runtime Broker.exe 145 PID 284 wrote to memory of 3904 284 $77Runtime Broker.exe 147 PID 284 wrote to memory of 3904 284 $77Runtime Broker.exe 147 PID 284 wrote to memory of 1992 284 $77Runtime Broker.exe 149 PID 284 wrote to memory of 1992 284 $77Runtime Broker.exe 149 PID 284 wrote to memory of 3112 284 $77Runtime Broker.exe 151 PID 284 wrote to memory of 3112 284 $77Runtime Broker.exe 151 PID 284 wrote to memory of 4416 284 $77Runtime Broker.exe 153 PID 284 wrote to memory of 4416 284 $77Runtime Broker.exe 153 PID 284 wrote to memory of 4392 284 $77Runtime Broker.exe 155 PID 284 wrote to memory of 4392 284 $77Runtime Broker.exe 155 PID 284 wrote to memory of 2308 284 $77Runtime Broker.exe 157 PID 284 wrote to memory of 2308 284 $77Runtime Broker.exe 157 PID 284 wrote to memory of 5020 284 $77Runtime Broker.exe 159 PID 284 wrote to memory of 5020 284 $77Runtime Broker.exe 159 PID 284 wrote to memory of 3192 284 $77Runtime Broker.exe 161 PID 284 wrote to memory of 3192 284 $77Runtime Broker.exe 161 PID 284 wrote to memory of 4568 284 $77Runtime Broker.exe 163 PID 284 wrote to memory of 4568 284 $77Runtime Broker.exe 163 PID 284 wrote to memory of 2964 284 $77Runtime Broker.exe 165 PID 284 wrote to memory of 2964 284 $77Runtime Broker.exe 165 PID 284 wrote to memory of 1432 284 $77Runtime Broker.exe 167 PID 284 wrote to memory of 1432 284 $77Runtime Broker.exe 167 PID 284 wrote to memory of 1492 284 $77Runtime Broker.exe 169 PID 284 wrote to memory of 1492 284 $77Runtime Broker.exe 169 PID 284 wrote to memory of 2688 284 $77Runtime Broker.exe 171 PID 284 wrote to memory of 2688 284 $77Runtime Broker.exe 171 PID 284 wrote to memory of 1160 284 $77Runtime Broker.exe 173 PID 284 wrote to memory of 1160 284 $77Runtime Broker.exe 173 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2780 attrib.exe 2576 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\rat\SilverClient - Copy (2).exe"C:\Users\Admin\AppData\Local\Temp\rat\SilverClient - Copy (2).exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2576
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2780
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpCCA6.tmp.bat""2⤵PID:4664
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:548
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /query /TN $77Runtime Broker.exe4⤵PID:2936
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /Create /SC ONCE /TN "$77Runtime Broker.exe" /TR "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe \"\$77Runtime Broker.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:536
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /query /TN $77Runtime Broker.exe4⤵PID:3236
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc hourly /mo 1 /tn "Runtime Broker_Task-HOURLY-01" /tr "%MyFile%" /st 00:004⤵
- Scheduled Task/Job: Scheduled Task
PID:1480
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:2848
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4476
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:4384
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3424
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:2400
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:4668
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:428
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:824
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3404
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:3904
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:3112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4416
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:4392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:5020
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3192
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:4568
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:1432
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:2688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:4912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:3584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:3300
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:372
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:208
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:2948
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:4472
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5200
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:5324
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5420
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:5684
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5744
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:5820
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5988
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:6064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:6132
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:5512
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5432
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:5260
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:6148
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:6228
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:6368
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:6416
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:6524
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:6632
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:6708
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:6760
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:6976
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:7048
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:7104
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:5344
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:6076 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "6076" "2532" "2468" "2536" "0" "0" "2540" "0" "0" "0" "0" "0"5⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:8736
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:7156
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3812 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "3812" "2484" "2392" "2496" "0" "0" "2340" "0" "0" "0" "0" "0"5⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:8488
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:6476
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:6680 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "6680" "2508" "2456" "2512" "0" "0" "2516" "0" "0" "0" "0" "0"5⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:7276
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:1320
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:7336
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:7460
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:7552
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:7720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:7836
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:7940
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:8036
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:8156
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:7396
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:7704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:7312
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:7948
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:8232
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:8396
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:8556
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:8596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵PID:8684
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:8804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵PID:8912
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:9076
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵PID:9184
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:8416
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵PID:8508
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:8936
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:1168
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:8012
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:1572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5448
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:3580
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5588
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:9284
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:9404
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:9528
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:9664
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:9744
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵PID:9876
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:10084
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵PID:10132
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:10196
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵PID:9292
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:9452
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:5348
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:9932
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:6052
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:6020
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:6520
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵PID:5720
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:4380
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵PID:9276
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:336
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"4⤵PID:2208
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3460
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:6696
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
53KB
MD5a26df49623eff12a70a93f649776dab7
SHA1efb53bd0df3ac34bd119adf8788127ad57e53803
SHA2564ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245
SHA512e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c
-
Filesize
1KB
MD557db8170b710c945da7f0ff3f7ea38ce
SHA159da1434637b6ef5b74678182416b8d1436abe5b
SHA25654ee2bbc13e48a48ab0f0d4722344a70a403efed6bbe8e53f4445b8474e06a0e
SHA512e14f58b1726e046ca045402744e67664018f4569926dd4b287b9b2da07f4cabdb9decf99ba69bbd51d3db40f9332f9aa2ef357baf85f4be72448c885532229fe
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5112de462b54534dade61ef404c7a8405
SHA123b935642a0078ebb63eae835743093e032865ab
SHA25619cf50e59f2f59d8a333a51465a2cab739c40c8661ca1248609e90510b60d6a3
SHA512ef0bf03e1dfc27ec139eb8087a74977a8645563a394e651a4c23416ae6d242bf4afc9d20c0c86b6ff002db04711fb5461a52434d44f8bdc359d31d9fea59d451
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5bdcf2978614c124bdd660e3feb43748c
SHA1c69b519b84f08a345e90be6f7d7563336244dd18
SHA256a6689f83710b2f85926ca2110af5ac91be4e73cda027cbc0fab873dc0c545b31
SHA512f1a7820f01473db59d7f0e3e94ce75d5aa74ab36554dd64b26a3715df698cd0098aa14a92eec064a93b8f4060459a8b7e509c7072ff0e9113c40510abb9fbf2d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5f397ae18081016827c9765681df4407e
SHA1163ba0f6cefd79e2e84e0e363a5a9fa7ee896e90
SHA256f724ed206c2f3a6ea792eeefe20ffc7531080bfb53d492b1f1bb819ac40bf87d
SHA5120cc43edac0319a970f19e36989bce1a3a19b6c0302ea5db7614621dc80919b317b23ee1ba1ebe7df583a5116cdb2cf024c14245210d3fa8d918d804447c182f1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5913ae21fa8498f33b3b53bd59772a347
SHA1d6b4a35e590272b6cec4271e6e5813e400ab10e7
SHA2563ca75b702b57afda583e9d263c3e35d7ae59e3dc2ccfdc9d0b04662efecd643b
SHA512d9831d8a3d09e24e73c18e9402b03d0fd8ad183be16fc6697d5f613bcb853ee4946ca70272eea29f804e851f4ab202518bf91db9706404ec90d346d1ddab7d35
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD560198e6598880f8e63a19d0633cec484
SHA1779af6357d9df4824dfdd6c6a1afde56893436ab
SHA256166f13220382a706de31da3b2962418fa3bf9413d4cebdbeed4e861a3738d28d
SHA512cab6354030ce6d1364adfeb5fc7b9aee34a731ad66754f587da06f4e942fe85b3b759b589054ea76dc3aee94f6076afe62ab278205ba609318ad7db08b314594
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5042739570fe740576344423a63aa20c6
SHA12491c52edfc57e56a518c97cfcee78ee933d980c
SHA256a6f3611c8ddd2d2f11d4d122be51cc202705e28314f808e23926d88234f3251e
SHA512ac2767ca4d378350685b7afc0e3a685e7501903d47d16ff7c7daf8a67cb027bc9d8d0578f28f796f8114df70c1c637ae277803d183e82fd406edd7dedf19b59c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5b4a5e09917e149ca6a7dcc342780df27
SHA1e379917ff304e6897dbc27c30b2ee762066cef61
SHA25613c3821f72a4c6f337128845a699055e774e5b1b24b899aff2d126c7808bd018
SHA512e5986ede7e9434f2115ff4fc0407adc75bf303a189cc9d3320a8b2551f7c718e0d7b042e2f9e1fce83f3f9bb69e9dbbc235331f1e63efb07d5cb7d882d00af1e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD52d61414be0885d1718489ad7d1cf76e8
SHA1dff5c8b1f903d0614ea52c7153ea894ba78b30ca
SHA256f8aa7406203cac923473b38b475c3580e83eea45b3e2176b505709ca1ae2c94f
SHA51211ff6791e23a2c5895243585b0b3a36c600cf6fc749b4965b2409b17a88110858652735672d9407e5d042268c2165c7a669a7677d0aa33b0614331c682aa1f1d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD55e9588be282405ca389990b31baa3641
SHA16d222ba68faba0036a4fe629aa597244b34e3601
SHA256551b0e605dbb2430762d7a5348b76838c53d43b43f71916a5b816651a21cea86
SHA51253df95d8660174575d4ce3a1e0ad04a708cae8654e2b6189b72418d4353d94c4762892e69a7f6629e8a8995c7b48a1139512583847c41f9dfd28620b968d1b16
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD502562fd750b8bbaa989113c7bd49b417
SHA1ff918f63e77a982259a9cee343c9ef4c5a6ef637
SHA256e21dd87b81eed15dd1ce4ed85a7ab57cf4ff8849069ad0d3cc5c4f5867af8546
SHA512dddf863154519394f114d73b6d2c4d03fdfa0e0137bd9e7c522b08e8095eb77ec264204b2a330861e8a06145356a44fd0c80813cefdbbc6aaf9f0dd555fa89e9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD54ea4e434bfba3b961bb1e36a7ef67006
SHA1d189422e408fad652eae4c0c46b0c1e4859632d6
SHA2569e9623e86d0100e323894dfdd0fda1685e92a360a25a053391037938d0d7db9b
SHA512ad4b5d47022c12f430bdfdca32a967e3ed4b852fbf968e8a1305da1f8c37d4b97ab2ff9945880633d0eaa21cd0e2d96e64edc3f490762cd7f09a26ddfb2c4e35
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5888f7c0b2fd66bb88b06d2d6f373d8cb
SHA11c2e3e79f42d59886c7dee5e69b244e4b6075557
SHA25604651b31c23662e2e4f6e344af84e038536152f748aebcdf790e3bbe924fc3a5
SHA512c995f5f07ab65c3e1f8e553ea02389b1b35c23ce9c6ca2d9751d43c92a103dcd3ca901df8c0d53a728b28ed4d02c3e5f20f7ce01e227f1ee833aa0c64d816478
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5533edcf28248c27398d8562ee429ec48
SHA16d30ee262fbe4505a2bbe5c3597b46c9d913617a
SHA25606af09fa8ea2294f77c5b924425c0a701d033d81a67e990ec2aa266db9993af6
SHA51253d7692ffd095569f2d4317652f31c48426747eb19f77b140806e66697fc5bc5ff05b21d82da7a26635dce0348f854d325f7245b67b3c925b21b5f879ce76589
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5ecaa5a7927f36a65dba58abc4992ed62
SHA1d08f72a704f7f2f3de606b209fd28db4f14cc425
SHA2560201040979b1d2d1c1fe198f20dbd33f67af94f4918e3e3900625c2ce1891697
SHA512c44c9496dac836e67a2ebb53f4488c9ac8629ef93840f8fe995ea326f894ea7503422efd050073d9001867b5a8196a0716510a76e736bc791d0c67092e4b1900
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5849f1ed8ffbe1e51877e9467abb9eb5c
SHA1d59f3b3c98e3bd16dd547ea3bd3624e5af238ec9
SHA256226ad36c1ddbf6334ae2cb2cbd75c9d5d8466666290815cbca9b51fb53cb0a92
SHA51251f00819ae2cb71c7329aa97828e80cc36279d86d38061a06b067d63a46eadcc53b527a7d6eff1fc646c59ffdcfd321759dc1875de7726ebb4f6605e0ae49e66
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5962f0294c54300ea2b46b315033f9c53
SHA1c9c75e1e42e220f5b6867a3728fb203784eaaf61
SHA256f424bcd9fe7043861b1e221830741d20f00a684f956793b00cb821062183f807
SHA51276e8fb26e77417ea0fed490de1bdfec1026f3b6316e8396cd5890e922ac4dd12f3c543a7e62149054be516b2e75a12d72733b6562de5ea92d3f5d75b16845a23
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD565c716058e71d54fed23901e948bc0e8
SHA1df3246169385c4deb80d2fad4cca25a6e847c503
SHA256b35cf590c2b3bb4d8fddaa551212981417a1f5a61841660b1e9fdbc280d55d91
SHA512f81c74488fbed2dcdabf5ee480fd4f04abec5f34f68bc5fc99d410da0ce02475828a3d3753e9256f7bc43dcc7429fffece6614ffc87df2f3729baa1a0323fefe
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD52c78d3bd8205a03da11534f3d0082f6e
SHA17dad68248c075c01074b8ebbf67dd3a3c0d94105
SHA25633342c70609e8d1855ea584e26ed993084288cb1205acce8ab07202e99e9f3a9
SHA5122b942042f7e4c9ea4d854748b47ae08609dad552a5796e6f69bbbc8e73cfc6af7b8d70f608b772081c955b3cb87ceb061e4a74c94d60a9d1d6a37e1a762b43e5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD56d7dff11b2ba7942db1669d20d26326f
SHA1776fc999133c80b105abf9a2a524b122723dc24c
SHA256a1b9732c11058a7fcf12941cfd7b8fa0209b4f45aaf0cadba07af56457fbaa33
SHA512d4d62e0fdbd88dd425fd1cfd8262102b0c6f011bf6ef5377c4bd36f2e784f6042330ffadda9e4546a9c14443a89536f6d413e1b0d882c5b125c9bb45c8be93a7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD567eaabac2c69fbd2623b60fa0bfe821f
SHA13cfa1279ce1ded33a5e9be624c6c12e9705ad8a4
SHA25666fce2a8b9fb0b3935f1ccb27de042d8833841711d1b1c5aed2592775ebb90eb
SHA512878c3e31bde328752a0354fa38347775ef2e4c1894c8b0d58f35603c247029d757bb35397d87bbe1153bd6d09264b413ea25486d00557e43c0b856114f33482a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5cfde38a5a2cf78b4e5537ab9db34fb0f
SHA1d6268bb1bc36007629f4f2a562bd8f908515ac9a
SHA256dfe883bff24e89f63f1a939eb81ecb1ed10838c319a270e8d16e306ea178a08d
SHA5124428dcd0f318f0bfc5940bffd17cf0cb84fbf4d93fff9368a37ef0c90f531cd27cb3dfbe9a5e4daba17336e34b2cb9f4c923a29e6b2cd1ea4eabf93336407824
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5de531cdb2cd390c1a140e5ff48d68b71
SHA153c8aea624228fda8f8b9f9c203e418e15f526a4
SHA2560bd11c55784a0d952ec3e8fb9a3829ac42459d074218e47b7d230f42182da39f
SHA512d4f5e2dd67ff68bde044692d3ca4037cd57d5b4a2196d65320ce5b26014c3291c342e7dc4d8dd455eaca60cca0a77012691830c7416868acf5e891577c01b664
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5898bd6c28d04057e98882ca7ead40bd5
SHA15939c0fe9cf34d12fcc2ef8a5f664b5fa5d11662
SHA256e45e91e222bcdd083d51c0f63cc1db23d63e5018cfda01c887b120f5d83b9a75
SHA5125fc85ce7a9cb49f529b68373bf830f03f94edc34b06cb82002b05943562a1d3ced0525ae9456933a8d387bbe47efc55beb062c818b56ac2c2fc2bb926fd1f0a6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5ed7f73eb6ffe8e4cdb3e5960ff63b05f
SHA1c1ae3cf7e97cd42a2c456d892fa5568255a26648
SHA256aaf44ef4a707af8159369d0d9aa867c8e59b696db42e81a3d88f7036f7df9251
SHA51266774f66ab407b1288c72bef465f1cf81a75628ccc738e8f9a20d2ca458be8520e1a398271ba49674eebad972455bc4506db089fad1b1fade408e78bce8f882f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD54f633833c83b2af4e4b9abe20bb7972e
SHA1956e254934907c6163438b88f0e090af88fe0b16
SHA256d5f56a7e1ade520dccfb72d74422666f2161e9930f7271f0d3964f391a428e25
SHA512a86c7ecc8261845ddfa8e00a9d0df30652449e527d93d9a00aa21ec473be832625d8ec077a0dac0978f81a1318af8dc1e6658457a92fe4c336484f3012160d4f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5457d79bce1fa01f2330b4e2582f62649
SHA17ef73bab81678e791d085fa42666abd4f5f4b999
SHA25683aafdd7383534dc98dfbcde255d5a8dda2717517304237de3dfa59b2dd9f885
SHA512465ecf731f1adaf0353b29e26659fb4669724b6401b98ac2be4be324ec60ed1c8f8043cededb988485ae6ca8bb110e63b577bc9c0975864dcb199940f0aab7e7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD55ceea6749fa4aa385bc723d65a6c8a01
SHA16e695759faaa44a627198bf2b929b08b619b575f
SHA2564e623c13412cf9a5fbeb15d78e105ba182d626439eb72dbd1eb583c1792a94df
SHA512037392ec416d0d2a9539c6d1192e5a8a2f3bc435c18235f77ad939b93d6638034457609b5f5ec242cb7b9ee558ad9f16991213e4e93e3234590a7caf2c8c5a4c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5ea8963c64e37d8bae6f851e31b203591
SHA120c4838bfb400db1ed0f1f9af15e5564bb8d6956
SHA2564b1f0bb468599bb64ec8f968101e387fac0526d39a6bd5e7a98c67ea7864ad7c
SHA512ac5446c0028dbba33f99507ea40e721a1945b0fa992fd45759044f8b8c8660f3800d095840c07b3267fb21d2a123c3c6055fa19b5eb80fbae0d71ef08f44a5a4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5b87641c827b191387ca931c2c55ed111
SHA1fdd8c1997eecc958113fbd3fd99d4e4e62abee77
SHA2563df96d04c7905ab65ac77dc4cf87b8f7750bf64a2a77db903ad8ae6ae572c92e
SHA512da9ca9c21544914f90f47f199b064e5cc3fd01bed3ac6da859ae35139a018a32f0305d0a28dc16c6726b3105b6f6303327fc3deb4a22f9279e3258aea7c2774e
-
Filesize
43KB
MD544a5ff2feda2634ae7d9fadc97ebd0a0
SHA19a763aefd806585e11a36203e575ae142f38bc6c
SHA2565dde6801897a7d76c16e64c0b36a3280fbf5371642a690b85ddd31538c4458d8
SHA512cebc24998c33d7fe8bcdba5183d60c36b3ccaac247d0ee206a73485236453c109dc269522df01d85f58efd3d7a28358221f2139f11356f95f9b8283475f576ca