Analysis

  • max time kernel
    894s
  • max time network
    896s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2025, 22:10

General

  • Target

    rat/SilverClient - Copy (11).exe

  • Size

    43KB

  • MD5

    44a5ff2feda2634ae7d9fadc97ebd0a0

  • SHA1

    9a763aefd806585e11a36203e575ae142f38bc6c

  • SHA256

    5dde6801897a7d76c16e64c0b36a3280fbf5371642a690b85ddd31538c4458d8

  • SHA512

    cebc24998c33d7fe8bcdba5183d60c36b3ccaac247d0ee206a73485236453c109dc269522df01d85f58efd3d7a28358221f2139f11356f95f9b8283475f576ca

  • SSDEEP

    768:GdmcASe38zJ/Ol6IoZmtPHJm7+avCJ8eEPNRULQD9PUGa7AB6Sh/lE:GdmcASeuOtvhmeZKNGsD9pYAoS/lE

Malware Config

Extracted

Family

silverrat

Version

1.0.0.0

C2

if-eventually.gl.at.ply.gg:17094

Mutex

Mutex_DthEiIseBZ

Attributes
  • certificate

    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

  • decrypted_key

    -|S.S.S|-

  • key

    yy6zDjAUmbB09pKvo5Hhug==

  • key_x509

    eGlwZU1BZVJwdkFBdllxYmdRQUJ2eWtsbVVURFhE

  • reconnect_delay

    0

  • server_signature

    82XrwJstrm0nqjslD808bx+Ume3efeGMf7zUlVkngpQb87z21PsSKQBcTZK9EaXM0QyjpcsVNJXl0qmSosxJJOm0KKVMHYKGnVBNCZLj5O99+4v22ZWCi56RWOs9+ng8qwN8xdzn3HnKucPRz7a8JhI+UEI2ukS8ZhVfV7qf1oq6FwIG1uh4L4GwsQcfllQtFIzrcJqIdmWxM3WuMauxIW/Zzj51aSjpesrkHtxhBfKl3W4xhpX5jcWIcCiLfvfQ9E+PNUX749MGWb8fbvDdeI5yZun92ZZlcYpsymaYSEGIyzYotaZEVnsVattoVvsdOkWrsVqlKf4XIPFxmijkMaGQ/ayfFFpbjWPbyeJGlIAa+KbR5CxvF59/zedZirVAcFOWAzE/E/+kyxIbNtd6o7GZE2ZcIsMeei2HIjuCiWKsiV7qLY7vd//T8Rf8mG5/4i/xCiDG7HHX4oSx6mi6u97uThj6ULk43RmOL+fHaV2J+DewyDSivdrRWlQ95pX8FlRiKXlaJIxCbTWOwxsK2xebzkbsUKGGsOwCA/UQJ1TXNmatbaNqldHgqXKgYSFLRIiLDgM0xZQ+ThJag+cRkT7qr7W7HVaFlDNiLbVm4QZ34Iy//W3TM7w17dYghMhn3550gafqXCLOIH9vPh+YF9KVG3e3EOrkYaDUQK13PxY=

Signatures

  • SilverRat

    SilverRat is trojan written in C#.

  • Silverrat family
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 15 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 10 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rat\SilverClient - Copy (11).exe
    "C:\Users\Admin\AppData\Local\Temp\rat\SilverClient - Copy (11).exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\System32\attrib.exe
      "C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64"
      2⤵
      • Sets file to hidden
      • Views/modifies file attributes
      PID:2644
    • C:\Windows\System32\attrib.exe
      "C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe"
      2⤵
      • Sets file to hidden
      • Views/modifies file attributes
      PID:1844
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpFBD5.tmp.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:372
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:3244
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4772
        • C:\Windows\SYSTEM32\schtasks.exe
          "schtasks.exe" /query /TN $77Runtime Broker.exe
          4⤵
            PID:4240
          • C:\Windows\SYSTEM32\schtasks.exe
            "schtasks.exe" /Create /SC ONCE /TN "$77Runtime Broker.exe" /TR "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe \"\$77Runtime Broker.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST
            4⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2920
          • C:\Windows\SYSTEM32\schtasks.exe
            "schtasks.exe" /query /TN $77Runtime Broker.exe
            4⤵
              PID:4092
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit
              4⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4296
            • C:\Windows\System32\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /create /sc hourly /mo 1 /tn "Runtime Broker_Task-HOURLY-01" /tr "%MyFile%" /st 00:00
              4⤵
              • Scheduled Task/Job: Scheduled Task
              PID:2416
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe"
              4⤵
                PID:2228
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:5004
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe"
                4⤵
                  PID:4484
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2532
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe"
                  4⤵
                    PID:5036
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                    4⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3172
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe"
                    4⤵
                      PID:2104
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                      4⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3964
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe"
                      4⤵
                        PID:1240
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                        4⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1052
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe"
                        4⤵
                          PID:808
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                          4⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2856
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe"
                          4⤵
                            PID:464
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                            4⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1844
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe"
                            4⤵
                              PID:4424
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                              4⤵
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4220
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe"
                              4⤵
                                PID:296
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                4⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1516
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe"
                                4⤵
                                  PID:1616
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                  4⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4760
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe"
                                  4⤵
                                    PID:2248
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                    4⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4332
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe"
                                    4⤵
                                      PID:3440
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                      4⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4832
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe"
                                      4⤵
                                        PID:3696
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe"
                                        4⤵
                                          PID:1032
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                          4⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1940
                                          • C:\Windows\system32\wermgr.exe
                                            "C:\Windows\system32\wermgr.exe" "-outproc" "0" "1940" "2576" "2612" "2564" "0" "0" "2304" "0" "0" "0" "0" "0"
                                            5⤵
                                              PID:9260
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                            4⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:3320
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe"
                                            4⤵
                                              PID:5172
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe"
                                              4⤵
                                                PID:5184
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                4⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:5332
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                4⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:5340
                                                • C:\Windows\system32\wermgr.exe
                                                  "C:\Windows\system32\wermgr.exe" "-outproc" "0" "5340" "2568" "2484" "2596" "0" "0" "2572" "0" "0" "0" "0" "0"
                                                  5⤵
                                                    PID:10236
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe"
                                                  4⤵
                                                    PID:5436
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe"
                                                    4⤵
                                                      PID:5444
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                      4⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:5660
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                      4⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:5696
                                                      • C:\Windows\system32\wermgr.exe
                                                        "C:\Windows\system32\wermgr.exe" "-outproc" "0" "5696" "2452" "2464" "2456" "0" "0" "2424" "0" "0" "0" "0" "0"
                                                        5⤵
                                                        • Checks processor information in registry
                                                        • Enumerates system info in registry
                                                        PID:10236
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe"
                                                      4⤵
                                                        PID:5828
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe"
                                                        4⤵
                                                          PID:5920
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                          4⤵
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:5940
                                                          • C:\Windows\system32\wermgr.exe
                                                            "C:\Windows\system32\wermgr.exe" "-outproc" "0" "5940" "2492" "2352" "2496" "0" "0" "2500" "0" "0" "0" "0" "0"
                                                            5⤵
                                                            • Checks processor information in registry
                                                            • Enumerates system info in registry
                                                            PID:8624
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe"
                                                          4⤵
                                                            PID:6112
                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                            4⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:5128
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe"
                                                            4⤵
                                                              PID:5432
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                              4⤵
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:3484
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe"
                                                              4⤵
                                                                PID:5988
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                4⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:112
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                4⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:6152
                                                              • C:\Windows\System32\cmd.exe
                                                                "C:\Windows\System32\cmd.exe"
                                                                4⤵
                                                                  PID:6184
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                  4⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:6364
                                                                  • C:\Windows\system32\wermgr.exe
                                                                    "C:\Windows\system32\wermgr.exe" "-outproc" "0" "6364" "2408" "2344" "2436" "0" "0" "2440" "0" "0" "0" "0" "0"
                                                                    5⤵
                                                                    • Checks processor information in registry
                                                                    • Enumerates system info in registry
                                                                    PID:8480
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe"
                                                                  4⤵
                                                                    PID:6372
                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                    4⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:6568
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe"
                                                                    4⤵
                                                                      PID:6620
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe"
                                                                      4⤵
                                                                        PID:6764
                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                        4⤵
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:6780
                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                        4⤵
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:6896
                                                                        • C:\Windows\system32\wermgr.exe
                                                                          "C:\Windows\system32\wermgr.exe" "-outproc" "0" "6896" "2416" "2552" "2444" "0" "0" "2448" "0" "0" "0" "0" "0"
                                                                          5⤵
                                                                          • Checks processor information in registry
                                                                          • Enumerates system info in registry
                                                                          PID:9724
                                                                      • C:\Windows\System32\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe"
                                                                        4⤵
                                                                          PID:6904
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                          4⤵
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:6288
                                                                          • C:\Windows\system32\wermgr.exe
                                                                            "C:\Windows\system32\wermgr.exe" "-outproc" "0" "6288" "2332" "2276" "2336" "0" "0" "2340" "0" "0" "0" "0" "0"
                                                                            5⤵
                                                                            • Checks processor information in registry
                                                                            • Enumerates system info in registry
                                                                            PID:8984
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe"
                                                                          4⤵
                                                                            PID:6300
                                                                          • C:\Windows\System32\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe"
                                                                            4⤵
                                                                              PID:6668
                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                              4⤵
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:6696
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe"
                                                                              4⤵
                                                                                PID:7016
                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                4⤵
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:6464
                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                4⤵
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:7292
                                                                              • C:\Windows\System32\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe"
                                                                                4⤵
                                                                                  PID:7420
                                                                                • C:\Windows\System32\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe"
                                                                                  4⤵
                                                                                    PID:7508
                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                    4⤵
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:7596
                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                    4⤵
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:7776
                                                                                  • C:\Windows\System32\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe"
                                                                                    4⤵
                                                                                      PID:7812
                                                                                    • C:\Windows\System32\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe"
                                                                                      4⤵
                                                                                        PID:7920
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                        4⤵
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:8108
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                        4⤵
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:1108
                                                                                      • C:\Windows\System32\cmd.exe
                                                                                        "C:\Windows\System32\cmd.exe"
                                                                                        4⤵
                                                                                          PID:7216
                                                                                        • C:\Windows\System32\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe"
                                                                                          4⤵
                                                                                            PID:8028
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                            4⤵
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:2792
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                            4⤵
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:6848
                                                                                          • C:\Windows\System32\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe"
                                                                                            4⤵
                                                                                              PID:6888
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe"
                                                                                              4⤵
                                                                                                PID:8312
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                4⤵
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:8336
                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe"
                                                                                                4⤵
                                                                                                  PID:8600
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                  4⤵
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:8608
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                  4⤵
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:8744
                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe"
                                                                                                  4⤵
                                                                                                    PID:8752
                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                    "C:\Windows\System32\cmd.exe"
                                                                                                    4⤵
                                                                                                      PID:8960
                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                      4⤵
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:9040
                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe"
                                                                                                      4⤵
                                                                                                        PID:8256
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                        4⤵
                                                                                                          PID:6684
                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                          4⤵
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:7884
                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                          "C:\Windows\System32\cmd.exe"
                                                                                                          4⤵
                                                                                                            PID:8892
                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                            "C:\Windows\System32\cmd.exe"
                                                                                                            4⤵
                                                                                                              PID:7756
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                              4⤵
                                                                                                                PID:9340
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                                4⤵
                                                                                                                  PID:9396
                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                  "C:\Windows\System32\cmd.exe"
                                                                                                                  4⤵
                                                                                                                    PID:9588
                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe"
                                                                                                                    4⤵
                                                                                                                      PID:9636
                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                                      4⤵
                                                                                                                        PID:9804
                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                                        4⤵
                                                                                                                          PID:9924
                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                          "C:\Windows\System32\cmd.exe"
                                                                                                                          4⤵
                                                                                                                            PID:9972
                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                            "C:\Windows\System32\cmd.exe"
                                                                                                                            4⤵
                                                                                                                              PID:10108
                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                                              4⤵
                                                                                                                                PID:7380
                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                                                4⤵
                                                                                                                                  PID:9528
                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                  "C:\Windows\System32\cmd.exe"
                                                                                                                                  4⤵
                                                                                                                                    PID:9700
                                                                                                                            • C:\Windows\system32\vssvc.exe
                                                                                                                              C:\Windows\system32\vssvc.exe
                                                                                                                              1⤵
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              PID:2792

                                                                                                                            Network

                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                            Replay Monitor

                                                                                                                            Loading Replay Monitor...

                                                                                                                            Downloads

                                                                                                                            • C:\ProgramData\Microsoft\Windows\WER\Temp\WER5B.tmp.xml

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                              MD5

                                                                                                                              8e47806b6f54a3448490f7b6d1f20f6b

                                                                                                                              SHA1

                                                                                                                              f98f567cc45411e93e996bebb8014c87cd170348

                                                                                                                              SHA256

                                                                                                                              20a96e5da44647c706cdfe03676d92c3105d4cfa5a507ab4262da9d50005afc8

                                                                                                                              SHA512

                                                                                                                              549a6f501fbc530679e00ae832f197d05b7aa7cacb0f40f94a272340fa2c26b616dc8143d51c327ebf2499b75b6b700f5b1dacda3988d826064316c2e03dc4b5

                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                              Filesize

                                                                                                                              2KB

                                                                                                                              MD5

                                                                                                                              d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                                              SHA1

                                                                                                                              31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                                              SHA256

                                                                                                                              84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                                              SHA512

                                                                                                                              8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                                                                                              Filesize

                                                                                                                              53KB

                                                                                                                              MD5

                                                                                                                              a26df49623eff12a70a93f649776dab7

                                                                                                                              SHA1

                                                                                                                              efb53bd0df3ac34bd119adf8788127ad57e53803

                                                                                                                              SHA256

                                                                                                                              4ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245

                                                                                                                              SHA512

                                                                                                                              e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c

                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                              Filesize

                                                                                                                              2KB

                                                                                                                              MD5

                                                                                                                              d5027fa84240dc3220d99716447c97c0

                                                                                                                              SHA1

                                                                                                                              92ac0541c869f9f37262d32b913b654362f09be7

                                                                                                                              SHA256

                                                                                                                              997c33ab00b8fa500c72f4a15a23220662307056c761088d178506ace4937e82

                                                                                                                              SHA512

                                                                                                                              b8e951c42b1a721621c6d9899c4a68b3fa0d51a2643a02b22b27cce7611e70c66fdd51a22190a254727537c0abb135bbf5cfe6956cb82f4f0a00ff63243b9b0e

                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                              Filesize

                                                                                                                              2KB

                                                                                                                              MD5

                                                                                                                              f9f8d61d46581a5b8093250008f17423

                                                                                                                              SHA1

                                                                                                                              ea48a973ca84f1a1772491021256f2f816db24de

                                                                                                                              SHA256

                                                                                                                              c44ddb7dd68e7834506d4597f97ff30cc0c0b3c6215213411c25e6df0223fd8e

                                                                                                                              SHA512

                                                                                                                              3e069b7d82172f81d610241a58f5eed209def81b00cdec49b75b2df8c9202ea2bea3b441edafbd19631a8db57b88644bd6652bf88a2140db4c59e1d421d11b7c

                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                              Filesize

                                                                                                                              64B

                                                                                                                              MD5

                                                                                                                              446dd1cf97eaba21cf14d03aebc79f27

                                                                                                                              SHA1

                                                                                                                              36e4cc7367e0c7b40f4a8ace272941ea46373799

                                                                                                                              SHA256

                                                                                                                              a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf

                                                                                                                              SHA512

                                                                                                                              a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7

                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kaq03osl.geu.ps1

                                                                                                                              Filesize

                                                                                                                              60B

                                                                                                                              MD5

                                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                              SHA1

                                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                              SHA256

                                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                              SHA512

                                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tmpFBD5.tmp.bat

                                                                                                                              Filesize

                                                                                                                              199B

                                                                                                                              MD5

                                                                                                                              0ae399c53ccb1ef6533d67e260f90686

                                                                                                                              SHA1

                                                                                                                              2ef61867cf06759b3e63d8c75767bcfc35bf4482

                                                                                                                              SHA256

                                                                                                                              146aee4d2dcdcd1fa99e1921e05a364aa20fac817ccf27962af34e6c268995d6

                                                                                                                              SHA512

                                                                                                                              b72985dc9badd8293001ca2b5d6e59031808aa2a078910a9ab8c6b18853aa33dfee73dcf49ce62b1c43f7ca314876a759a7995845f136496e49323951256cf92

                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                              Filesize

                                                                                                                              6KB

                                                                                                                              MD5

                                                                                                                              25e606ce2c56f237ebbb4d406638b0ef

                                                                                                                              SHA1

                                                                                                                              8c187201cd0cff0b692ededa545826d28c4e8680

                                                                                                                              SHA256

                                                                                                                              a9dca133a73d6cc9b5f0e4ad20b61dc758e66a6536e6a8cbcfe9ad852fbd605e

                                                                                                                              SHA512

                                                                                                                              f894efe849fb64286ff3224f1ec02bd190bc908213492ebf561cd2d6654db0876a4c844e6ed7079eeed0c71c09f72e297e47d82ed2c5f90cd4fcd5cd97c7e9cc

                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                              Filesize

                                                                                                                              6KB

                                                                                                                              MD5

                                                                                                                              3c2f3ea22c586599e79b534cf24d1dab

                                                                                                                              SHA1

                                                                                                                              9d60341fda1404752e0a595b6148ce62661ae267

                                                                                                                              SHA256

                                                                                                                              d82e25a0918b435cf1b38890b8a3cd1e4c85588d5b01c72930dabb53e43687ae

                                                                                                                              SHA512

                                                                                                                              45744ec737e6ed7a10259c18ffb6c5ad3d3e5b60de6b1dd8d8bce65f2dccb92d37bb11cb9dae48dab891eac55b11d43c97c064dd591b52977073665b04ca1f94

                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                              Filesize

                                                                                                                              6KB

                                                                                                                              MD5

                                                                                                                              8f7b04f775dd95d1d3bc9d0852335d0b

                                                                                                                              SHA1

                                                                                                                              82b7b37036f2d65783b5fa421a7c0c7962f11ba0

                                                                                                                              SHA256

                                                                                                                              649ecdabc32c50c1e0bbe54ae30b1fa9d96f6d344cee3c9b299f8588d64fec34

                                                                                                                              SHA512

                                                                                                                              980b52ccf296eeb9ed0268ee198e60aaad6195ffc854783b967f0861086917434b299853c66e318eb50d9acbbcffa04eb13835287336d189d4742a4d42555722

                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                              Filesize

                                                                                                                              6KB

                                                                                                                              MD5

                                                                                                                              3fceeb8b60bcd9b819d5e3a296b22150

                                                                                                                              SHA1

                                                                                                                              222806e894ee7eed27843248ce1cc61ec8c6d248

                                                                                                                              SHA256

                                                                                                                              165d40812dc67493a9f7faaac07984cff59f1da91d6324bed1df8ed6705a9c1b

                                                                                                                              SHA512

                                                                                                                              0d13483f6e0cb7b2db76bffa8fcfe9e5730b645f53e3a5e0d850bd905a89a038cdcb3b425fca9eda89a6c779f656e20cf9d98d45bb245662a660ee73719a9d9e

                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                              Filesize

                                                                                                                              6KB

                                                                                                                              MD5

                                                                                                                              b313f634b98b10ca358cc7b07cc25fd0

                                                                                                                              SHA1

                                                                                                                              e057e8553dab0c83e2dec0b104e21bd106b5206c

                                                                                                                              SHA256

                                                                                                                              ca776c60d09c3acb9fa833a2c3e47f0e0b56375b387fd9b1922655eae2867b06

                                                                                                                              SHA512

                                                                                                                              20fdca5cf0d1bd5d88f46668e7010ba2e0eddd2f00a2c2a2567431568c6049fbba81099194540840cc0616c909b7e7321e644359d75c09fdf87a8b668868e391

                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                              Filesize

                                                                                                                              6KB

                                                                                                                              MD5

                                                                                                                              da898e7590ff0cfc219f0b8b6d9677da

                                                                                                                              SHA1

                                                                                                                              d7c71f6b1a5670d2a45f9019abd61fa8457275cc

                                                                                                                              SHA256

                                                                                                                              a5ff886d26c2e7461ac8f659ad978bed83f5f2d5af5701022efa5cc4b275e299

                                                                                                                              SHA512

                                                                                                                              66b1886c5b2ea67391a1e7462cd7fd305e5af45f1a9d17f0dacac98804cfcb5844acb184bd6cd2ee7112c76b08aa1f17f78a31eabcb17355b4e66a1adedfe36f

                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                              Filesize

                                                                                                                              6KB

                                                                                                                              MD5

                                                                                                                              a7c4a72e9e4071b1a2b607ace7640594

                                                                                                                              SHA1

                                                                                                                              c3ed5a842b4c014864db7153ed73d7ce799679a9

                                                                                                                              SHA256

                                                                                                                              3d648b2efbf7f3a900906e7714f39f2412c99e704b89594674269047e0d4c1b6

                                                                                                                              SHA512

                                                                                                                              cd960054d4b83c352f1a82a3abc2a12ae8cb1aaf2328d94623eb07c9fab6daa9d4bbad8643dad6e4a5797df5576f955a816d11fe6ca67c6f3691eb522975494e

                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                              Filesize

                                                                                                                              6KB

                                                                                                                              MD5

                                                                                                                              0ecc6d6e455ec05a6cf1438b97f56f62

                                                                                                                              SHA1

                                                                                                                              cc71124f13d5e5729a979f9aef195802dc35524f

                                                                                                                              SHA256

                                                                                                                              b3972bb5b816f1bad4c1484b7089e98d4b5d99af591cd31a2cc520738ad036b7

                                                                                                                              SHA512

                                                                                                                              c3a6b2ec4a75951bec8f2608bcb0dc3f7832d15dfb9b74f7139b3c3c771067785a6e6abc86f4bb29dbadcf83729508f1c6c0e79f6dfb5109a56182b30b755f55

                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                              Filesize

                                                                                                                              6KB

                                                                                                                              MD5

                                                                                                                              5320fa67fd85c82826e12374a1ab0277

                                                                                                                              SHA1

                                                                                                                              092f4630468c902fb6c9b3bbaf1b68d1024f15c9

                                                                                                                              SHA256

                                                                                                                              d6ba99a4cd2de62b31bd27a6055b4d3c84cd9e9499f8cf11f2613db55e0dee48

                                                                                                                              SHA512

                                                                                                                              f4895a05dbd7c849b3c0a3bb42631c7a1a96739157628bb14b8ea01c1b53f66d04541506ffc0864d83255341fccd359a8e61bbd38e2ebdd61161e08f67cf3f1c

                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                              Filesize

                                                                                                                              6KB

                                                                                                                              MD5

                                                                                                                              5e0dd8a86118c60f7e9a99d98e145dac

                                                                                                                              SHA1

                                                                                                                              f69c4ec7d2209c126ab8db802d6c45106efeff3c

                                                                                                                              SHA256

                                                                                                                              5ebc0d7d45563db501a70989ff79b20381445d85ff8462ee634c3f733cc49fac

                                                                                                                              SHA512

                                                                                                                              bd14ccf85485e319f076b62dc192f039c4d8b11bda2eec42cb2de3ad4431ecbb1190527015d83b2e46cc5ef5865377ba22ebd7d045449b6f02666a56142028f0

                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                              Filesize

                                                                                                                              6KB

                                                                                                                              MD5

                                                                                                                              11d1da5992285591e1603d04e2879574

                                                                                                                              SHA1

                                                                                                                              8e1ec8a22435e4f5d466421c0dbb96d3b94baaab

                                                                                                                              SHA256

                                                                                                                              f394d12ab6602a898d7e628bf3917c6077a95c06baff706cabfebf1ef004c6bf

                                                                                                                              SHA512

                                                                                                                              61e91978d152a83eae82cabf9e5d34845ed59cd4cc79e993d6feff0a2e2731f2dd4c68ea3708d3ef1a802a59f3af9700262db0a6972c1bf057adabcf71065829

                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                              Filesize

                                                                                                                              6KB

                                                                                                                              MD5

                                                                                                                              9c96d729a0b1e10301faed15bf0dde55

                                                                                                                              SHA1

                                                                                                                              c9e5a8d3e688518661384f2b1e96493acb5dfa34

                                                                                                                              SHA256

                                                                                                                              48bb81fe682a0923c0bd99edf66d232af55668a96fec996481c5aeb73300bcc9

                                                                                                                              SHA512

                                                                                                                              f3e305b80d030c483b089ccc23f98f520b788f1cf4d30bbc2b9506bc7e1f396b13cb5bbf2e92cc97aa70ba988e394b39cf17531a93c08d5f67531fb2cc7b884a

                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                              Filesize

                                                                                                                              6KB

                                                                                                                              MD5

                                                                                                                              193f79ff5869274e9913d79161d14dd4

                                                                                                                              SHA1

                                                                                                                              c3d9f620ba90881ae8315c687e9beea9c64b3d94

                                                                                                                              SHA256

                                                                                                                              91f44ddadb8f046668e480e4c70e83c8232d23f3243e9864d1d5cd6d24791edd

                                                                                                                              SHA512

                                                                                                                              279a587e309f4aaf10801e76d8f283329dfecf3214c9f40ef06b2c1398febb1df9e5616b2ebc2f1ae510476662400478a3e73094e7ff802089a1eb8f8de4a8a1

                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                              Filesize

                                                                                                                              6KB

                                                                                                                              MD5

                                                                                                                              88da647256a1e37aa737566f0712aa16

                                                                                                                              SHA1

                                                                                                                              1b2499f40323b646ad6df568c3ce93b1fa727fe5

                                                                                                                              SHA256

                                                                                                                              b8fae8f225436309c7e9eb79243bb995e9b8c3b7d30bc548dac66842f74520df

                                                                                                                              SHA512

                                                                                                                              e7232f7ff47ab8b063996a71eb37459cda5878c7d3eb7ecaf0b2c505c52908212c58aadeee75344afc5dbb665b309e5613de64b98e90f025cf63cd250cd0e654

                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                              Filesize

                                                                                                                              6KB

                                                                                                                              MD5

                                                                                                                              a397f3ab8b94458b4e6af3482d4cd3fa

                                                                                                                              SHA1

                                                                                                                              bc82a8e10e70300414ea1e8801aedfd265c34bb6

                                                                                                                              SHA256

                                                                                                                              b3a055e6f6a3e55e3ff3efcac80489db1b5ddfa97ffd0f075b6b8b4f7f86e465

                                                                                                                              SHA512

                                                                                                                              9435196346e865cbc3abb56455dd51ff8961fcdc12fb3aefed688c7ca2b0b2f7b8c6860c0762bd990ced454f7d49adf15b1f8300da82fa5b00fc38e3dc492784

                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                              Filesize

                                                                                                                              6KB

                                                                                                                              MD5

                                                                                                                              a7e4ad2734e1b1ca6f3e2d4f221f681f

                                                                                                                              SHA1

                                                                                                                              d5222688108d1f45cd100e56e5a4e88ab799da2f

                                                                                                                              SHA256

                                                                                                                              31d76b232535de641cd82004506e5ddfd047e313e740bf9cf324732e09558056

                                                                                                                              SHA512

                                                                                                                              78592c013c8436b2d1d403dbea6a555f012d9cfd315f61cb66bafc3e1e09c3756310fc068d8ec437615896d0240c25f1b601ce5bde4cb8fc3c747bf7f72c7ca7

                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe

                                                                                                                              Filesize

                                                                                                                              43KB

                                                                                                                              MD5

                                                                                                                              44a5ff2feda2634ae7d9fadc97ebd0a0

                                                                                                                              SHA1

                                                                                                                              9a763aefd806585e11a36203e575ae142f38bc6c

                                                                                                                              SHA256

                                                                                                                              5dde6801897a7d76c16e64c0b36a3280fbf5371642a690b85ddd31538c4458d8

                                                                                                                              SHA512

                                                                                                                              cebc24998c33d7fe8bcdba5183d60c36b3ccaac247d0ee206a73485236453c109dc269522df01d85f58efd3d7a28358221f2139f11356f95f9b8283475f576ca

                                                                                                                            • memory/1940-611-0x0000023223350000-0x00000232234BA000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              1.4MB

                                                                                                                            • memory/2212-3-0x00007FFBEE683000-0x00007FFBEE685000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8KB

                                                                                                                            • memory/2212-0-0x00007FFBEE683000-0x00007FFBEE685000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8KB

                                                                                                                            • memory/2212-1-0x0000000000320000-0x0000000000330000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              64KB

                                                                                                                            • memory/2212-10-0x00007FFBEE680000-0x00007FFBEF141000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              10.8MB

                                                                                                                            • memory/2212-2-0x00007FFBEE680000-0x00007FFBEF141000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              10.8MB

                                                                                                                            • memory/2212-4-0x00007FFBEE680000-0x00007FFBEF141000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              10.8MB

                                                                                                                            • memory/3320-622-0x00000285317C0000-0x000002853192A000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              1.4MB

                                                                                                                            • memory/4296-14-0x000001F7F3E70000-0x000001F7F3E92000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              136KB

                                                                                                                            • memory/4772-26-0x000000001D340000-0x000000001D360000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              128KB

                                                                                                                            • memory/5004-99-0x000002077B930000-0x000002077B9A6000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              472KB

                                                                                                                            • memory/5004-72-0x000002077B860000-0x000002077B8A4000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              272KB

                                                                                                                            • memory/5332-623-0x0000017E77E30000-0x0000017E77F9A000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              1.4MB

                                                                                                                            • memory/5696-600-0x000001C321970000-0x000001C321ADA000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              1.4MB

                                                                                                                            • memory/5940-608-0x0000018735B90000-0x0000018735CFA000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              1.4MB

                                                                                                                            • memory/6364-599-0x000002B92CD00000-0x000002B92CE6A000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              1.4MB

                                                                                                                            • memory/6896-609-0x000001F5C7840000-0x000001F5C79AA000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              1.4MB

                                                                                                                            • memory/7884-562-0x0000024E751A0000-0x0000024E7530A000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              1.4MB