Chris Sanders 🔎 🧠<p>Investigation Scenario 🔎</p><p>This file was found on a user workstation: <a href="https://app.any.run/tasks/39d47711-d3cd-42f7-836b-55e442f5643c" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">app.any.run/tasks/39d47711-d3c</span><span class="invisible">d-42f7-836b-55e442f5643c</span></a></p><p>What do you look for to investigate it was executed and the extent of its effect on the system?</p><p><a href="https://infosec.exchange/tags/InvestigationPath" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InvestigationPath</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/SOC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SOC</span></a></p>