Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 13:24
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-25_4c63b362b73a36e9410738b9f81428ef_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-25_4c63b362b73a36e9410738b9f81428ef_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-25_4c63b362b73a36e9410738b9f81428ef_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe
-
Size
5.0MB
-
MD5
4c63b362b73a36e9410738b9f81428ef
-
SHA1
32824d470f193773e515870c9d3cf8dfa076b2a6
-
SHA256
a9fcd874776f3f25782f85303cec11ac2c2e599d05e3d8a3ec3cb5e253bf7d12
-
SHA512
17715f6600d44747bf22f4960256d33b4c3e6eb6192f24ad09207023870182b0c72a14851afb36d99f20e94ca646717a6fd9c7021b12a579a2585f06c0d02b64
-
SSDEEP
49152:wRg0nHs3wQuuhrb/T8vO90d7HjmAFd4A64nsfJoRLvXW4uyRcH5g3ZCNUgxocMCF:b3wQuu81n256dgxtrE7+eGt
Malware Config
Extracted
meshagent
2
TacticalRMM
http://mesh.trmm.v-consulting.com:443/agent.ashx
-
mesh_id
0x79CC638C055FE100C59C9323FA6EBA3DC401BCC6B1C545978FD06AA55AE1B47307B41240C24A067C6BA18464D5E8CDF5
-
server_id
0F065FD3EA3A2BA9B18DA11DE9E25D6F976A32944350A24CB834A6D1A6EAD7F86F0388FF89786D8F26B5DF45DC73EB03
-
wss
wss://mesh.trmm.v-consulting.com:443/agent.ashx
Signatures
-
Detects MeshAgent payload 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023cbb-29.dat family_meshagent -
Meshagent family
-
Blocklisted process makes network request 3 IoCs
flow pid Process 79 3928 powershell.exe 82 3928 powershell.exe 112 4760 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 1 IoCs
flow pid Process 122 3852 Process not Found -
Modifies Windows Firewall 2 TTPs 3 IoCs
pid Process 2620 netsh.exe 4056 netsh.exe 3244 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Mesh Agent\ImagePath = "\"C:\\Program Files\\Mesh Agent\\MeshAgent.exe\" " meshagent.exe -
Stops running service(s) 4 TTPs
-
Executes dropped EXE 33 IoCs
pid Process 5028 tacticalagent-v2.8.0-windows-amd64.exe 4572 tacticalagent-v2.8.0-windows-amd64.tmp 3344 tacticalrmm.exe 996 tacticalrmm.exe 432 meshagent.exe 1072 MeshAgent.exe 2880 MeshAgent.exe 4320 tacticalrmm.exe 2876 tacticalrmm.exe 4400 python.exe 1788 MeshAgent.exe 5084 choco.exe 820 tacticalrmm.exe 4484 tacticalrmm.exe 4988 tacticalrmm.exe 4524 tacticalrmm.exe 4500 tacticalrmm.exe 1004 tacticalrmm.exe 4156 python.exe 620 rustdesk.exe 4984 rustdesk.exe 2836 rustdesk.exe 2552 RustDesk.exe 4752 RustDesk.exe 4576 RustDesk.exe 3412 RustDesk.exe 724 RustDesk.exe 3164 rustdesk.exe 1092 RustDesk.exe 4524 RustDesk.exe 2840 RustDesk.exe 3968 RustDesk.exe 3256 rustdesk.exe -
Loads dropped DLL 64 IoCs
pid Process 4400 python.exe 4400 python.exe 4400 python.exe 4400 python.exe 4400 python.exe 4400 python.exe 4400 python.exe 4400 python.exe 4400 python.exe 4156 python.exe 4156 python.exe 4156 python.exe 4156 python.exe 4156 python.exe 4156 python.exe 4156 python.exe 4156 python.exe 4156 python.exe 4156 python.exe 4156 python.exe 620 rustdesk.exe 620 rustdesk.exe 620 rustdesk.exe 620 rustdesk.exe 620 rustdesk.exe 620 rustdesk.exe 620 rustdesk.exe 620 rustdesk.exe 620 rustdesk.exe 620 rustdesk.exe 620 rustdesk.exe 620 rustdesk.exe 620 rustdesk.exe 620 rustdesk.exe 620 rustdesk.exe 620 rustdesk.exe 4984 rustdesk.exe 4984 rustdesk.exe 4984 rustdesk.exe 4984 rustdesk.exe 4984 rustdesk.exe 4984 rustdesk.exe 4984 rustdesk.exe 4984 rustdesk.exe 4984 rustdesk.exe 4984 rustdesk.exe 4984 rustdesk.exe 4984 rustdesk.exe 4984 rustdesk.exe 2836 rustdesk.exe 2836 rustdesk.exe 2836 rustdesk.exe 2836 rustdesk.exe 2836 rustdesk.exe 2836 rustdesk.exe 2836 rustdesk.exe 2836 rustdesk.exe 2836 rustdesk.exe 2836 rustdesk.exe 2836 rustdesk.exe 2836 rustdesk.exe 2836 rustdesk.exe 2552 RustDesk.exe 2552 RustDesk.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Power Settings 1 TTPs 1 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 1308 powercfg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\shaders\ink_sparkle.frag rustdesk.exe File opened for modification C:\Windows\System32\exe\MeshService64.pdb MeshAgent.exe File opened for modification C:\Windows\System32\ntdll.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\AssetManifest.bin rustdesk.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\assets\auth-okta.svg rustdesk.exe File opened for modification C:\Windows\System32\dll\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\dbghelp.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\dbghelp.pdb MeshAgent.exe File opened for modification C:\Windows\System32\DLL\dbgcore.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\assets\auth-azure.svg rustdesk.exe File opened for modification C:\Windows\System32\crypt32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\gdi32full.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\msvcp_win.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\assets\call_wait.svg rustdesk.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\assets\scam.png rustdesk.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\assets\secure.svg rustdesk.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\assets\chat2.svg rustdesk.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\1CF0AAA87C24E23DF0A3E9EA994431F6FA9B9050 MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\assets\tabbar.ttf rustdesk.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\packages\wakelock_plus\assets\no_sleep.js rustdesk.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\usbmmidd_v2\usbmmIdd.inf rustdesk.exe File opened for modification C:\Windows\System32\symbols\dll\bcryptprimitives.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\AssetManifest.json rustdesk.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\assets\trash.svg rustdesk.exe File opened for modification C:\Windows\System32\dll\ole32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\msvcp_win.pdb MeshAgent.exe File opened for modification C:\Windows\System32\Kernel.Appcore.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\packages\window_manager\images\ic_chrome_close.png rustdesk.exe File opened for modification C:\Windows\System32\dll\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Keys MeshAgent.exe File opened for modification C:\Windows\System32\gdi32full.pdb MeshAgent.exe File opened for modification C:\Windows\System32\DLL\bcrypt.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\assets\search.svg rustdesk.exe File opened for modification C:\Windows\System32\rpcrt4.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\win32u.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\fonts\MaterialIcons-Regular.otf rustdesk.exe File opened for modification C:\Windows\System32\symbols\dll\ole32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\DLL\bcrypt.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\System32\symbols\dll\kernelbase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\ucrtbase.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\assets\address_book.ttf rustdesk.exe File opened for modification C:\Windows\System32\ws2_32.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\assets\record_screen.svg rustdesk.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 tacticalrmm.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\assets\refresh.svg rustdesk.exe File opened for modification C:\Windows\System32\symbols\dll\ntdll.pdb MeshAgent.exe File opened for modification C:\Windows\System32\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\bcryptprimitives.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\file_selector_windows_plugin.dll rustdesk.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\assets\fullscreen.svg rustdesk.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Keys\364C8B986C112BF2875E6D8FF55DD19FA89DAF5F MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\choco.exe.log choco.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\desktop_multi_window_plugin.dll rustdesk.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\dylib_virtual_display.dll rustdesk.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\FontManifest.json rustdesk.exe File opened for modification C:\Windows\System32\kernelbase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\DLL\iphlpapi.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\assets\voice_call.svg rustdesk.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\assets\gestures.ttf rustdesk.exe File opened for modification C:\Windows\System32\symbols\DLL\kernel32.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\data\flutter_assets\assets\close.svg rustdesk.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pkg_resources\_vendor\importlib_resources\_compat.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pythonwin\pywin\framework\bitmap.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\sniffio\_tests\__init__.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\win32comext\axscript\test\testHost.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\adodbapi\examples\xls_read.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pkg_resources\_vendor\packaging\tags.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pysmi\borrower\__init__.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\setuptools\command\install_scripts.py tacticalrmm.exe File created C:\Program Files\RustDesk\data\flutter_assets\assets\record_screen.svg xcopy.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\Cryptodome\SelfTest\Cipher\test_CBC.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pip\_internal\locations\__init__.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pip\_vendor\urllib3\util\ssltransport.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pycparser\ply\ctokens.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pythonwin\pywin\Demos\openGLDemo.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\win32com\client\__init__.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\win32comext\directsound\directsound.pyd tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Scripts\pip.exe tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\anyio\lowlevel.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\Cryptodome\SelfTest\Random\test_random.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pip\_vendor\requests\_internal_utils.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pkg_resources\_vendor\packaging\_tokenizer.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\win32comext\shell\demos\viewstate.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\anyio\__init__.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\Cryptodome\PublicKey\_openssh.pyi tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\cryptography-42.0.8.dist-info\LICENSE.BSD tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pycryptodomex-3.20.0.dist-info\top_level.txt tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pysnmplib-5.0.24.dist-info\INSTALLER tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\requests-2.32.3.dist-info\INSTALLER tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\urllib3\contrib\emscripten\response.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\win32comext\authorization\demos\EditSecurity.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\Cryptodome\Cipher\DES.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pip\_internal\locations\_distutils.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\win32\Demos\win32clipboardDemo.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\win32com\server\__init__.py tacticalrmm.exe File created C:\Program Files\RustDesk\dylib_virtual_display.dll xcopy.exe File created C:\Program Files\RustDesk\usbmmidd_v2\usbmmIdd.inf xcopy.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\Cryptodome\Hash\SHA384.pyi tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\cryptography-42.0.8.dist-info\INSTALLER tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pyasn1\type\tag.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pysnmplib-5.0.24.dist-info\REQUESTED tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\setuptools\_distutils\command\build_scripts.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\setuptools\command\egg_info.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\anyio\_core\_tasks.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pip\_internal\cli\base_command.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pip\_internal\commands\debug.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pip\_internal\models\target_python.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pythonwin\pywin\tools\__init__.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\win32com\test\policySemantics.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\win32comext\authorization\demos\EditServiceSecurity.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pip\_vendor\rich\highlighter.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pythonwin\pywin\idle\FormatParagraph.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\win32ctypes\tests\test_win32api.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\anyio\pytest_plugin.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\Cryptodome\Random\random.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\httpx\_transports\__init__.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pip\_vendor\tenacity\__init__.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pip\_vendor\urllib3\util\ssl_.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pycparser-2.22.dist-info\WHEEL tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pysmi\parser\smiv2.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\setuptools\_distutils\command\build.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\setuptools\command\alias.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\setuptools\config\_validate_pyproject\error_reporting.py tacticalrmm.exe File created C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\win32\lib\sspi.py tacticalrmm.exe File opened for modification C:\Program Files\RustDesk\window_size_plugin.dll xcopy.exe -
Drops file in Windows directory 34 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\log\service\RustDesk_rCURRENT.log RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\config\RustDesk.2840_ThreadId(11)_1737811596752086200 RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\config\RustDesk.4576_ThreadId(3)_1737811580233078000 RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\log\service\RustDesk_rCURRENT.log RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\log\tray\RustDesk_rCURRENT.log RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\log\get-id\RustDesk_rCURRENT.log rustdesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\log\silent-install\rustdesk_rCURRENT.log rustdesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\config\RustDesk.4576_ThreadId(3)_1737811580196276400 RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\config\RustDesk2.toml powershell.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\log\server\RustDesk_rCURRENT.log RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\log\uninstall-cert\rustdesk_rCURRENT.log rustdesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\log\uninstall-amyuni-idd\rustdesk_rCURRENT.log rustdesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\log\check-hwcodec-config\RustDesk_rCURRENT.log RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\config\RustDesk2.2840_ThreadId(24)_1737811591480273000 RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\log\get-id\RustDesk_rCURRENT.log rustdesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\log\check-hwcodec-config\RustDesk_rCURRENT.log RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\config\RustDesk2.4576_ThreadId(23)_1737811580106862000 RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\log\password\RustDesk_rCURRENT.log RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\config\RustDesk.1092_ThreadId(2)_1737811590146781600 RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\config\RustDesk2.2840_ThreadId(25)_1737811591542345800 RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\config\RustDesk2.2840_ThreadId(3)_1737811591706553400 RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\log\server\RustDesk_rCURRENT.log RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\config\RustDesk.4576_ThreadId(28)_1737811580201684500 RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\config\RustDesk2.4576_ThreadId(23)_1737811580216251800 RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\config\RustDesk2.4576_ThreadId(25)_1737811580430612200 RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\config\RustDesk_hwcodec.2840_ThreadId(11)_1737811591488138800 RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\config\RustDesk.2840_ThreadId(3)_1737811591707095700 RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\log\import-config\RustDesk_rCURRENT.log RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\config\RustDesk2.4576_ThreadId(3)_1737811580231877900 RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\config\RustDesk.4576_ThreadId(3)_1737811580232454800 RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\config\RustDesk_hwcodec.4576_ThreadId(11)_1737811580465750900 RustDesk.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\config\RustDesk2.toml powershell.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\config\RustDesk2.1092_ThreadId(2)_1737811590148046900 RustDesk.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\config\RustDesk.2840_ThreadId(3)_1737811591707632800 RustDesk.exe -
Launches sc.exe 12 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1596 sc.exe 1772 sc.exe 1908 sc.exe 1880 sc.exe 3492 sc.exe 4480 sc.exe 1636 sc.exe 4984 sc.exe 1212 sc.exe 3712 sc.exe 3624 sc.exe 1516 sc.exe -
pid Process 872 powershell.exe 3628 powershell.exe 3928 powershell.exe 5088 powershell.exe 2076 powershell.exe 3376 powershell.exe 4540 powershell.exe 4760 powershell.exe 2872 powershell.exe 3608 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tacticalagent-v2.8.0-windows-amd64.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tacticalagent-v2.8.0-windows-amd64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3164 cmd.exe 4100 PING.EXE 5032 cmd.exe 4680 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 rustdesk.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID rustdesk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 rustdesk.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID rustdesk.exe -
Kills process with taskkill 6 IoCs
pid Process 3272 taskkill.exe 2620 taskkill.exe 2512 taskkill.exe 1720 taskkill.exe 872 taskkill.exe 184 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-452 = "Caucasus Standard Time" tacticalrmm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ rustdesk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" rustdesk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" tacticalrmm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" tacticalrmm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs tacticalrmm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates tacticalrmm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" tacticalrmm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople tacticalrmm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2752 = "Tomsk Standard Time" tacticalrmm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs tacticalrmm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates tacticalrmm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" tacticalrmm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-572 = "China Standard Time" tacticalrmm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2631 = "Norfolk Daylight Time" tacticalrmm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" tacticalrmm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" tacticalrmm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" tacticalrmm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" tacticalrmm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" tacticalrmm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" tacticalrmm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-32 = "Mid-Atlantic Standard Time" tacticalrmm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" tacticalrmm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs tacticalrmm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" tacticalrmm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs tacticalrmm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" tacticalrmm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" tacticalrmm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" tacticalrmm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs tacticalrmm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs tacticalrmm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs tacticalrmm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1411 = "Syria Daylight Time" tacticalrmm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" tacticalrmm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs tacticalrmm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates tacticalrmm.exe -
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rustdesk\STARTMENUSHORTCUTS = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rustdesk\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rustdesk\shell\open\command reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\rustdesk reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\rustdesk\shell reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\rustdesk\shell\ reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rustdesk\shell reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\rustdesk\shell\open\command\ reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rustdesk reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rustdesk\ reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rustdesk reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rustdesk\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rustdesk\DefaultIcon\ = "\"C:\\Program Files\\RustDesk\\RustDesk.exe\",0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\rustdesk\shell\open reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rustdesk\shell\open\command reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\rustdesk\shell\open\command reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rustdesk\DefaultIcon\ reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rustdesk\shell\open reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rustdesk\shell\open\command\ = "\"C:\\Program Files\\RustDesk\\RustDesk.exe\" --play \"%1\"" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\rustdesk\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\rustdesk\URL Protocol reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\rustdesk\shell\open\ reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rustdesk reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rustdesk\shell\open\command\ reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\rustdesk reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\rustdesk\shell\open\command reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rustdesk\DESKTOPSHORTCUTS = "1" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rustdesk\shell\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rustdesk\shell\open\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\rustdesk\shell\open\command\ = "\"C:\\Program Files\\RustDesk\\RustDesk.exe\" \"%1\"" reg.exe -
Modifies system certificate store 2 TTPs 14 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 tacticalrmm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 tacticalrmm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 tacticalrmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4 tacticalrmm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 2025-01-25_4c63b362b73a36e9410738b9f81428ef_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 tacticalrmm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 tacticalrmm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 tacticalrmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C 2025-01-25_4c63b362b73a36e9410738b9f81428ef_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 2025-01-25_4c63b362b73a36e9410738b9f81428ef_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 tacticalrmm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 tacticalrmm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 tacticalrmm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 tacticalrmm.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4680 PING.EXE 4100 PING.EXE -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 3344 tacticalrmm.exe 996 tacticalrmm.exe 996 tacticalrmm.exe 996 tacticalrmm.exe 4320 tacticalrmm.exe 872 powershell.exe 872 powershell.exe 2076 powershell.exe 2076 powershell.exe 3628 powershell.exe 3628 powershell.exe 3376 powershell.exe 3376 powershell.exe 4320 tacticalrmm.exe 4320 tacticalrmm.exe 2876 tacticalrmm.exe 4320 tacticalrmm.exe 4320 tacticalrmm.exe 4540 powershell.exe 4540 powershell.exe 3928 powershell.exe 3928 powershell.exe 4500 tacticalrmm.exe 4524 tacticalrmm.exe 4484 tacticalrmm.exe 1004 tacticalrmm.exe 4988 tacticalrmm.exe 820 tacticalrmm.exe 4760 powershell.exe 4760 powershell.exe 2872 powershell.exe 2872 powershell.exe 3608 powershell.exe 3608 powershell.exe 2872 powershell.exe 3608 powershell.exe 4760 powershell.exe 4760 powershell.exe 4752 RustDesk.exe 4752 RustDesk.exe 4576 RustDesk.exe 4576 RustDesk.exe 724 RustDesk.exe 4524 RustDesk.exe 4524 RustDesk.exe 2840 RustDesk.exe 2840 RustDesk.exe 2840 RustDesk.exe 2840 RustDesk.exe 2840 RustDesk.exe 2840 RustDesk.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1720 taskkill.exe Token: SeDebugPrivilege 3344 tacticalrmm.exe Token: SeDebugPrivilege 996 tacticalrmm.exe Token: SeAssignPrimaryTokenPrivilege 5116 wmic.exe Token: SeIncreaseQuotaPrivilege 5116 wmic.exe Token: SeSecurityPrivilege 5116 wmic.exe Token: SeTakeOwnershipPrivilege 5116 wmic.exe Token: SeLoadDriverPrivilege 5116 wmic.exe Token: SeSystemtimePrivilege 5116 wmic.exe Token: SeBackupPrivilege 5116 wmic.exe Token: SeRestorePrivilege 5116 wmic.exe Token: SeShutdownPrivilege 5116 wmic.exe Token: SeSystemEnvironmentPrivilege 5116 wmic.exe Token: SeUndockPrivilege 5116 wmic.exe Token: SeManageVolumePrivilege 5116 wmic.exe Token: SeAssignPrimaryTokenPrivilege 5116 wmic.exe Token: SeIncreaseQuotaPrivilege 5116 wmic.exe Token: SeSecurityPrivilege 5116 wmic.exe Token: SeTakeOwnershipPrivilege 5116 wmic.exe Token: SeLoadDriverPrivilege 5116 wmic.exe Token: SeSystemtimePrivilege 5116 wmic.exe Token: SeBackupPrivilege 5116 wmic.exe Token: SeRestorePrivilege 5116 wmic.exe Token: SeShutdownPrivilege 5116 wmic.exe Token: SeSystemEnvironmentPrivilege 5116 wmic.exe Token: SeUndockPrivilege 5116 wmic.exe Token: SeManageVolumePrivilege 5116 wmic.exe Token: SeAssignPrimaryTokenPrivilege 2112 wmic.exe Token: SeIncreaseQuotaPrivilege 2112 wmic.exe Token: SeSecurityPrivilege 2112 wmic.exe Token: SeTakeOwnershipPrivilege 2112 wmic.exe Token: SeLoadDriverPrivilege 2112 wmic.exe Token: SeSystemtimePrivilege 2112 wmic.exe Token: SeBackupPrivilege 2112 wmic.exe Token: SeRestorePrivilege 2112 wmic.exe Token: SeShutdownPrivilege 2112 wmic.exe Token: SeSystemEnvironmentPrivilege 2112 wmic.exe Token: SeUndockPrivilege 2112 wmic.exe Token: SeManageVolumePrivilege 2112 wmic.exe Token: SeAssignPrimaryTokenPrivilege 2112 wmic.exe Token: SeIncreaseQuotaPrivilege 2112 wmic.exe Token: SeSecurityPrivilege 2112 wmic.exe Token: SeTakeOwnershipPrivilege 2112 wmic.exe Token: SeLoadDriverPrivilege 2112 wmic.exe Token: SeSystemtimePrivilege 2112 wmic.exe Token: SeBackupPrivilege 2112 wmic.exe Token: SeRestorePrivilege 2112 wmic.exe Token: SeShutdownPrivilege 2112 wmic.exe Token: SeSystemEnvironmentPrivilege 2112 wmic.exe Token: SeUndockPrivilege 2112 wmic.exe Token: SeManageVolumePrivilege 2112 wmic.exe Token: SeAssignPrimaryTokenPrivilege 4576 wmic.exe Token: SeIncreaseQuotaPrivilege 4576 wmic.exe Token: SeSecurityPrivilege 4576 wmic.exe Token: SeTakeOwnershipPrivilege 4576 wmic.exe Token: SeLoadDriverPrivilege 4576 wmic.exe Token: SeSystemtimePrivilege 4576 wmic.exe Token: SeBackupPrivilege 4576 wmic.exe Token: SeRestorePrivilege 4576 wmic.exe Token: SeShutdownPrivilege 4576 wmic.exe Token: SeSystemEnvironmentPrivilege 4576 wmic.exe Token: SeUndockPrivilege 4576 wmic.exe Token: SeManageVolumePrivilege 4576 wmic.exe Token: SeAssignPrimaryTokenPrivilege 4576 wmic.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4572 tacticalagent-v2.8.0-windows-amd64.tmp 724 RustDesk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4468 wrote to memory of 5028 4468 2025-01-25_4c63b362b73a36e9410738b9f81428ef_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe 86 PID 4468 wrote to memory of 5028 4468 2025-01-25_4c63b362b73a36e9410738b9f81428ef_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe 86 PID 4468 wrote to memory of 5028 4468 2025-01-25_4c63b362b73a36e9410738b9f81428ef_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe 86 PID 5028 wrote to memory of 4572 5028 tacticalagent-v2.8.0-windows-amd64.exe 87 PID 5028 wrote to memory of 4572 5028 tacticalagent-v2.8.0-windows-amd64.exe 87 PID 5028 wrote to memory of 4572 5028 tacticalagent-v2.8.0-windows-amd64.exe 87 PID 4572 wrote to memory of 5032 4572 tacticalagent-v2.8.0-windows-amd64.tmp 88 PID 4572 wrote to memory of 5032 4572 tacticalagent-v2.8.0-windows-amd64.tmp 88 PID 4572 wrote to memory of 5032 4572 tacticalagent-v2.8.0-windows-amd64.tmp 88 PID 5032 wrote to memory of 4680 5032 cmd.exe 90 PID 5032 wrote to memory of 4680 5032 cmd.exe 90 PID 5032 wrote to memory of 4680 5032 cmd.exe 90 PID 5032 wrote to memory of 2928 5032 cmd.exe 91 PID 5032 wrote to memory of 2928 5032 cmd.exe 91 PID 5032 wrote to memory of 2928 5032 cmd.exe 91 PID 2928 wrote to memory of 2020 2928 net.exe 92 PID 2928 wrote to memory of 2020 2928 net.exe 92 PID 2928 wrote to memory of 2020 2928 net.exe 92 PID 4572 wrote to memory of 4744 4572 tacticalagent-v2.8.0-windows-amd64.tmp 93 PID 4572 wrote to memory of 4744 4572 tacticalagent-v2.8.0-windows-amd64.tmp 93 PID 4572 wrote to memory of 4744 4572 tacticalagent-v2.8.0-windows-amd64.tmp 93 PID 4744 wrote to memory of 4868 4744 cmd.exe 95 PID 4744 wrote to memory of 4868 4744 cmd.exe 95 PID 4744 wrote to memory of 4868 4744 cmd.exe 95 PID 4868 wrote to memory of 4384 4868 net.exe 96 PID 4868 wrote to memory of 4384 4868 net.exe 96 PID 4868 wrote to memory of 4384 4868 net.exe 96 PID 4572 wrote to memory of 3164 4572 tacticalagent-v2.8.0-windows-amd64.tmp 97 PID 4572 wrote to memory of 3164 4572 tacticalagent-v2.8.0-windows-amd64.tmp 97 PID 4572 wrote to memory of 3164 4572 tacticalagent-v2.8.0-windows-amd64.tmp 97 PID 3164 wrote to memory of 4100 3164 cmd.exe 99 PID 3164 wrote to memory of 4100 3164 cmd.exe 99 PID 3164 wrote to memory of 4100 3164 cmd.exe 99 PID 3164 wrote to memory of 2492 3164 cmd.exe 100 PID 3164 wrote to memory of 2492 3164 cmd.exe 100 PID 3164 wrote to memory of 2492 3164 cmd.exe 100 PID 2492 wrote to memory of 1244 2492 net.exe 101 PID 2492 wrote to memory of 1244 2492 net.exe 101 PID 2492 wrote to memory of 1244 2492 net.exe 101 PID 4572 wrote to memory of 2864 4572 tacticalagent-v2.8.0-windows-amd64.tmp 102 PID 4572 wrote to memory of 2864 4572 tacticalagent-v2.8.0-windows-amd64.tmp 102 PID 4572 wrote to memory of 2864 4572 tacticalagent-v2.8.0-windows-amd64.tmp 102 PID 2864 wrote to memory of 1720 2864 cmd.exe 104 PID 2864 wrote to memory of 1720 2864 cmd.exe 104 PID 2864 wrote to memory of 1720 2864 cmd.exe 104 PID 4572 wrote to memory of 4372 4572 tacticalagent-v2.8.0-windows-amd64.tmp 107 PID 4572 wrote to memory of 4372 4572 tacticalagent-v2.8.0-windows-amd64.tmp 107 PID 4572 wrote to memory of 4372 4572 tacticalagent-v2.8.0-windows-amd64.tmp 107 PID 4372 wrote to memory of 4480 4372 cmd.exe 109 PID 4372 wrote to memory of 4480 4372 cmd.exe 109 PID 4372 wrote to memory of 4480 4372 cmd.exe 109 PID 4572 wrote to memory of 3076 4572 tacticalagent-v2.8.0-windows-amd64.tmp 110 PID 4572 wrote to memory of 3076 4572 tacticalagent-v2.8.0-windows-amd64.tmp 110 PID 4572 wrote to memory of 3076 4572 tacticalagent-v2.8.0-windows-amd64.tmp 110 PID 3076 wrote to memory of 1596 3076 cmd.exe 112 PID 3076 wrote to memory of 1596 3076 cmd.exe 112 PID 3076 wrote to memory of 1596 3076 cmd.exe 112 PID 4572 wrote to memory of 536 4572 tacticalagent-v2.8.0-windows-amd64.tmp 113 PID 4572 wrote to memory of 536 4572 tacticalagent-v2.8.0-windows-amd64.tmp 113 PID 4572 wrote to memory of 536 4572 tacticalagent-v2.8.0-windows-amd64.tmp 113 PID 536 wrote to memory of 3344 536 cmd.exe 115 PID 536 wrote to memory of 3344 536 cmd.exe 115 PID 4572 wrote to memory of 4156 4572 tacticalagent-v2.8.0-windows-amd64.tmp 116 PID 4572 wrote to memory of 4156 4572 tacticalagent-v2.8.0-windows-amd64.tmp 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-25_4c63b362b73a36e9410738b9f81428ef_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-25_4c63b362b73a36e9410738b9f81428ef_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe"1⤵
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exeC:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe /VERYSILENT /SUPPRESSMSGBOXES2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\is-GOO26.tmp\tacticalagent-v2.8.0-windows-amd64.tmp"C:\Users\Admin\AppData\Local\Temp\is-GOO26.tmp\tacticalagent-v2.8.0-windows-amd64.tmp" /SL5="$50284,3660179,825344,C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe" /VERYSILENT /SUPPRESSMSGBOXES3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c ping 127.0.0.1 -n 2 && net stop tacticalrpc4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 25⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4680
-
-
C:\Windows\SysWOW64\net.exenet stop tacticalrpc5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop tacticalrpc6⤵
- System Location Discovery: System Language Discovery
PID:2020
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c net stop tacticalagent4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\net.exenet stop tacticalagent5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop tacticalagent6⤵
- System Location Discovery: System Language Discovery
PID:4384
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c ping 127.0.0.1 -n 2 && net stop tacticalrmm4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 25⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4100
-
-
C:\Windows\SysWOW64\net.exenet stop tacticalrmm5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop tacticalrmm6⤵
- System Location Discovery: System Language Discovery
PID:1244
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /F /IM tacticalrmm.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM tacticalrmm.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc delete tacticalagent4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\sc.exesc delete tacticalagent5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4480
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc delete tacticalrpc4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\sc.exesc delete tacticalrpc5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1596
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c tacticalrmm.exe -m installsvc4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Program Files\TacticalAgent\tacticalrmm.exetacticalrmm.exe -m installsvc5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3344
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c net start tacticalrmm4⤵
- System Location Discovery: System Language Discovery
PID:4156 -
C:\Windows\SysWOW64\net.exenet start tacticalrmm5⤵
- System Location Discovery: System Language Discovery
PID:4104 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start tacticalrmm6⤵
- System Location Discovery: System Language Discovery
PID:4492
-
-
-
-
-
-
C:\Program Files\TacticalAgent\tacticalrmm.exe"C:\Program Files\TacticalAgent\tacticalrmm.exe" -m install --api https://api.trmm.v-consulting.com --client-id 6 --site-id 9 --agent-type workstation --auth 5b9472796a1c23bdaf91ebdad8ab4b0ce080e83f3199cdd50bb816e3fa1ddd1e2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:996 -
C:\Program Files\TacticalAgent\meshagent.exe"C:\Program Files\TacticalAgent\meshagent.exe" -fullinstall3⤵
- Sets service image path in registry
- Executes dropped EXE
PID:432
-
-
C:\Program Files\Mesh Agent\MeshAgent.exe"C:\Program Files\Mesh Agent\MeshAgent.exe" -nodeid3⤵
- Executes dropped EXE
PID:2880
-
-
-
C:\Program Files\Mesh Agent\MeshAgent.exe"C:\Program Files\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1072 -
C:\Windows\System32\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Windows\system32\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Windows\System32\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
C:\Windows\system32\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵PID:4052
-
-
C:\Windows\System32\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵PID:1528
-
-
C:\Windows\System32\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵PID:1156
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2076
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3628
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3376
-
-
C:\Windows\system32\cmd.exe/c manage-bde -protectors -get C: -Type recoverypassword2⤵PID:2356
-
C:\Windows\system32\manage-bde.exemanage-bde -protectors -get C: -Type recoverypassword3⤵PID:4048
-
-
-
C:\Windows\system32\cmd.exe/c manage-bde -protectors -get F: -Type recoverypassword2⤵PID:868
-
C:\Windows\system32\manage-bde.exemanage-bde -protectors -get F: -Type recoverypassword3⤵PID:1476
-
-
-
C:\Program Files\TacticalAgent\tacticalrmm.exe"C:\Program Files\TacticalAgent\tacticalrmm.exe" -m svc1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:4320 -
C:\Program Files\TacticalAgent\tacticalrmm.exe"C:\Program Files\TacticalAgent\tacticalrmm.exe" -m checkrunner2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2876 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass C:\ProgramData\TacticalRMM\487028693.ps13⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4540
-
-
-
C:\Program Files\TacticalAgent\python\py3.11.9_amd64\python.exe"C:\Program Files\TacticalAgent\python\py3.11.9_amd64\python.exe" C:\ProgramData\TacticalRMM\2532113240.py2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4400
-
-
C:\Program Files\Mesh Agent\MeshAgent.exe"C:\Program Files\Mesh Agent\MeshAgent.exe" -nodeid2⤵
- Executes dropped EXE
PID:1788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass C:\ProgramData\TacticalRMM\3097521414.ps12⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3928 -
C:\Windows\System32\setx.exe"C:\Windows\System32\setx.exe" ChocolateyLastPathUpdate 1338228513692139743⤵PID:4084
-
-
C:\Windows\System32\setx.exe"C:\Windows\System32\setx.exe" ChocolateyLastPathUpdate 1338228513715143483⤵PID:4760
-
-
C:\Windows\System32\setx.exe"C:\Windows\System32\setx.exe" ChocolateyLastPathUpdate 1338228513729879523⤵PID:2992
-
-
C:\Windows\System32\setx.exe"C:\Windows\System32\setx.exe" ChocolateyLastPathUpdate 1338228513806372103⤵PID:3492
-
-
C:\ProgramData\chocolatey\choco.exe"C:\ProgramData\chocolatey\choco.exe" -v3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5084
-
-
-
C:\Program Files\TacticalAgent\tacticalrmm.exe"C:\Program Files\TacticalAgent\tacticalrmm.exe" -m taskrunner -p 61⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:820 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass C:\ProgramData\TacticalRMM\1313663634.ps12⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4760 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" stop rustdesk3⤵PID:4756
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop rustdesk4⤵PID:2348
-
-
-
C:\Windows\TEMP\rustdesk.exe"C:\Windows\TEMP\rustdesk.exe" --silent-install3⤵
- Drops file in System32 directory
PID:1568 -
C:\Windows\system32\taskkill.exe"taskkill" /F /IM RuntimeBroker_rustdesk.exe4⤵
- Kills process with taskkill
PID:872
-
-
C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\rustdesk.exe"C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\.\rustdesk.exe" --silent-install4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:620 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Windows\TEMP\RustDesk_install.bat5⤵PID:4032
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:1064
-
-
C:\Windows\system32\sc.exesc stop RustDesk6⤵
- Launches sc.exe
PID:1772
-
-
C:\Windows\system32\sc.exesc delete RustDesk6⤵
- Launches sc.exe
PID:1908
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM RuntimeBroker_rustdesk.exe6⤵
- Kills process with taskkill
PID:184
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM RustDesk.exe /FI "PID ne 620"6⤵
- Kills process with taskkill
PID:3272
-
-
C:\Windows\system32\reg.exereg delete HKEY_CLASSES_ROOT\.rustdesk /f6⤵PID:4524
-
-
C:\Windows\system32\reg.exereg delete HKEY_CLASSES_ROOT\rustdesk /f6⤵PID:2508
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall delete rule name="RustDesk Service"6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2620
-
-
C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\rustdesk.exe"C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\.\rustdesk.exe" --uninstall-cert6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:4984
-
-
C:\Windows\system32\reg.exereg delete HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\RustDesk /f6⤵PID:4736
-
-
C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\rustdesk.exe"C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk\.\rustdesk.exe" --uninstall-amyuni-idd6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:2836
-
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:1812
-
-
C:\Windows\system32\xcopy.exeXCOPY "C:\Windows\system32\config\systemprofile\AppData\Local\rustdesk" "C:\Program Files\RustDesk" /Y /E /H /C /I /K /R /Z6⤵
- Drops file in Program Files directory
PID:1860
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\RustDesk /f6⤵PID:1528
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\RustDesk /f /v DisplayIcon /t REG_SZ /d "C:\Program Files\RustDesk\RustDesk.exe"6⤵PID:732
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\RustDesk /f /v DisplayName /t REG_SZ /d "RustDesk"6⤵PID:4084
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\RustDesk /f /v DisplayVersion /t REG_SZ /d "1.3.7"6⤵PID:224
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\RustDesk /f /v Version /t REG_SZ /d "1.3.7"6⤵PID:4948
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\RustDesk /f /v BuildDate /t REG_SZ /d "2025-01-21 09:41"6⤵PID:4936
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\RustDesk /f /v InstallLocation /t REG_SZ /d "C:\Program Files\RustDesk"6⤵PID:2928
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\RustDesk /f /v Publisher /t REG_SZ /d "RustDesk"6⤵PID:5032
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\RustDesk /f /v VersionMajor /t REG_DWORD /d 16⤵PID:872
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\RustDesk /f /v VersionMinor /t REG_DWORD /d 36⤵PID:3152
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\RustDesk /f /v VersionBuild /t REG_DWORD /d 76⤵PID:4784
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\RustDesk /f /v UninstallString /t REG_SZ /d "\"C:\Program Files\RustDesk\RustDesk.exe\" --uninstall"6⤵PID:2512
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\RustDesk /f /v EstimatedSize /t REG_DWORD /d 2616⤵PID:4040
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\RustDesk /f /v WindowsInstaller /t REG_DWORD /d 06⤵PID:4500
-
-
C:\Windows\system32\cscript.execscript "C:\Windows\TEMP\RustDesk_mk_shortcut.vbs"6⤵PID:1772
-
-
C:\Windows\system32\cscript.execscript "C:\Windows\TEMP\RustDesk_uninstall_shortcut.vbs"6⤵PID:3376
-
-
C:\Windows\system32\cscript.execscript "C:\Windows\TEMP\RustDesk_tray_shortcut.vbs"6⤵PID:3272
-
-
C:\Windows\system32\sc.exesc stop RustDesk6⤵
- Launches sc.exe
PID:1516
-
-
C:\Windows\system32\sc.exesc delete RustDesk6⤵
- Launches sc.exe
PID:1636
-
-
C:\Windows\system32\sc.exesc create RustDesk binpath= "\"C:\Program Files\RustDesk\RustDesk.exe\" --import-config \"C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\config\RustDesk.toml\"" start= auto DisplayName= "RustDesk Service"6⤵
- Launches sc.exe
PID:1880
-
-
C:\Windows\system32\sc.exesc start RustDesk6⤵
- Launches sc.exe
PID:4984
-
-
C:\Windows\system32\sc.exesc stop RustDesk6⤵
- Launches sc.exe
PID:1212
-
-
C:\Windows\system32\sc.exesc delete RustDesk6⤵
- Launches sc.exe
PID:3712
-
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:4916
-
-
C:\Windows\system32\reg.exereg add HKEY_CLASSES_ROOT\.rustdesk /f6⤵
- Modifies registry class
PID:3124
-
-
C:\Windows\system32\reg.exereg add HKEY_CLASSES_ROOT\.rustdesk /f /v DESKTOPSHORTCUTS /t REG_SZ /d "1"6⤵
- Modifies registry class
PID:3968
-
-
C:\Windows\system32\reg.exereg add HKEY_CLASSES_ROOT\.rustdesk /f /v STARTMENUSHORTCUTS /t REG_SZ /d "1"6⤵
- Modifies registry class
PID:3748
-
-
C:\Windows\system32\reg.exereg add HKEY_CLASSES_ROOT\.rustdesk\DefaultIcon /f6⤵
- Modifies registry class
PID:1552
-
-
C:\Windows\system32\reg.exereg add HKEY_CLASSES_ROOT\.rustdesk\DefaultIcon /f /ve /t REG_SZ /d "\"C:\Program Files\RustDesk\RustDesk.exe\",0"6⤵
- Modifies registry class
PID:1904
-
-
C:\Windows\system32\reg.exereg add HKEY_CLASSES_ROOT\.rustdesk\shell /f6⤵
- Modifies registry class
PID:4904
-
-
C:\Windows\system32\reg.exereg add HKEY_CLASSES_ROOT\.rustdesk\shell\open /f6⤵
- Modifies registry class
PID:2536
-
-
C:\Windows\system32\reg.exereg add HKEY_CLASSES_ROOT\.rustdesk\shell\open\command /f6⤵
- Modifies registry class
PID:2460
-
-
C:\Windows\system32\reg.exereg add HKEY_CLASSES_ROOT\.rustdesk\shell\open\command /f /ve /t REG_SZ /d "\"C:\Program Files\RustDesk\RustDesk.exe\" --play \"%1\""6⤵
- Modifies registry class
PID:1140
-
-
C:\Windows\system32\reg.exereg add HKEY_CLASSES_ROOT\rustdesk /f6⤵
- Modifies registry class
PID:3280
-
-
C:\Windows\system32\reg.exereg add HKEY_CLASSES_ROOT\rustdesk /f /v "URL Protocol" /t REG_SZ /d ""6⤵
- Modifies registry class
PID:3228
-
-
C:\Windows\system32\reg.exereg add HKEY_CLASSES_ROOT\rustdesk\shell /f6⤵
- Modifies registry class
PID:1332
-
-
C:\Windows\system32\reg.exereg add HKEY_CLASSES_ROOT\rustdesk\shell\open /f6⤵
- Modifies registry class
PID:4992
-
-
C:\Windows\system32\reg.exereg add HKEY_CLASSES_ROOT\rustdesk\shell\open\command /f6⤵
- Modifies registry class
PID:3772
-
-
C:\Windows\system32\reg.exereg add HKEY_CLASSES_ROOT\rustdesk\shell\open\command /f /ve /t REG_SZ /d "\"C:\Program Files\RustDesk\RustDesk.exe\" \"%1\""6⤵
- Modifies registry class
PID:3732
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="RustDesk Service" dir=out action=allow program="C:\Program Files\RustDesk\RustDesk.exe" enable=yes6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4056
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="RustDesk Service" dir=in action=allow program="C:\Program Files\RustDesk\RustDesk.exe" enable=yes6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3244
-
-
C:\Windows\system32\sc.exesc create RustDesk binpath= "\"C:\Program Files\RustDesk\RustDesk.exe\" --service" start= auto DisplayName= "RustDesk Service"6⤵
- Launches sc.exe
PID:3492
-
-
C:\Windows\system32\sc.exesc start RustDesk6⤵
- Launches sc.exe
PID:3624
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System /f /v SoftwareSASGeneration /t REG_DWORD /d 16⤵PID:220
-
-
-
C:\Program Files\RustDesk\RustDesk.exe"C:\Program Files\RustDesk\RustDesk.exe" --tray5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:724
-
-
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" stop rustdesk3⤵PID:1680
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop rustdesk4⤵PID:3768
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "c:\Program Files\RustDesk\RustDesk.exe" --get-id3⤵PID:3244
-
\??\c:\Program Files\RustDesk\rustdesk.exe"c:\Program Files\RustDesk\RustDesk.exe" --get-id4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3164
-
-
-
C:\Program Files\RustDesk\RustDesk.exe"C:\Program Files\RustDesk\RustDesk.exe" --password RdJLabxgwceh3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1092
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" start rustdesk3⤵PID:3552
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rustdesk4⤵PID:3376
-
-
-
-
C:\Program Files\TacticalAgent\tacticalrmm.exe"C:\Program Files\TacticalAgent\tacticalrmm.exe" -m taskrunner -p 81⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4484 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass C:\ProgramData\TacticalRMM\3938034872.ps12⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2872 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Program Files\RustDesk\RustDesk.exe" --get-id3⤵PID:1528
-
C:\Program Files\RustDesk\rustdesk.exe"C:\Program Files\RustDesk\RustDesk.exe" --get-id4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3256
-
-
-
-
C:\Program Files\TacticalAgent\tacticalrmm.exe"C:\Program Files\TacticalAgent\tacticalrmm.exe" -m taskrunner -p 471⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4988 -
C:\Program Files\TacticalAgent\python\py3.11.9_amd64\python.exe"C:\Program Files\TacticalAgent\python\py3.11.9_amd64\python.exe" C:\ProgramData\TacticalRMM\3834292607.py2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4156 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic product wmic product where "Name like '%%Sentinel%%'" get name,version get name,version"3⤵PID:1584
-
C:\Windows\System32\Wbem\WMIC.exewmic product wmic product where "Name like '%%Sentinel%%'" get name,version get name,version4⤵PID:3272
-
-
-
-
C:\Program Files\TacticalAgent\tacticalrmm.exe"C:\Program Files\TacticalAgent\tacticalrmm.exe" -m taskrunner -p 301⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4524 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\TacticalRMM\2677429895.bat2⤵PID:3900
-
C:\Windows\system32\powercfg.exepowercfg.exe -x -standby-timeout-ac 03⤵
- Power Settings
PID:1308
-
-
-
C:\Program Files\TacticalAgent\tacticalrmm.exe"C:\Program Files\TacticalAgent\tacticalrmm.exe" -m taskrunner -p 391⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4500 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass C:\ProgramData\TacticalRMM\938304095.ps12⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3608 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Windows\TEMP\s4pmy4t1\s4pmy4t1.cmdline"3⤵PID:4084
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Windows\TEMP\RES7371.tmp" "c:\Windows\Temp\s4pmy4t1\CSC4DCC77AFD6A84A6E8DC43139157F486A.TMP"4⤵PID:1528
-
-
-
-
C:\Program Files\TacticalAgent\tacticalrmm.exe"C:\Program Files\TacticalAgent\tacticalrmm.exe" -m taskrunner -p 601⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1004 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass C:\ProgramData\TacticalRMM\2605806090.ps12⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:5088
-
-
C:\Program Files\RustDesk\RustDesk.exe"C:\Program Files\RustDesk\RustDesk.exe" --import-config "C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\RustDesk\config\RustDesk.toml"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2552
-
C:\Program Files\RustDesk\RustDesk.exe"C:\Program Files\RustDesk\RustDesk.exe" --service1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4752 -
C:\Program Files\RustDesk\RustDesk.exe"C:\Program Files\RustDesk\RustDesk.exe" --server2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4576 -
C:\Windows\system32\cmd.exe"cmd" /c "taskkill /F /IM RuntimeBroker_rustdesk.exe"3⤵PID:4200
-
C:\Windows\system32\taskkill.exetaskkill /F /IM RuntimeBroker_rustdesk.exe4⤵
- Kills process with taskkill
PID:2620
-
-
-
C:\Program Files\RustDesk\RustDesk.exe"C:\Program Files\RustDesk\RustDesk.exe" --check-hwcodec-config3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3412
-
-
-
C:\Program Files\RustDesk\RustDesk.exe"C:\Program Files\RustDesk\RustDesk.exe" --service1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4524 -
C:\Program Files\RustDesk\RustDesk.exe"C:\Program Files\RustDesk\RustDesk.exe" --server2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Windows\system32\cmd.exe"cmd" /c "taskkill /F /IM RuntimeBroker_rustdesk.exe"3⤵PID:4156
-
C:\Windows\system32\taskkill.exetaskkill /F /IM RuntimeBroker_rustdesk.exe4⤵
- Kills process with taskkill
PID:2512
-
-
-
C:\Program Files\RustDesk\RustDesk.exe"C:\Program Files\RustDesk\RustDesk.exe" --check-hwcodec-config3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3968
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5c67860a3411f00aae29a8ca8d8a3e9ef
SHA19d54de61803612d09acc0da7108934114c1075fa
SHA256481e9da98473e5457fd1e229260ae0b5600bf1b26f8626d3eb94128fc64224c0
SHA512ebf51c6f9fa735ff68bf74525221b2e2f11ed11cebd20802ab099894413a6b3bf81bb9c83f6b62a05730682b1e11e804f592009fe0768efd20b4afaaf12d8afb
-
Filesize
153KB
MD59b5deee696855ffdf5fb43f00b218c4f
SHA1bea76249447cdc0313b313794d14b4c4121a649f
SHA2565e302f6de6d1c1eac64f794183f3e0f0a044a2e480d017c7885518b8ed365870
SHA512d6471526eab48e2e2c663121b2cfe338620fde907d2dfc75ca2c60d35543123890270467d5a353dc1d0a8e19e61b33ccb67cdb0adcd272c13c72a7c420593993
-
Filesize
959B
MD526086384747ff27fc88d9baecc0725bc
SHA101c23088eceda50a9a97b49d10c35e0e8b6b73d3
SHA2560aeccabcd40b0264730517ac5af1b7305586d8bf8faf3aa4269d7e4e3ca2bc10
SHA51216fd0451df32882f3f5c20032c87e96a56777bbc5f58735725f37f48fcd364396a38204acaf2d990a83c14252655bf9f2d33929494372d231bea97f2d0f98bcb
-
Filesize
67B
MD54e94043ec30bcad27ccdf5f2ee94274b
SHA1184f57e9977250e6160ec9b90fa23fac8befecf5
SHA256cc68ec3e7ae03630de534ce7e07fd4f8bd52f81c89af0b38ee12e2aa5a93da17
SHA512f88ece92c60920dd38c551a5dfbecbe381822ba69d1779499f32c8ed86c17ac246840a941d0a5c9524136c46197d3d00531c2afec81e8d3138809ecea31b936f
-
Filesize
3.3MB
MD52641d5b122336e87d2964c562898caea
SHA1ad3b817c810702c6ccd060192566350ac5eb77fd
SHA25688b6c219763de23bbe1752aa22d408bf9b3db1926e691fd6a299beb0680c9757
SHA5124380d048e42ad1e58a64ea0bcb1f31c4cc343e43c12e052327a997505a804f68f2b26bad77dc48d4ce04b8d5d4adc6be6878c8ce462916247bc74ef136e2c401
-
Filesize
5KB
MD5ee216afd7a0d2615c3cace29a68a11db
SHA1209a6ea81dd5625e2e9ae7503bb8b67738bb1ff1
SHA2564bf5b0bc8f8af7ce7096e96f7167cf4f776f2cc0983f5c8f876ca780b3a67781
SHA512423205d351991ffcd4a852e25a6010cc8cca0f7f5fb0eb20ef0e12cc6bca9523cf86ad91047761f0cce011eceb65c8e7671f85184ff0283088997f61ec311ae7
-
C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\cryptography-42.0.8.dist-info\INSTALLER
Filesize4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1
-
Filesize
151B
MD518d27e199b0d26ef9b718ce7ff5a8927
SHA1ea9c9bfc82ad47e828f508742d7296e69d2226e4
SHA2562638ce9e2500e572a5e0de7faed6661eb569d1b696fcba07b0dd223da5f5d224
SHA512b8504949f3ddf0089164b0296e8371d7dcdd4c3761fb17478994f5e6943966528a45a226eba2d5286b9c799f0eb8c99bd20cbd8603a362532b3a65dd058fa42e
-
Filesize
89KB
MD5277c5bd5f7fbe2c4d720a6a81f8c1151
SHA143c09a30e95522af1d6302a349ea7ea61dad7ebd
SHA2568537a71b152d03e62915c697e0c90a211664b504a00d5f37a41b858aeb4802ee
SHA51232d40a127c7b64818e190771e2c6c36836230f2b4eae990f3245bc6e567630d27cb37ca664870d387f398d2686b0f8cab7bd8158b09e53caab04788aa8e34505
-
Filesize
29KB
MD568d96f575f075939b4686630dd49f0d8
SHA127ac4c2cb20834e62c7016ab6f437b08ba831560
SHA256ae5bf9d2fa6916938657a00f848984dae6d4696fcb98e3fb82ec777f3e65a83c
SHA512b2a934452f3f88ff764745ac54ce4de68fb49cc1c585af82b44d2d4a063e7069afdda51baedf36a620911be07fd9df4923a7e32597ffb656efb2dc7f8d151b52
-
Filesize
15KB
MD57ccfb8c305a85be23216eda03108a002
SHA155fcde35cc7308dd8aa754967a00c5cc86fbf4df
SHA256ccdecd71fc56b78dc77676cd97d58f75d2ad8ad7c6c7aaaf5d6239222cdc6acb
SHA512fc2585add339762a9232652797749555c1f3f606b4a750488ba065fe4dadbc07cad63d23da5bc0273f3203d28d6341d2bbf7c7a4a0fd18f901b6759601bcbb5e
-
Filesize
65KB
MD53cba71b6bc59c26518dc865241add80a
SHA17e9c609790b1de110328bbbcbb4cd09b7150e5bd
SHA256e10b73d6e13a5ae2624630f3d8535c5091ef403db6a00a2798f30874938ee996
SHA5123ef7e20e382d51d93c707be930e12781636433650d0a2c27e109ebebeba1f30ea3e7b09af985f87f67f6b9d2ac6a7a717435f94b9d1585a9eb093a83771b43f2
-
Filesize
37KB
MD59b9de2a29f028842ace0b871d5d07f9c
SHA11483f49447b8a72516a990a5c2a987d6bd71cb58
SHA25666eb56cad42640a65fbc56dfa0ba46c6c6e7254dcc8d2aa72c753f38baef7964
SHA512d85989a078e9e0d5e3ea32062b2f368ec2cc099696f9959442f905c4444ca1dbd956e0832ef5abf001352f462a2cfc0439f7431112d68ee1592f2952ab2a1f33
-
C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\pyasn1\codec\native\__init__.py
Filesize59B
MD50fc1b4d3e705f5c110975b1b90d43670
SHA114a9b683b19e8d7d9cb25262cdefcb72109b5569
SHA2561040e52584b5ef6107dfd19489d37ff056e435c598f4e555f1edf4015e7ca67d
SHA5128a147c06c8b0a960c9a3fa6da3b30a3b18d3612af9c663ee24c8d2066f45419a2ff4aa3a636606232eca12d7faef3da0cbbd3670a2d72a3281544e1c0b8edf81
-
Filesize
178B
MD5322bf8d4899fb978d3fac34de1e476bb
SHA1467808263e26b4349a1faf6177b007967fbc6693
SHA2564f67ff92af0ea38bf18ac308efd976f781d84e56f579c603ed1e8f0c69a17f8d
SHA512d7264690d653ac6ed4b3d35bb22b963afc53609a9d14187a4e0027528b618c224ed38e225330ceae2565731a4e694a6146b3214b3dcee75b053c8ae79f24a9dd
-
C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\validators-0.28.3.dist-info\WHEEL
Filesize92B
MD543136dde7dd276932f6197bb6d676ef4
SHA16b13c105452c519ea0b65ac1a975bd5e19c50122
SHA256189eedfe4581172c1b6a02b97a8f48a14c0b5baa3239e4ca990fbd8871553714
SHA512e7712ba7d36deb083ebcc3b641ad3e7d19fb071ee64ae3a35ad6a50ee882b20cd2e60ca1319199df12584fe311a6266ec74f96a3fb67e59f90c7b5909668aee1
-
C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\win32\lib\pywin32_bootstrap.py
Filesize1KB
MD55d28a84aa364bcd31fdb5c5213884ef7
SHA10874dca2ad64e2c957b0a8fd50588fb6652dd8ee
SHA256e298ddcfcb0232257fcaa330844845a4e7807c4e2b5bd938929ed1791cd9d192
SHA51224c1ad9ce1d7e7e3486e8111d8049ef1585cab17b97d29c7a4eb816f7bdf34406aa678f449f8c680b7f8f3f3c8bc164edac95ccb15da654ef9df86c5beb199a5
-
C:\Program Files\TacticalAgent\python\py3.11.9_amd64\Lib\site-packages\win32comext\internet\__init__.py
Filesize135B
MD5f45c606ffc55fd2f41f42012d917bce9
SHA1ca93419cc53fb4efef251483abe766da4b8e2dfd
SHA256f0bb50af1caea5b284bd463e5938229e7d22cc610b2d767ee1778e92a85849b4
SHA512ba7bebe62a6c2216e68e2d484c098662ba3d5217b39a3156b30e776d2bb3cf5d4f31dcdc48a2eb99bc5d80fffe388b212ec707b7d10b48df601430a07608fd46
-
Filesize
105KB
MD5c485a95e68d04b1bce4aa5b4f301d90a
SHA18e0903ca5f0e2982b12c8bb49d4dff94a147a95e
SHA25687d309b4470d3f2c21c686e6895fe95aeaee7a3b00948694d39bbe71ed86d169
SHA5123bcfa7fc4fab47f140a8f21b55c09bd593fb2ba3379edc7bb4c60167c46dc440170c7ed1d918c118d8d7e312b4e126086caf87361e87b2e661c8b0434ed81289
-
Filesize
82KB
MD5aa1083bde6d21cabfc630a18f51b1926
SHA1e40e61dba19301817a48fd66ceeaade79a934389
SHA25600b8ca9a338d2b47285c9e56d6d893db2a999b47216756f18439997fb80a56e3
SHA5122df0d07065170fee50e0cd6208b0cc7baa3a295813f4ad02bec5315aa2a14b7345da4cdf7cac893da2c7fc21b201062271f655a85ceb51940f0acb99bb6a1d4c
-
Filesize
155KB
MD5b86b9f292af12006187ebe6c606a377d
SHA1604224e12514c21ab6db4c285365b0996c7f2139
SHA256f5e01b516c2c23035f7703e23569dec26c5616c05a929b2580ae474a5c6722c5
SHA512d4e97f554d57048b488bf6515c35fddadeb9d101133ee27a449381ebe75ac3556930b05e218473eba5254f3c441436e12f3d0166fb1b1e3cd7b0946d5efab312
-
Filesize
77KB
MD5b77017baa2004833ef3847a3a3141280
SHA139666f74bd076015b376fc81250dff89dff4b0a6
SHA256a19e3c7c03ef1b5625790b1c9c42594909311ab6df540fbf43c6aa93300ab166
SHA5126b24d0e038c433b995bd05de7c8fe7dd7b0a11152937c189b8854c95780b0220a9435de0db7ac796a7de11a59c61d56b1aef9a8dbaba62d02325122ceb8b003d
-
Filesize
100KB
MD536c241133b4dbb462e256e1f71fd3978
SHA19d5e522e58db2aec26f97ffb9494e91e303d2215
SHA2565f7b89a612c9b8af1d6456cdfcd1dbe5ca630849e79aebced9bee9a6694952ec
SHA512d7778924806f6dcd4edb13aba4fcdd3344095c23cac77135aff0df7107b729e97552980c0a580f72c77be342a2878b3d835facba1b5c7af65e1b712e7a68410b
-
Filesize
65KB
MD57e07c63636a01df77cd31cfca9a5c745
SHA1593765bc1729fdca66dd45bbb6ea9fcd882f42a6
SHA256db84bc052cfb121fe4db36242ba5f1d2c031b600ef5d8d752cf25b7c02b6bac6
SHA5128c538625be972481c495c7271398993cfe188e2f0a71d38fb51eb18b62467205fe3944def156d0ff09a145670af375d2fc974c6b18313fa275ce6b420decc729
-
Filesize
79B
MD5100fde37fb5a1c52be24384742b2becd
SHA1eefc7f71c51429268602015b8e6544d1dd04be60
SHA256eaf714069da6bf371d13eda976ddf679e50aab42d7facbbb06e2bb3ab7388cbf
SHA5121699600413598da8767e17623af480abd12b899b2de7027a23ed0f7c86a485be0853336243d4352ef8c18d9bd489c601855b47c46c9346f2481125c8fc3fe780
-
Filesize
5.5MB
MD5387bb2c1e40bde1517f06b46313766be
SHA1601f83ef61c7699652dec17edd5a45d6c20786c4
SHA2560817a2a657a24c0d5fbb60df56960f42fc66b3039d522ec952dab83e2d869364
SHA512521cde6eaa5d4a2e0ef6bbfdea50b00750ae022c1c7bd66b20654c035552b49c9d2fac18ef503bbd136a7a307bdeb97f759d45c25228a0bf0c37739b6e897bad
-
Filesize
4.1MB
MD53b0bae146b23c080c12d499ca769bc65
SHA1b64c07c68b391080aaa537ebfa48bb2e7306a69c
SHA2567d0f59c930e7d3d9352399ea3c95c0272489b3c09a8e95faaedfa8a23e20e5b1
SHA51239a82f62b4805b24bb7e42e8c42839d3b31853654751a343781783390151b84e4638a4d2bb87f0e5f074a6c2503b0b3f6d1e754d47a06a7c1034105ff112e0ae
-
Filesize
29KB
MD5e4ab524f78a4cf31099b43b35d2faec3
SHA1a9702669ef49b3a043ca5550383826d075167291
SHA256bae0974390945520eb99ab32486c6a964691f8f4a028ac408d98fa8fb0db7d90
SHA5125fccfb3523c87ad5ab2cde4b9c104649c613388bc35b6561517ae573d3324f9191dd53c0f118b9808ba2907440cbc92aecfc77d0512ef81534e970118294cdee
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
9.2MB
MD5bb383b7c3d5e4acb1001ab099b5b0f3c
SHA1cb0c85f84a454aa4b1aab02bfba47c4355c2311e
SHA256a6d3159c858aa3704f35d69b27829618ad0d1bae894c848a5233100c17464f95
SHA512157dda96d1cacea55a6be27b9d432225b47d7334e664e577cef82a14c7eb1be1b8b84423b3905a4c1caecb5394be264d9b5c3e32109a4893e51a9d406ce740be
-
Filesize
911B
MD5b1e934460264e319d856264968778051
SHA190bc74bb5361b34d077425a54c04bd2bedb08816
SHA2561d5157c2b35e2c465d00b97ebd9602792c41ab2576033b46b55e9fe2433269db
SHA512d093ae16de94c8605f63ef585210c496771e550d09a126b2e1c92756586704f8b306e25fadaf43f69b70b7235f4414eca2371a0719d3aeb810eaaf46e6c2a57c
-
Filesize
167B
MD514c2bddac34109e4bf190c93e175ee84
SHA1d4c3bdc6b0c1568553e2189f3aeac5b0851673af
SHA2568eb837aa261848788cbdd8ef39bbb68b2d0ba22cf9a62f9a52c5180c6d6c83a6
SHA51275e63a70f4d85956c47e0f2af968e7eff076de13cc780d1df50946e516bb3b21f1c55e6049515f673c690d8bfa23090b9cfcdeeff2f17578e486fef64b680530
-
Filesize
37B
MD529b672000c75e84cd3985d3d2f89e26d
SHA17c7ac7747dcd4a96a9faa5ae67fdd4d8b524ba8f
SHA256aa93ae6cfcc842f1f00f2a18538f5702a4c709e6ff183cf72437489dd19ca99b
SHA51202501cded7f45da19d282f7ad9562208849ad5f56b60e234c2e60c932951ceb21f30f1b0668ddad1348122a85d823b9b175f587208b4fb6ba68fcc25e2b90fe4
-
Filesize
35KB
MD5e9fb33c49bee675e226d1afeef2740d9
SHA1ded4e30152638c4e53db4c3c62a76fe0b69e60ab
SHA25644e045ed5350758616d664c5af631e7f2cd10165f5bf2bd82cbf3a0bb8f63462
SHA5122661a981d48d58c9ceb1992e55061ce07af0d53b5f38b07de620376e0ea1d876c7e50965e67aee80fe723968bdb956dc7fd93e7923608534c8fb4d21739dbc48
-
Filesize
1KB
MD5765419c7c4016b7abfe7e214a4fac90d
SHA1347439e58bf38bf0bf32f1de93e51d209344641f
SHA256ffe10c724b7bacf68c161f830d5f698ec51c9cf6d5a0805481eb440583001b6e
SHA512daefd8a58e29ebd0b4eb9566ec16cf0c4de10e1ad01348a4c0ed8bf47b07115cbd98ee70aada2637ac26b522497d8434a3f471bb7baf48c52bb9e72f3e2afc80
-
Filesize
4.3MB
MD52f046950e65922336cd83bf0dbc9de33
SHA1ddc64a8b21c8146c93c0b19c1eeb0ef784b980c6
SHA256412e1f600251b21911c582e69381f677e663231f5e1d10786d88a026e00ea811
SHA512a11cbf8b8b692d2d5a0e3af5a97f91a3d1f3e7aa39966eb7d62b3244b3913f2fdc21823d5c94de0d98e579f801709df44433af91567356361d5d9699a93b2cbc
-
Filesize
11.1MB
MD581bb68ad26a6e56d94589a286cf39028
SHA177b4988bf328666fd214f1e7651e2e58a7c677fa
SHA256523069aff82f8eafc993b3f901afe8865f835026efda1a75afeac50eb2f4041a
SHA5129e3f168ac16c130f028cbda1ac3ec62d607f872080f2dff260ae853854538b9e7eaab3bf4077df9b2674a172fa1f239ca1c019a1442054041ea17c867930a74f
-
Filesize
8KB
MD5a3f016f5f2bd742ff1591950260f6f75
SHA17feabbcc2e2d51c09065071f58da23990e215b72
SHA2566621f97fca4589b04e4c9a835344371fc3ecdf1f4cdac5c1492c05fcc23629f3
SHA512ad6a96131221f3e8ac1e5bfc094ae1c09344a65f84b73d6933650e26417a569275e049b564b4c954641c7906a5fbbc886e37fa4a4bfb8216ccf3b519d09c7250
-
Filesize
809B
MD58b6737800745d3b99886d013b3392ac3
SHA1bb94da3f294922d9e8d31879f2d145586a182e19
SHA25686f10504ca147d13a157944f926141fe164a89fa8a71847458bda7102abb6594
SHA512654dda9b645b4900ac6e5bb226494921194dab7de71d75806f645d9b94ed820055914073ef9a5407e468089c0b2ee4d021f03c2ea61e73889b553895e79713df
-
Filesize
21KB
MD58feb9f84cfd079bf675f4c448eb62c27
SHA1f0a7c0eb89c94a81d72efaa0d4e72a2acf9a15a2
SHA2564af7d8dcdba7335f96d4d7f9b7ab75b29a890380d8c7c35c59f60739db8a604e
SHA51234346669024dcc273338913794103d16b723fbfe7d3fbd6eb89d3561b4e7134906fdaeeabcdaee653f452a9917ed48ed79fbf56e507f9e41e4adb7b4f32f48da
-
Filesize
15KB
MD5c1e5f78407a38c0f2bef0839274a30d5
SHA12e5d91ff054720b94e7795474e23fbe202635165
SHA256d47a44752fd6a983f9ab0e48aa8b12a2b0bc772ea0bb380c64723bb8e0b2ccbb
SHA51281c22988af2065e94e4420e1b71d1bd2c12406a74f0984c7183a4905d4cc397a71728a9b0dc41ea625bb12e231fb002e3c965f92f60bcc12e5b0be81b26e056a
-
Filesize
25KB
MD532fdfad78eecf1a6936525069d0eda09
SHA1bf1f751146e73887de2c54a183d70a005a7453ab
SHA2560e34c0c610bad2bca1c36e24908003886e6e8d506a7ce5cfee85c921faea61e9
SHA512e9b9645391589365969e990967b5133de10090c212d000638c1553d98fdf7d0e6f99d9284d6f9f7385a7ffc2d37038bb430ce79bf3a44fa652ae745907833665
-
Filesize
15KB
MD57686ed92bc6bc3606d914ac3d6555d73
SHA16db9151efb0c2d693ac2acb8099967a7c32fe47b
SHA25683eb927efcd495e15fd4ff5d043e1f0cf4b2dceded9aeb5a4af3db0cde2bfd8b
SHA512df7c252898fcf6829632b3d576b72c2a3232b24741fcb1ee50ebe7d7bafe86e0cceeb75f08b22ae177e57c6758572842b341c7d933f229d9d2c99388488b120d
-
Filesize
16KB
MD51235a3a21c64fe5563c06f65543d7d77
SHA1204bcd4af12c7de4c83b2d2cdb22955e6c2eacf2
SHA25618f1e1dc7ea4c3daae3fc51fd1373330c0132270180ed93bcac7a1d2843353f5
SHA512b51476e608368120458d276b662a860cb863cc64f41556099c1bbd5c901b3a300b8d4266f44003b14a9d3d25a0832db7afe2c025858ff9d3c194acdabe0ef237
-
Filesize
25KB
MD537ce9d39ab4ab1d9e9d9373173152e1c
SHA1a0e06df561391156ac3623f56afa824173a6e34f
SHA256bb77491d99fa16f09048e81a2cedc29f3e6397d0d166ba2f72317aca04347c25
SHA5129f9b21df7bca9c15fac1582900932f77d6fbd1e80ec751d88141a6479d78ee2622df1b96bf1606c0df3c3cb0a7f553b5a8567c30590cbb1260dc8614dda8de49
-
Filesize
31KB
MD55c544f7d387ca56993a00e0a132a2e93
SHA18214c283a1cda735803e8e2b76db9715932b150a
SHA2565a763e6f6895fb36c99c942c56b2e5860e316978ce61ffb6d5a4599b357eae4e
SHA5122577d38f631b8061bbc9b73ad0a33b47dc97929ba463141c6c9216cdf1219a278b30ea8420c399d72a440065954a0a54f01546dc17f34fce0151f35de87caa3e
-
Filesize
22KB
MD5be4288d0cf3bf6203139f32b258a2d2a
SHA15deeb81fd84ee5038e08e546e7ee233dde64c0fd
SHA256a0d1fcec293a9d8b1340bbf54194884ef1c7495c3cbe9d4d5673edf2e5ccfb43
SHA51286090ee2fd2a77f8b38e3385af0189a657583e1ebdce2cf8ebd096714ae2081f9c62306cbc5712cd15475309d8c1ebc340842936afbff4bfee1c148f8626d47b
-
Filesize
16KB
MD596ce9de89c3e9d3afa2107ae3d30630a
SHA10856953bf3b426be54f6759ab1ec9be6a35c631b
SHA25630f831b5189132d642edfd7cc9e4f44b11ae357652e1748073d94206544d4b77
SHA5124ec2bd382fb306aac0da8009e9e05e4e5b6b0ef248718415c1e255935d70a4d9211d98adb2992174660f07eb0239c8ac2491734d6c6d1e957b72ea568df6e012
-
Filesize
21KB
MD5847e9548a2e02e2e4d73f7fa08467e67
SHA1022e03be3a51aad9b3c0ef950c3eff14d09343e1
SHA256d537580623ca8088692ad463e8913a83edb50963bd4b3b2b7b579e4e2b3b71f9
SHA5124c6ddbe465adc27bc97cb684a43b6baab59bbf21b8d8a2bc73d6ae618a6dff4816f139a246558e0b8c49fe7d2d5068f16f19cc132f21d7076d833764aa24f86c
-
Filesize
17KB
MD58e6fa8b04f177d447f161517548f4d47
SHA1b39f9c37d1db563aa25298b60bcd5129bc6614c4
SHA25610ef1bd8a810ee08f601a207ac83a4c7d9ebad1a4777378cf3749e3c56b98c48
SHA51244137b572237b5b1fea00039d5cfe10f182f20595740e185f40026c87b07d3c05e1eb1fae82f4919c6795a0acdb79dbc9d28ba78d8f16e6dc32a42aeb5b74331
-
Filesize
15KB
MD54346017feb0a9b795191efd686b789c3
SHA1b58d82c54a00fa402199b5efec3bae97c40c0d15
SHA2563f0c1c8c91696c6ae9c0e41589319d200d2c4bd16cabf4e2f1a11fc947a72f91
SHA512680172309ba9da0ed0786c7b1bd967f6a3d09e9989d14d85c6566250c83dc2d997d48f6fccf2faccca6548a56ddf39f2d577806f5325e558670442c26607a22f
-
Filesize
19KB
MD55d9a27ae842c05255f5a6e7f2465ffe3
SHA159066ff2d8da1a2f552cf61c484400affab5aa2b
SHA256573fd644bee61bf85053989c7111be4a33223ce9bfd0ae5f95e05382fa08a1f5
SHA512b0cb5641bca08c03cbc9e57aa12a06f255f1888b76d32b821561b9217d1d293b6c2d5188acf483bcaebe3c83afeead2aa308b3741fb8a171cc23b8fd472ff5b1
-
Filesize
15KB
MD54aacdca3061553326f51b0938232d897
SHA16df122a2c6d7d5954915a871494a5333601e5f9c
SHA25673d85aa2297033f106a0c8c3138efb9ad36f97ed108e040f12348fae94c56f74
SHA512c74b505b20da653ef68615df221508b76937cdb7956f54c6a07d314283e3fa8b03ee1e14d0d49c0fd6b99c2d8e126678f97645c7ab4f340cd58f1566b4e42eca
-
Filesize
28KB
MD5101b16272234051204428a4e53b99113
SHA1f1a08992c63f405838838c26d309a1f918ba312c
SHA2562dc9ae2d1de175e6b867ff89f84ba25d08dd5f41b84e2818318ca23f3eb5797e
SHA512bde4deb19594733afd878d8e804787197ab894a3d6c60eda32f393a0445e59eac60240028d20b189566efa34b408b784e01967cd83811f77ac82a9ea6d75d9c0
-
Filesize
23KB
MD522a06bb57eeae0b3c1d63f0b23c83541
SHA1a2dda0d44ff38b0b248cde072c95707b183c40ef
SHA256db062d9d09d7dae751e626bf97138eae6e9350112e2738cb3be9ef78dbdace1a
SHA512c243228df368d3bec03bbaba9a91c7c966d089d982937ee18c53a2a6fc217b08c029d5b62871b55fd84859a30d60037f013c26966237d1c2b14b6d81e650488c
-
Filesize
20KB
MD55540d1bea1c41384c0a44be773820695
SHA1adbb11f9371154d5bb440fc522ea68c3730d684a
SHA2561d15d738c319132c792ac6f8820f50ccb0fc32597e9c886746bcc31fcce2c683
SHA5121e870c37493f2ec59468b27320e249422912ddfae8c8a60338e6754e16d809c7572694ca369e0a7e67c6d3607b4262e2455f66ac855b451f6bbbb0e772119e4e
-
Filesize
20KB
MD578e046bd9c5524eae4c290c5f1d8d090
SHA10200b5c106effb26fab84e8b432725f626cea9ca
SHA256767fd247f1f93cac6188ba1a0c3398b87cf3178e25ded4a16ced7e9bb3cd27f6
SHA512073ce96951bc1a95d31eaf4a6d6ed7ab7e876847d88b6ce38b31cdb0fb28a6fe093999010c9a19fdba6acd87c1a6e1ebf6085448122ebe6a97b9015cd904715f
-
Filesize
18KB
MD5b7412f3a46a112d74783b105c5cb0638
SHA1408a73cdf57ced4256526e5c699699a2fa089086
SHA256223f17f84d214c9fa9478817eff65a2681d505dfbfb6b81a2121e446e9614000
SHA512afa565f67cbd19789825f378c1fa7d468b6b3018ba574be2a225774e26a31c35dcee18eefbbfb163e1687420084a52667642c38b68fe0695b3294fd480386f62
-
Filesize
18KB
MD5cfbc57e6f8b07ab19d0a2658cf790306
SHA14f90b9c43645e2370040f40e88ccd48628a7012f
SHA2561e2fb44e0be817b5e16a03a30502c65f61dddc551bd3923ea571e3f83980e049
SHA512f4af36cff89378e138ccbcb58ccb0204bbb059097dc5a566368c3dea7f7a1fac9a4a174a9e84b221bb83df0d5b3ef7c04160f9f63106cff8db859321c803b3e8
-
Filesize
17KB
MD5564e96072345c9f3f4e96e32d95108ec
SHA14f83114c167c77253870f837b83db806ffbcccdf
SHA256a8e90f1f01264ac52e7523394777616d06a53daaeb16868f3e8a06426fc0e586
SHA51280d0264ab8d51347040296c758d6fe0282442edde39d20115ff632770eebe71421661cd23c3a8d200197109f2507e5e72197209417c5d10beef182004a57ac49
-
Filesize
28KB
MD55e189d783f6f603161b85c157ac6c0d4
SHA14303565e26f06b5ff9f6cbcc889ac5ababb8d930
SHA25609e1973a0286c5912c7f233fce89b2efd9347efdd085869437d9fcbe69a5c5d7
SHA5122fced12cafea173c86c3f47a7be856b9d4971092881056c0150762e885277adedb1233352d376fb3690951079f5d6a2d1a8643531dedc1006a678c0d7c145f94
-
Filesize
30KB
MD55e6faf3925a572faab69a45cb05e8352
SHA1bab071428238635e6290fa2741bd63cc803d73d5
SHA25616b5df14198360715d06a5f12f2b1976d38e729bbe37748e0cbb17f57c4f367e
SHA512453f3b6a672a521fadbf7966cd84efd011fa6b9186a08234c3ded39e43e898ab0a48229bb46661710c16dafbfd889ab4c45fb34bc0fa01d4a30122a8ace7f478
-
Filesize
16KB
MD5e26dfd45f80e72a07d8cce6ce2692b28
SHA17b97a013651daa86133cda74101d643e96fdc1a8
SHA256dba9b9e9329fa5d918b1e941dbfed9363a616033cdfcad4a0c60af9c41c4c4ac
SHA512d7ba6a76b53df979f923fd819679e2a15cdc4a55618a26cfdda8f8455469fcc319bc502cdb77d602ced1d498386626d891c30326de96538be240069e9dd54aaf
-
Filesize
23KB
MD55e5319e30be55a660e75a5bb04219ad5
SHA18d7457acddf8257c6c9651e3480bf4ee72699361
SHA256aeee93f35724d656a73d1572522fe9b985fa1cae6978b0405398ef9327a1580d
SHA51280534b6a71b8d0a216ddd13556046c86275df088208861c6f5ab0c88301a785ae2eb685266892381d47d2b3ecec25accd476377be146c8e51cced57a0aa10d63
-
Filesize
22KB
MD565469f9f27a5dbdef060a0560aa0db7c
SHA1fe49184d2db322a919513c9667625efa9009a632
SHA2563410aeb9bc5106b29f2c4cbc74c9febdc229c569153ddb1e41188a7396079a3b
SHA5128b6ba9ece1f8f53f0e5710dbb7330bf2dcdc8e8f844627bdf54670fea9040bc3239b1673291f1682a5bb404cf9d11e9a1732a1c5484bfb05b0f77db6af3138b5
-
Filesize
22KB
MD5e0e54825bf32d160b62c691d2f314611
SHA16e89de9aec3f94c6e046fbb04be28e33a8fc8732
SHA2564e982ce84c225c6870cc78120e5f85fb622756feff4c7e8eb7088473a2538620
SHA5126f6d018cd2ab86553746027953439c8c7f1251e5a4bc7b8514d8416babee69d8ee8c7c7698b4f1bce4f2fa815a35ebcbf5bd81580b629e5b2bb20481e9020166
-
Filesize
23KB
MD57cb49e4054a7cc234f428faee99d0ace
SHA186acfd18a8a274fb4bd0d745a23b501016851b6e
SHA256ddbdd5abde46f4aa7d5bd472f3d2b1182835a6739c9194aac70749c4bc1fba4b
SHA51286e27a5a58736ed0c0c2fbb11d7c744fc437a195f768ea223817eca6b4225b541e6ed554a2d9e27626fda793603d1a41e6ff52d39af060c4ca1eea557a52789b
-
Filesize
16KB
MD505ee41715ae0ccd260cb385c3727d607
SHA1afdbd2d4a0fd050d20af8e107b2dadddc45ac49f
SHA256dad0ef31eb232c6c189e0ad947e62e71c5239bf2dad8f9d72a06cf3544a427a4
SHA5121314234805a0b1048e97a5644c4084254258d9a525fd3175a893c4b0aa37dd682e13bcf21e13355593b4ade7e823d190ca695b4edba04f3e5136d65fbe856dd4
-
Filesize
15KB
MD5a917ff0cdf22fe0543dc06713d9cb160
SHA1efad7626fdf18230a8f9a2e6e0e9df7639d3b600
SHA256fffb05319b00efb87d2705760ef351c11ad2b1913469635b980d386310bf0e1f
SHA512505aa2b2559511bbae8124ca4898e003e6b494a3e4db7b13231d1007f23829c595dd1cf953e50bc67e32ea4a967bcd51971625be9ffc8757f57f75f6e106c6ba
-
Filesize
31KB
MD51de230e139174065c73a46f5917f27b5
SHA180e19d04dd84da6904b696e4a1caa93953eeda86
SHA256694c4daed9add47d4ece4bd07568aa57dbc1f3316426f78ce5fd1ef2f2ce2625
SHA51293549f700b93115939075a9bbdafacbd2500d8c4c02a3e0312bb0823b09850a8575e2ad8d8b6c4dbf62838e2f383bc94321965b45af73b552797100306d6d2f3
-
Filesize
16KB
MD5bce016992a8576f7a481c6d2962e0879
SHA14a7a84db35e3a2d43d7aa0980c0342dd164a16e7
SHA256599ea45533dc1ab68a9646c6a88b71f4fc11a8669fa3ee8f41360435ca8816dc
SHA5124dc541851496a407a26674bb302bc3b624fb9d6e581f1ee61dc34daa0d031648f02b5c2fcc7a0002ff96becfa75264635933a503f570ee425d418a22ebd50a8e
-
Filesize
17KB
MD556afaba9f733028dc1d8e03e21be15dc
SHA1fd16728498a14961a97ee1a80b9ffa3f3bc3b6d4
SHA256f706530f0cdabb2f02c9d5b70d7de77d1f02fc4f6730c815ff8410dcf208b9fc
SHA51254090832d0d6cb1439986190da356c7cd5caffa052118185a6336c0d73f87b937dc5548603f843ab2e5302103ced01a2a9b1f409c4057db5e1aea4a5c7c4dcf7
-
Filesize
16KB
MD5f3d779698e09e13fbd55f0a5c6914616
SHA144eef7c9b8563cb5d7489abbe6f5158484aefb64
SHA256c20b736bce859734c4497c6d5aaec13bfa3c201461cc02f48a7539fea54be59e
SHA512ab266effc4e26d5b04a3a5693e57f979c780a6d7590bc27090225cb44a831fb7a2396540323a70f6456cd7806e00e9738dba866b0bafdfb0226a962e38aca0f0
-
Filesize
20KB
MD5bbd9b99d0ab44f6e4a9fb80d6f3a7afa
SHA1f3a980d5493597144fdbbaad86f5207c2e39e08b
SHA25607ced451a144a7f6e3fd24d19bfcb2e2a5ea49a969a036754cb833dc2d2986cb
SHA51206ba6cba2290e4bb6ff3adb09961a260ce811f25a97a2cef0cac7b25e94fc3bfa177fda21b69f9f6ad62901578f16d9716eefe60dfd76cdc925eadc7a730d14b
-
Filesize
15KB
MD57fdc886cd1db91065a017a76c9096aed
SHA16029f809be8ab12cbe0f25552b25fcfc757dfdd8
SHA256117e7bbfd11da2f5bd00f66aa004837dd774485e96334fb42b8ac537f4fb012b
SHA512d5eaa0cdcc09a0673320a1be26e628e067182ae93b9aded6cf275faf68fba7bd6002e1d446bc9b8e9377221de4611058ba32fdc6b4fcb2e53795c3e202c828b5
-
Filesize
1KB
MD59ec64a1e1a58440a6a35d85b107583a8
SHA12d4e1ff1dd277aa9a7ce674a135b5d42ecf87c5d
SHA25697ebd6669d5303ad1f9cd16fed33de815f97a83df579df3ae85b44dbfbeb6c10
SHA512f5078fc12ac289bd83658cc286ef89fb516ef12751f132c6dc6187dd6a47e5b1b209b26702c140483d8503e03c4b202f8598c647b9ee6fefcc6f75ac0deb96c7
-
Filesize
4KB
MD57b9d464874a4d515b27df39a94367378
SHA1d44cb0423be6c01b30f3092311e30124aceb30a4
SHA256ff63aa182b796da81b944dd66cb8017a0d33943ea4b2a176fa6cf21664426f8c
SHA512019066b8de505b0cd50d3984b6c753c418590f5a8b2e42f4d53b24c18ed04dbc9582d7b9c54112c2cc2aa73f4bd5c1d928556f770813764a748dbd8bbcdb68be
-
Filesize
3.0MB
MD5a639312111d278fee4f70299c134d620
SHA16144ca6e18a5444cdb9b633a6efee67aff931115
SHA2564b0be5167a31a77e28e3f0a7c83c9d289845075b51e70691236603b1083649df
SHA512f47f01d072ff9ed42f5b36600ddfc344a6a4b967c1b671ffc0e76531e360bfd55a1a9950305ad33f7460f3f5dd8953e317b108cd434f2db02987fa018d57437c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5.2MB
MD5fb8a8797df8557e9457f51e6afa50719
SHA16197a100c32a899e08255f9ea81d5576aeb0109a
SHA2562506845399044f126f9503fa74b71c42fdb2efa4b2b88d141f8f7f828f787ade
SHA5128230ce6a4a88aa51e3346c52970fd19960f653ee69e1fa679869c32b14990b0c585876b3bce5cfe5cfdf7afd4db15eee5e38f67f2151d79fc1d4c1a8c13cc94b
-
Filesize
54KB
MD5f83cad2fd60c8481cc758247cd3cdba7
SHA151ceb9559258dd0fa7472d4398858f79ef92377c
SHA256869c97ce5da39cd5a8e022ff8d699ae0d0475da92a86785ac272ea56d11e7dbe
SHA51241d46143f4ddbf68e0331b9eb1ffefd9efac6fb32fdc216eedda47da441313fe8f4f36b5667701f4d4dc3222c7f3b921f7a3aa9dc09d22a3893d9465ee0123df
-
Filesize
670B
MD5b4ecfc2ff4822ce40435ada0a02d4ec5
SHA18aaf3f290d08011ade263f8a3ab4fe08ecde2b64
SHA256a42ac97c0186e34bdc5f5a7d87d00a424754592f0ec80b522a872d630c1e870a
SHA512eafac709be29d5730cb4ecd16e1c9c281f399492c183d05cc5093d3853cda7570e6b9385fbc80a40ff960b5a53dae6ae1f01fc218e60234f7adced6dccbd6a43
-
Filesize
2KB
MD51b3ed984f60915f976b02be949e212cb
SHA130bccfed65aef852a8f8563387eb14b740fd0aa3
SHA256d715d6071e5cdd6447d46ed8e903b9b3ad5952acc7394ee17593d87a546c17fc
SHA5123ec5b3b09ef73992eabc118b07c457eb2ca43ce733147fd2e14cccde138f220aee8cb3d525c832a20611edb332710b32a2fc151f3075e2020d8fd1606007c000
-
Filesize
31KB
MD5d5d5c05fc33a0e124ec803e0349c6b7a
SHA1ba776d42dafb8096c8171fd4d3abf292ad68c94f
SHA2568e85eb27ec529f30af635884d6ed605a64c5f261b761d43acabd3fbc88e00120
SHA5129b8b53238538e35a965822098abe76cd25bab28a755de3a28eea2228f107a620128ccfba89e9910914a7d902b7a165dafa4baf48927d2036e7563176685ed3cb
-
C:\Windows\Temp\chocolatey\chocoInstall\tools\chocolateyInstall\helpers\Chocolatey.PowerShell.dll-help.xml
Filesize58KB
MD54aea8ae4fce73819e9ed3f0d1ddcce15
SHA19929df74840ed8bba92cc143856e6bade4e74706
SHA256dae3916c3cbab1e4fc6ec9afb052d878dfb6df4430b1cd7db2fee836f9fc0dae
SHA5125dda75da0f69a45203144ab596a3234dc0db4b713d7460aef2ff0ffa541bf0aa6a2f0fee2028755a5662d5d9c76e5101e3a181a540340cc3028498aaf93442c2
-
Filesize
30KB
MD5e9560a5db604a37892506434cad8da5a
SHA1764dc0254f2fb547ae0700056d0f21edbd26cdd5
SHA25658528e116d09a434872a38eb3b9dd125216fa29a493b795f49cb49a4c8bf2e0a
SHA512ab839d9f681c45ae5dac4274de0981f7a90e33e47a6b0b1925aac9f49bae022e88283dc65e7a7de6b3a02edc28ec0cfeb63ecc8dcab2e7dfd8950f49ab695631
-
Filesize
15KB
MD50637a9e7b868959a070b0cf2693178c1
SHA1271a52fa8d36e93e9f36ff8b454243ea106a680e
SHA256ed69cde7544efe46ecbc66b10edc55140e49cd2fa17f5ccf0e214d769e3cad2b
SHA5127c8067f7fc9e09ca36cd098c10fb52dc3b33be053d70c1666f418307adab85e4226ceaf15b893a7f9d37c832ed55bf0ae586390d676dba873ed2ec0b900d1bbe
-
Filesize
17KB
MD50870ae75b1d8f0823ad8bb05bbdc90df
SHA19f6a23ac198321235d3d0b1ef1547863fe7c680d
SHA256859cfa5d9dc747a5bc5651331977beef2177cf8335a24a8f0a26d7965fd66944
SHA5123bae1a9c7a7610ec86c5187de2ccffd295bd0d054a86000fe76a5d375842b98806a6d4f227dda5b0ab289b6365d664a2c3e55891add3e5cdc22efb75a410894e
-
Filesize
4KB
MD5cc04b34e013e08cc6f4e0c66969c5295
SHA1a33f1cb08b56828e3b742ee13cf789442dd5c12f
SHA2568b6b1d8f6bfab3dc9fbee30d6b2f3093ea3eccd5c66e57161dbe1b8f703fa74c
SHA512b485af21fcbb699d783e64e035595be7a117a1d6af62166c6d50ebd59ed8953141444f17f3bd07a865c9dd11aa7c75d5a4f2bdfb8b739a1668d055779f0d0c10
-
Filesize
143KB
MD53ba75f6c247e087f6a62abd0eed1e1fb
SHA109bac37ae2c6089675669351401a0e24ef0c29c7
SHA2560a8346b38cf7b727976fb29470106469004ff59cc7258d4f885803c70f992d75
SHA5120fe690063dd13ebe6455fa298f933acdf2a12421a6b4ca6798255240c14018c705a68673a193d3f6cf7a03ab08c973284df9760416a13cd9a469197ff9dbe22f
-
Filesize
2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d
-
Filesize
1.2MB
MD5a1a9b229e66a8a6a66588f170029a9e7
SHA1eb4f3e3cd35a55e8f064512802e72b06d5ebc7d9
SHA25607f88bae90a4c49e200981445d78683c5ef21ef71bb6927fa7cfd59bca431e80
SHA512c647dba0743a177c4efe01cf321d66669c89fbc5d8f448c33199e6506244da8b69a512c7319c6fe33efd2d43544171b612e7b094ab7e68def7004faa972580fb
-
Filesize
513B
MD58f89387331c12b55eaa26e5188d9e2ff
SHA1537fdd4f1018ce8d08a3d151ad07b55d96e94dd2
SHA2566b7368ce5e38f6e0ee03ca0a9d1a2322cc0afc07e8de9dcc94e156853eae5033
SHA51204c10ae52f85d3a27d4b05b3d1427ddc2afaccfe94ed228f8f6ae4447fd2465d102f2dd95caf1b617f8c76cb4243716469d1da3dac3292854acd4a63ce0fd239
-
Filesize
339KB
MD596b85d45cfe551f87e5f141ee18bf82e
SHA13b21a8ec46a782bf407174fe6f328ec4649fb779
SHA2568b9f09e2bcaac9166a0f87525864f29c868f2cb8b779ca6d3d63b93b388d5c89
SHA51224e9de5502929d9104411e7f465327998a8b997de46670db6a8f009755576b93d93e90f6bc08fd7406c9e37859e24b54227dac610ddddde152073aca0e5924ca
-
Filesize
3KB
MD5f4995e1bc415b0d91044673cd10a0379
SHA1f2eec05948e9cf7d1b00515a69c6f63bf69e9cca
SHA256f037e7689f86a12a3f5f836dc73004547c089e4a2017687e5e0b803a19e3888b
SHA512e7bb1bacab6925978416e3da2acb32543b16b4f0f2289cc896194598ee9ade5c62aa746c51cf6bf4568e77e96c0a1014e4ddb968f18f95178ee8dfb1e5a72b96
-
Filesize
38KB
MD5d97ae723b3d204ab53aec2d7eba7fd83
SHA1820f87e99a3fd7d57325e3607c557daad23db055
SHA2563b87ec9eb4e055fdb23ef606585fc26c651e4379782cbe507e11e3b5f477a32c
SHA5120414153c9320eb9da95c887e9033b778305cc2947269c8a3450163c11d086e8ff0fa2dfa8b8d7aae5187cbb63c96e7b296445fbe050a24c08737b5ebc0121d67
-
Filesize
150B
MD5e9ad5dd7b32c44f8a241de0e883d7733
SHA1034c69b120c514ad9ed83c7bad32624560e4b464
SHA2569b250c32cbec90d2a61cb90055ac825d7a5f9a5923209cfd0625fca09a908d0a
SHA512bf5a6c477dc5dfeb85ca82d2aed72bd72ed990bedcaf477af0e8cad9cdf3cfbebddc19fa69a054a65bc1ae55aaf8819abcd9624a18a03310a20c80c116c99cc4
-
Filesize
95B
MD5a10b78183254da1214dd51a5ace74bc0
SHA15c9206f667d319e54de8c9743a211d0e202f5311
SHA25629472b6be2f4e7134f09cc2fadf088cb87089853b383ca4af29c19cc8dfc1a62
SHA512cae9f800da290386de37bb779909561b4ea4cc5042809e85236d029d9125b3a30f6981bc6b3c80b998f727c48eb322a8ad7f3b5fb36ea3f8c8dd717d4e8be55e
-
Filesize
555KB
MD5189a2921a8f10ae9fd38c0cf187327ed
SHA1dec460a7fa6650ec2a36905f7ed52221bfbe930c
SHA25683fecbc76fdfe6a72bf23e7b9d14dcad8cffa92b019da5dececcc6a128db05c9
SHA512ee01ec4c53a4add48e46fc3ad29b255653233d97a148769a997110cb8dfe21ddc5cf86eb1b950494911f21293b4b458b9acb705a59bd273046b6a10b862942be
-
Filesize
3KB
MD589ac7c94d1013f7b3e32215a3db41731
SHA11511376e8a74a28d15bb62a75713754e650c8a8d
SHA256d4d2ef2c520ec3e4ecff52c867ebd28e357900e0328bb4173cb46996ded353f4
SHA5129ba2b0029e84de81ffef19b4b17a6d29ee652049bb3152372f504a06121a944ac1a2b1b57c6b0447979d5de9a931186fef9bd0667d5358d3c9cb29b817533792
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize3KB
MD506d16fea6ab505097d16fcaa32949d47
SHA10c1c719831fa41cd102d0d72d61c0f46ec5b8de8
SHA25654e15de2bef9f651d7717e2a336ac6b2ea2b723e6f29d2b153d8fbbc89aef723
SHA51203c00f1eebb51cec11703141ae9d9c3ac589f5495bc04d8a4b043714089a9d50bd3a520e4d72b4a4c99f5b9bf5f689bf2585fa5c7d4ddbe6f71cbba0172f593a
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize2KB
MD522f94baf8752ab5d8c015b7b1d9fe6c1
SHA1bc6a463b7ffd4b029caa536892ca2eee11b3523d
SHA256c04e41dbc9ec1d0ca938447a8d7d21000cf851678968bc558ee389f4001e8374
SHA51258b45235463bddd590149b04587ac115291e9228939022609a41ec4e369ac167fde06a31d4ef7fab64256ba060d48e32bf663910cd574b2f23d9c840c9db6f03
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize2KB
MD5752fff5a0782679e06e5c3d717a19ea8
SHA1d5fb31992314c5391328332676330f1bf268f3b2
SHA256866b1aff8ffc64d98752d46ca29b09c048b17522413c6d5379722023419d842f
SHA512b2a092303cc918bf0376d0589a80c844636e15645d0987cb41acf859bf02fdc982fbe99031711a1be9d9972270cc2a145734856fdcc86697d9fb1a66825e4806
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize2KB
MD52c0bdf06d302688498d4e7f9cd669ab5
SHA118186323d93499e03f737f137b4ad795eb7f470b
SHA25686cd6b95819282eee4bd6c900b27ebeddf453a90a9f6147978e9137479f36bd6
SHA512f8f02ab1cb6906975695369183d00d7f25ec4c54c40aba5ac0a1f42312c5eff5a6774a8e84c3357415555405f7e9754deebe8335dd1fdcf693137ab044cc18fe
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5f4f46c6458364e6488acd28d4e3cd67d
SHA12bb1ff9d3b3c32acad56e5363f2f6846d55060f5
SHA256bed6ff5f3ce21cf189f11517ed61ee60dac2fc8fc027a5bdd2f834b087542ba0
SHA5125902d1e995594b18a467fb14726dc9dbd470cd6eb65c01f59cdcb4f21edeb5ba01d8fe91a387263de76dc05405c769d9cd402d8ce9a85c9895855936e010f93b
-
C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\1CF0AAA87C24E23DF0A3E9EA994431F6FA9B9050
Filesize1KB
MD5aa320033333ec803ac36e909ac9f4e46
SHA1766407de0fa51fa6f95aa48219af62caa1459375
SHA2563e6b034891a6f42090b23be6f6a53a120e7056709ea04a25c0a0722a81a8c678
SHA51238d36432525cb706d8f638faf6ab37565098dc90cfd3a0c692649d645bf2e32d193381488c82ef8529ba0da71435c4dcd0ef8371caf6aad623b400224fa3e498