{"id":19132,"date":"2022-05-28T19:03:09","date_gmt":"2022-05-29T03:03:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/05\/28\/news-12865\/"},"modified":"2022-05-28T19:03:09","modified_gmt":"2022-05-29T03:03:09","slug":"news-12865","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/05\/28\/news-12865\/","title":{"rendered":"Phishing Campaign Delivering Three Fileless Malware: AveMariaRAT \/ BitRAT \/ PandoraHVNC \u2013 Part II"},"content":{"rendered":"<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12\">\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\"><\/div>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p><span style=\"\">Fortinet\u2019s FortiGuard Labs captured a phishing campaign that delivers three fileless malware onto a victim\u2019s device. Once executed, they are able to control and steal sensitive information from that device to perform other actions according to the control commands from their server.<\/span><\/p>\n<p>In <a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/phishing-campaign-delivering-fileless-malware\">Part I of this analysis<\/a>, I introduced how these three fileless malware are delivered to the victim\u2019s device via a phishing campaign, and what mechanism it uses to load, deploy, and execute these fileless malware in the target process.<\/p>\n<p>In Part II, I will focus on the three malware payloads and elaborate on how they steal sensitive information from the victim\u2019s device, how they submit data to their C2 server, details about the control commands, as well as what they can perform with those control commands. <\/p>\n<p style=\"margin-left: 40.0px;\"><b>Affected platforms:<\/b> Microsoft Windows<br \/> <b>Impacted parties:<\/b> Microsoft Windows Users<br \/> <b>Impact:<\/b> Controls victim\u2019s device and collects sensitive information<br \/> <b>Severity level:<\/b> Critical <\/p>\n<h2>Fileless Malware 1 &#8211; AveMariaRAT<\/h2>\n<p>\u201cAve Maria\u201d is a RAT (Remote Access Trojan), also known as WARZONE RAT. It offers a wide range of features, such as stealing victim\u2019s sensitive information and remote controlling an infected device, including privilege escalation, remote desktop control, camera capturing, and more.<\/p>\n<p>It is the first of the three malware (refer to Figure 3.3 of <a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/phishing-campaign-delivering-fileless-malware\">the previous analysis<\/a>) to be injected into a newly-created \u201caspnet_compiler.exe\u201d process on the victim\u2019s device and then run.<\/p>\n<h3>Step One:<\/h3>\n<p>Ave Maria has a configuration block that is RC4 encrypted within its PE structure\u2019s \u201c.bss\u201d section. The decryption key and encrypted data are together within the \u201c.bss\u201d. When the malware starts, it first decrypts the configuration block. Figure 1.1 shows the decrypted data in memory.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/phishing-campaign-delivering-fileless-malware-part-two\/_jcr_content\/root\/responsivegrid\/image.img.png\/1653606501361\/img1.1.png\" alt=\"Figure 1.1 \u2013 RC4-decrypted configuration block\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 1.1 \u2013 RC4-decrypted configuration block<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>It not only contains the C2 server (\u201cmubbibun.duckdns.org\u201d) and port (0x3E7), but also a number of switch flags, such as whether to add itself into the auto-run group, bypass UAC (User Account Control), or bypass Windows Defender.<\/p>\n<h3>Stage Two:<\/h3>\n<p>Once Ave Maria establishes its connection to the C2 server it starts to control the victim\u2019s device. According to my research, the traffic between its client and the C2 server is RC4 encrypted with a constant encryption key &quot;warzone160&quot;.<\/p>\n<p>I\u2019ll explain what the plaintext packet consists of through an instance packet as below.<\/p>\n<p><span style=\"font-size: 14.0px;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"background-color: rgb(217,217,217);\"><span style=\"color: red;\">29 BB 66 E4<\/span><\/span> <span style=\"background-color: rgb(217,217,217);\"><span style=\"color: rgb(0,176,240);\">70 EA 00 00 <\/span><span style=\"color: rgb(112,48,160);\">1E 00 00 00<\/span><\/span> <span style=\"background-color: rgb(217,217,217);\"><span style=\"color: rgb(118,146,60);\">00 00 00 00<\/span><\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: 14.0px;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"background-color: rgb(217,217,217);\"><span style=\"color: rgb(118,146,60);\">00 FA 07 00 00 00 00 00 60 EA 00 00 4D 5A 90 00<\/span><\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: 14.0px;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"background-color: rgb(217,217,217);\"><span style=\"color: rgb(118,146,60);\">\u2026<\/span><\/span><\/span><\/span><\/p>\n<ul>\n<li>The first dword 0xE466BB29 is a magic value; each packet must start with this value.<\/li>\n<li>The 0xEA70 is the size of the command data. It is 0x0 if no command data.<\/li>\n<li>The 0x1E is the command number of this packet.<\/li>\n<li>The subsequence data is the command data, which is an executable file in this example packet. It doesn\u2019t appear if there is no command data for the command.<\/li>\n<\/ul>\n<p>Ave Maria provides these features:<\/p>\n<p>Remote VNC (Virtual\u00a0Network Computing), Remote Shell, File Explorer, Process Manager, Remote Webcam, Password Manager, Reverse Socks, Download &amp; Execute a file, Remote Keylogger, HRDP Manager as well as Privilege Escalation.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/phishing-campaign-delivering-fileless-malware-part-two\/_jcr_content\/root\/responsivegrid\/image_215170684.img.png\/1653606527000\/img1.2.png\" alt=\"Figure 1.2 \u2013 Display of Remote Keylogger feature\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 1.2 \u2013 Display of Remote Keylogger feature<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>Figure 1.2 shows the feature (on the C2 server side) of the online Remote Keylogger (command 24H). You can see here what is recorded when I open a Chrome browser and type in \u201cwww.fortinet.com\u201d and press Enter on a victim\u2019s device.<\/p>\n<p>Its Password Manager feature aims to steal credentials from a group of apps, listed below, including internet browsers and email clients.<\/p>\n<p><b>Google Chrome, Epic Privacy browser, Microsoft Edge, UCBrowser, Tencent QQBrowser, Opera, Blisk, Chromium, Brave-Browser, Vivaldi, Comodo Dragon, Torch, Slim, CentBrowser, Microsoft Internet Explorer, Mozilla Firefox, Microsoft Outlook, Microsoft Messaging, Mozilla Thunderbird, Tencent Foxmail, and more.<\/b><\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/phishing-campaign-delivering-fileless-malware-part-two\/_jcr_content\/root\/responsivegrid\/image_825614562.img.png\/1653667554743\/fig-1.3.png\" alt=\"Figure 1.3 \u2013 The pseudo code of stealing credentials\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 1.3 \u2013 The pseudo code of stealing credentials<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>Figure 1.3 is a screenshot of the pseudo code where Ave Maria steals the credentials (command 20H) from the defined files for several internet browsers. It calls a function to RC4-encrypt the credentials and send them to the C2 server.<\/p>\n<p>Table 1.1 presents most of the control commands that Ave Maria supports.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--6 aem-GridColumn--offset--default--3\">\n<p style=\"text-align: center;\"><span style=\"color: rgb(153,153,153);\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">Table 1.1 \u2013 Ave Maria\u2019s Control Commands<\/span><\/span><\/span><\/span><\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h2>Fileless Malware 2 \u2013 PandorahVNC RAT<\/h2>\n<p>The second fileless malware injected into \u201cRegAsm.exe\u201d is \u201cPandorahVNC Rat,\u201d which is a commercial software. It was developed using C#, a Microsoft .Net framework. It supports features to steal credentials from some popular applications, like Chrome, Microsoft Edge, Firefox, Outlook, Foxmail, and so on. It also supports control commands to control the victim\u2019s device, such as starting a process, capturing the screenshot, manipulating the victim\u2019s mouse and keyboard, and more.<\/p>\n<h3>Stage One:<\/h3>\n<p>When it starts, it defines the following variables. They are the C2 server address, port, and the group id that will be used when sending data to the C2 server.<\/p>\n<p style=\"margin-left: 40.0px;\"><span style=\"font-size: 11.0pt;\"><span style=\"background-color: rgb(217,217,217);\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"color: blue;\">string<\/span><span style=\"color: black;\">\u00a0str\u00a0=\u00a0<\/span><span style=\"color: rgb(163,21,21);\">&quot;vncgoga.duckdns.org&quot;<\/span><span style=\"color: black;\">; <\/span><span style=\"color: rgb(0,176,80);\">\/\/C2 server<\/span><\/span><\/span><\/span><br \/> <span style=\"font-size: 11.0pt;\"><span style=\"background-color: rgb(217,217,217);\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"color: blue;\">string<\/span><span style=\"color: black;\">\u00a0str2\u00a0=\u00a0<\/span><span style=\"color: rgb(163,21,21);\">&quot;1338&quot;<\/span><span style=\"color: black;\">;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span style=\"color: rgb(0,176,80);\">\/\/ TCP port<\/span><\/span><\/span><\/span><br \/> <span style=\"font-size: 11.0pt;\"><span style=\"background-color: rgb(217,217,217);\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"color: blue;\">string<\/span><span style=\"color: black;\">\u00a0identifier\u00a0=\u00a0<\/span><span style=\"color: rgb(163,21,21);\">&quot;3H4RHL&quot;<\/span><span style=\"color: black;\">;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span style=\"color: rgb(0,176,80);\">\/\/ Group id<\/span><\/span><\/span><\/span><\/p>\n<p>Next, it proceeds to extract a core module from a base64-encoded string, which performs all features of PandoraHVNC RAT. It then deploys the core module into a newly-created process, \u201ccvtres.exe\u201d (a file from Microsoft .Net framework), using process hollowing. It tries to find the file from one of the following:<\/p>\n<p style=\"margin-left: 40.0px;\">\u201cC:WindowsMicrosoft.NETFrameworkv4.0.30319&quot;<br \/> &quot;C:WindowsMicrosoft.NETFrameworkv2.0.50727\u201d <\/p>\n<p>If it fails to locate the file, it quits without running PandoraHVNC RAT\u2019s core module. The C2 server address, port, and group id will be passed to the new process during the process hollowing. Figure 2.1 shows the code segment to perform the process hollowing.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/phishing-campaign-delivering-fileless-malware-part-two\/_jcr_content\/root\/responsivegrid\/image_1905207063.img.png\/1653606590429\/img-2.1.png\" alt=\"Figure 2.1 \u2013 Code to perform the process hollowing\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 2.1 \u2013 Code to perform the process hollowing<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h3>Stage Two:<\/h3>\n<p>It collects basic information from the victim\u2019s device and sends it to the C2 server to register the client in the server. Below is the data of such packet.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/phishing-campaign-delivering-fileless-malware-part-two\/_jcr_content\/root\/responsivegrid\/image_1810134873.img.png\/1653606612471\/img2.2.png\" alt=\"Figure 2.2 \u2013 The registration packet to the C2 server\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 2.2 \u2013 The registration packet to the C2 server<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>The first 64-bit integer 0x62 is the entire packet size. The subsequent data is sealed in a serialized binary object. The 16H data (\u201c00 01 \u2026 0000\u201d) is kind of header. The next 0x4a is the size of the following strings, which is a variable length integer. The last 0x0b is a close flag.<\/p>\n<p>Let\u2019s take a look the sealed string, which consists of a packet number (\u201c654321\u201d), client group id (\u201c3H4RHL\u201d), the victim\u2019s username and pc name (\u201cBobs@BOBS-PC\u201d), the victim\u2019s location code (\u201cUS\u201d), the system information (\u201cWindows 7 Pro\u201d), date (\u201c05\/09\/2022\u201d), client version (\u201c3.1\u201d), and whether any antivirus product is being used (\u201cFalse\u201d).<\/p>\n<p>Once the C2 server receives this packet, it shows the victim\u2019s information in a list, as shown in Figure 2.3, \u201cConnected client\u201d.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/phishing-campaign-delivering-fileless-malware-part-two\/_jcr_content\/root\/responsivegrid\/image_1304283375.img.png\/1653606709611\/img-2.3.png\" alt=\"Figure 2.3 - PandoraHVNC RAT C2 server interface and features\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 2.3 &#8211; PandoraHVNC RAT C2 server interface and features<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>The hacker is then able to control the victim\u2019s machine by right-clicking the client and clicking the items on the menu. Figure 2.3 also demonstrates the right-click menu and features.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/phishing-campaign-delivering-fileless-malware-part-two\/_jcr_content\/root\/responsivegrid\/image_1850920595.img.gif\/1653606737239\/img-2.4.gif\" alt=\"Figure 2.4 \u2013 The credentials packet to C2 server\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 2.4 \u2013 The credentials packet to C2 server<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>Figure 2.4 is a screenshot of two packets, the first line is the received command control packet with command number \u201c3308\u201d. The rest is the packet sent to the C2 server with packet number \u201c3308\u201d. This is followed by the stolen credentials from the victim when \u201cPandora Recovery\u201d is clicked by the hacker. As mentioned before, the two packets are sealed in the serialized binary object.<\/p>\n<p>Table 2.1 demonstrates the details of all the control commands and features that PandoraHVNC RAT provides.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--6 aem-GridColumn--offset--default--3\">\n<table cellspacing=\"0\" class=\"MsoTableGrid\" style=\"border: none;\">\n<tbody>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: 1.0px solid black;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><b><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Cmd Num<\/span><\/span><\/b><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: 1.0px solid black;vertical-align: top;width: 480.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><b><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Description<\/span><\/span><\/b><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">0<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Start to capture the screenshot.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">1<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Abort the screenshot.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">2<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Simulate mouse left button DOWN.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">3<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Simulate mouse right button DOWN.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">4<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Simulate mouse left button UP.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">5<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Simulate mouse right button UP.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">6<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Perform mouse double click.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">7<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Simulate to press a Key.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">8<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Move the mouse to a given point.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">9<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Send the data of the system clipboard to its C2 server.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">10<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Set given data to system clipboard.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">11<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Start a Chrome browser with specified parameters.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">12<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Start Mozilla Firefox with specified parameters.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">13<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Show the StartMenu.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">14<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Minimize Pandora HVNC Rat.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">15<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Show Pandora HVNC Rat to the victim.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">16<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Show a pop-up message to the victim.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">17<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Set screenshot interval.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">18<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Set screenshot quality.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">19<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Set screenshot size.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">21<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Start Explorer program.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">24<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Kill the current process.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">30<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Start Microsoft Edge browser with specified parameters<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">32<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Start Brave browser with specified parameters<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">50<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Call KillMiner() to kill a process.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">55<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Download a file into %temp% folder as a Miner. <\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">56<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Download a file and execute.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">444<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Start an Opera browser with specified parameters.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">555<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Restart Outlook.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">556<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Restart FoxMail.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">557<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Restart Thunderbird.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">666<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Kill current Pandora HVNC Rat.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">1337<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Send Pong packet.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">3306<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Push data to override the system clipboard.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">3307<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Obtain the data from the system clipboard.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">3308<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Obtain credentials and cookies from the victim\u2019s browsers.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">4875<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Start a CMD program.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">4876<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Start a PowerShell program.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">8585<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Start a Chrome browser with a default URL.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">8586<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Kill all Chrome browsers.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">8587<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Reset Scale.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 84.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">8589<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 480.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"color: black;\">Same as 56. Download a file and execute.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: center;\"><span style=\"color: rgb(153,153,153);\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Table 2.1 &#8211; List of control commands of PandoraHVNC RAT<\/span><\/span><\/span><\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h2>Fileless Malware 3 \u2013 BitRAT<\/h2>\n<p>The third fileless malware injected into \u201caspnet_compiler.exe\u201d is \u201cBitRat\u201d, which is said to be a high quality and efficient RAT. It provides information collection like clipboard logger, keylogger, application credentials, Webcam logging, and Voice Recording. It has wide control commands for controlling the victim\u2019s device, including downloading and executing a file, performing remote desktop control, controlling processes and services, reverse socks, and more.<\/p>\n<h3>Stage One:<\/h3>\n<p>BitRat has a configuration block encrypted similar to the Ave Maria Rat. Figure 3.1 shows the just decrypted configuration block in memory, where it contains C2 server (\u201cmaraipasoo[.]duckdns[.]org\u201d) &amp; port (890), client ID (\u201cf2b8b66873ca913a\u201d), and more.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/phishing-campaign-delivering-fileless-malware-part-two\/_jcr_content\/root\/responsivegrid\/image_1048433008.img.png\/1653606773643\/img-3.1.png\" alt=\"Figure 3.1 \u2013 Decrypted configuration block\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 3.1 \u2013 Decrypted configuration block<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>It proceeds to connect to the C2 server. It then uses TLS 1.2 protocol plus a cipher suite of RAS+AES 256 to transfer and encrypt its packet. Figure 3.2 shows the model that it uses to encode the plain text data with Base64 and encrypt with AES-256. And finally, it sends the encrypted data to the C2 server over TLS 1.2 protocol.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/phishing-campaign-delivering-fileless-malware-part-two\/_jcr_content\/root\/responsivegrid\/image_208348313.img.png\/1653606799997\/img-3.2.png\" alt=\"Figure 3.2 \u2013 The outline of how a packet is transformed and sent to the C2 server\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 3.2 \u2013 The outline of how a packet is transformed and sent to the C2 server<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>I\u2019ll take a moment here to explain what the plaintext packet looks like. Figure 3.3, below, is a screenshot of the debugger when BitRat was about to Base64-encode the plaintext packet with the basic information of the victim\u2019s device.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/phishing-campaign-delivering-fileless-malware-part-two\/_jcr_content\/root\/responsivegrid\/image_1061018551.img.png\/1653606825462\/img-3.3.png\" alt=\"Figure 3.3 \u2013 Basic information packet before Base64 encoding\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 3.3 \u2013 Basic information packet before Base64 encoding<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>The packet consists of many parts separated by \u201c|\u201d, including a client ID (\u201cf2b8b66873ca913a\u201d), user name, computer name, CPU information, GPU card, system name (\u201cWin 7\u201d), system\u2019s uptime, system idle time, RAM amount, IP address, whether or not the login user is an administrator, BitRat client version (\u201c1.38\u201d), and so on. Next, the packet goes through Base64-encoding and AES-256 encryption, which is eventually sent to the C2 server.<\/p>\n<p>Once the C2 server receives this packet, the victim\u2019s device shows up in its control interface, where the hacker is able to control the infected device.<\/p>\n<h3>Stage Two:<\/h3>\n<p>BitRat is more powerful than AveMariaRAT and PandoraHVNC because it provides a great number of control commands (172 commands) to control the victim\u2019s device.\u00a0<\/p>\n<p>Figure 3.4 shows the dashboard to a connected victim on the C2 server side. On the left is the basic information of the victim\u2019s device, while there are some features listed on the right.\u00a0<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/phishing-campaign-delivering-fileless-malware-part-two\/_jcr_content\/root\/responsivegrid\/image_1871964280.img.png\/1653606847742\/img-3.4.png\" alt=\"Figure 3.4 \u2013 Dashboard and features that BitRat supports\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 3.4 \u2013 Dashboard and features that BitRat supports<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>Other than the features from the dashboard, it also supports the following features from the main context menu:<\/p>\n<ul>\n<li>Chat<\/li>\n<li>Clear browsers<\/li>\n<li>Clipboard management<\/li>\n<li>DLL injection<\/li>\n<li>Change desktop background<\/li>\n<li>Open website<\/li>\n<li>Notes<\/li>\n<li>UAC bypass<\/li>\n<li>Kill Windows Defender<\/li>\n<li>Show preview of screen or webcam<\/li>\n<li>Keylog download &amp; search<\/li>\n<li>Reverse socks<\/li>\n<li>System management (reboot, shutdown, sleep, etc.)<\/li>\n<li>BitRat client\u2019s update and uninstall<\/li>\n<li>DDoS attack (plugin)<\/li>\n<li>Mining (plugin)<\/li>\n<li>Telegram bot (plugin)<\/li>\n<li>Passwords Logins (plugin)<\/li>\n<li>And more<\/li>\n<\/ul>\n<h3><span style=\"font-weight: normal;\">Stage Three:<\/span><\/h3>\n<p>While BitRat receives the control command packet, it only needs a AES-256 decryption to restore the plaintext packet. I will explain the structure of a plaintext command packet using the following example:<\/p>\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"background-color: rgb(217,217,217);\"><span style=\"color: black;\">&quot;<\/span><\/span><\/span><b><span style=\"font-size: 12.0pt;\"><span style=\"background-color: rgb(217,217,217);\"><span style=\"color: red;\">ddos_start<\/span><\/span><\/span><\/b><span style=\"font-size: 12.0pt;\"><span style=\"background-color: rgb(217,217,217);\"><span style=\"color: black;\">|MTkyLjE2OC4yMi4xNQ==|3333|1|tcp|tcp|1|0|L3NpdGUucGhwP3g9dmFsMSZ5PXZhbDI=&quot;<\/span><\/span><\/span><\/span><\/span><\/p>\n<p><span style=\"\">Every command packet starts with a command name string and subsequent parameters, which are separated by \u201c|\u201d.<\/span><\/p>\n<p>The above example command asks the infected device to start a DDoS attack, where \u201cddos_start\u201d is the command name, \u201cMTkyLjE2OC4yMi4xNQ==\u201d is the Base64-encoded target IP, \u201c3333\u201d is the target port, flood method is \u201ctcp\u201d, protocol is \u201ctcp\u201d, thread number is \u201c1\u201d, size is \u201c0\u201d, and the last field is the data.<\/p>\n<p>On the very first time, BitRat initializes a linked list with nodes containing a command name and a command number (like \u201cddos_start\u201d for\u00a0 85H) as well as some flags. BitRat has a method to go through these nodes looking for a node that matches the command name from the packet by string comparison. The command name starts at offset +10H of the node and the corresponding command number is saved in a dword at offset +28H. Below is a dumped node of \u201cddos_start\u201d. <\/p>\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Offset+00\u00a0 \u00a0<span style=\"background-color: rgb(217,217,217);\">A0 2E 30 00 00 71 3E 00 A0 2E 30 00 00 00 00 00\u00a0 \u00a0.0..q&gt;.\u00a0.0&#8230;..<\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Offset+10\u00a0 \u00a0<span style=\"background-color: yellow;\">64 64 6F 73 5F 73 74 61 72 74<\/span><span style=\"background-color: rgb(217,217,217);\"> 00 00 00 00 00 00\u00a0 <span style=\"background-color: yellow;\">ddos_start<\/span>&#8230;&#8230;<\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Offset+20\u00a0 \u00a0<span style=\"background-color: rgb(217,217,217);\">0A 00 00 00 0F 00 00 00 <span style=\"background-color: lime;\">85 00 00 00<\/span>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8230;&#8230;.\u2026&#8230;<\/span><\/span><\/span><\/p>\n<p>BitRat performs the action according to the command number. Table 3.1 lists the most control commands, with brief command descriptions that BitRat supports.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--7 aem-GridColumn--offset--default--3\">\n<table cellspacing=\"0\" class=\"MsoTableGrid\" style=\"border: none;width: 612.0px;\">\n<tbody>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: 1.0px solid black;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><b>Cmd Name<\/b><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: 1.0px solid black;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><b>Num<\/b><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: 1.0px solid black;vertical-align: top;width: 408.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><b>Description<\/b><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;cli_up&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">00H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Update BitRat client.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;rc&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">01H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Reconnect to the C2 server.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;cli_dc&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">02H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Disconnect to the C2 server.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;cli_un&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">03H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Uninstall BitRat client from the victim&#8217;s device.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;cli_sleep&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">04H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Put the victim&#8217;s system into sleep.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;cli_hib&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">05H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Put the victim&#8217;s system into hibernation.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;cli_log&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">06H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Have the victim&#8217;s system to log out the current user.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;cli_rs&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">07H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Restart the victim&#8217;s device.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;cli_off&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">08H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Shutdown the victim&#8217;s device.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;cli_bsod&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">09H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Make the victim&#8217;s system crash with a blue screen.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;info&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">0AH<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Request for the basic information of the victim&#8217;s device.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;drives_get&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">0BH<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">List drivers, like &quot;C:&quot;, &quot;D:&quot; and etc.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;files_exec&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">0CH<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Execute a file on the victim&#8217;s disk with given parameters.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;files_delete_normal&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">0FH<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Delete a specified file.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;files_delete_secure&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">10H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Delete a specified file with a security way.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;files_rename&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">11H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Rename a file.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;files_new_dir&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">12H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Create a folder.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;files_zip&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">13H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Make a zip archive of a file.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;files_zip_dir&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">14H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Make a zip archive of a folder.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;files_get&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">15H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">List files under a specified path.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;files_search&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">16H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Search files by filter string.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;files_search_stop&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">17H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Stop file searching.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;files_download&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">18H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Transfer a file from the victim&#8217;s device to the C2 server.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;files_upload&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">1AH<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Transfer a file from the C2 server onto the victim&#8217;s device.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;prc_list&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">1DH<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">List running processes.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;prc_suspend&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">1EH<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Suspend a process with its PID.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;prc_resume&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">1FH<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Resume a suspended process with its PID.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;prc_priority&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">20H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Set a process&#8217;s priority with a given PID.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;prc_kill&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">21H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Kill a process with its PID.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;prc_restart&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">22H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Restart a process.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;srv_list&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">23H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">List system services on the victim&#8217;s device.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;srv_start&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">24H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Start a service.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;srv_control&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">25H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Pause, stop, continue a service.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;wnd_list&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">27H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">List all windows being opened on the victim&#8217;s device.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;wnd_cmd&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">28H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Control a window. such as hide, show, maximize, minimize, etc.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;dlexec&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">2AH<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Download and execute an executable file.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;screenlive&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">2CH<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Start screen capture.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;screenlive_stop&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">2DH<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Stop screen capture.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;screenlive_monitor&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">2EH<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Start screenlive monitor.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;screenlive_size&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">2FH<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Set screenlive size.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;screenlive_quality&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">30H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Set screenlive quality&quot;<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;screenlive_cursor&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">31H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Set screenlive cursor to show or hide.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;screenlive_color&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">32H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Set screenlive color to gray or color.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;screenlive_click&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">35H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Simulate to perform mouse click on screenlive windows.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;screenlive_move&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">36h<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Move screenlive to a given position.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;screen_preview_start&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">38H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Start screen preview.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;screen_preview_stop&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">39H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Stop screen preview.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;monitors_refresh&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">3BH<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Refresh monitors.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;webcam_devices&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">3CH<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">List webcam interfaces.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;webcam_quality&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">3DH<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Set webcam quality.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;webcam_start&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">3EH<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Start webcam capture.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;webcam_stop&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">3FH<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Stop webcam.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;klgoff_list&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">43H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">List offline keylogger files.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;klgoff_get&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">44H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Transfer an offline keylogger file.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;klgoff_dl_all&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">45H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Transfer all keylogger files.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;klgoff_del&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">46H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Delete an offline keylogger file.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;klgonlinestart&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">48H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Start the online keylogger.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;klgonlinestop&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">49H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Stop the online keylogger.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;klg_search&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">4AH<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Search keywords in keylogger data.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;aud_rec_list&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">4DH<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">List audio devices.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;shell_start&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">4EH<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Start a remote shell on the victim&#8217;s device.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;shell_stop&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">4FH<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Stop the remote shell.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;shell_exec&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">50H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Exeucte a command trhough the remote shell.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;con_list&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">51H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">List all processes with network connections.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;crd_logins_data&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">64H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Collect the credentials from apps on the victim&#8217;s device.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;crd_logins_req&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">65H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Transfer the collected credentials.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;remotebrowser&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">6DH<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Remotely start the victim&#8217;s default browser invisible.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;remotebrowser_stop&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">6EH<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Stop the remote browsers.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;remotebrowser_key&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">6FH<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Press a keyboard key on the remote browser.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;remotebrowser_click&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">70H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Click on the remote browser.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;remotebrowser_quality&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">72H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Set the remote browser quality.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;settings&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">78H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Configure the BitRat client.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;soft_list&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">79H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">List the installed software on the victim&#8217;s device.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;soft_uninstall&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">7AH<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Uninstall software from the victim&#8217;s device.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;reg_hkeys_get&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">7EH<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Obtain a list of HKEYs (Handles to the Keys) of the victim&#8217;s system registry.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;reg_keys_root_get&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">7FH<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">List the root keys under a HKEY of the system registry.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;reg_keys_get&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">80H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Navigate a sub-key of the system registry.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;reg_val_edit&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">81H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Add a value into the system registry.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;reg_val_del&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">82H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Delete a value from the system registry.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;reg_key_add&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">83H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Add a sub-key into the system registry.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;reg_key_del&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">84H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Delete a sub-key from the system registry.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;ddos_start&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">85H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Start a DDOS attack from the victim&#8217;s device.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;ddos_stop&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">86H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Stop the DDOS attack.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;bypass&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">87H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Attempt the UAC bypass using exploit.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;prc_protect&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">88H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Protect a process.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;wd_kill&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">89H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Kill the Windows defender service.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;autoruns_req&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">92H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Collect a list of auto run progress from the system registry.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;autoruns_data&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">93H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Request the auto run data.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;autoruns_del&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">94H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Delete an auto-run item.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;s_list&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">95H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">List the tasks from the system Task Scheduler of the infected system.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;task_del&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">96H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Delete a task from the system Task Scheduler.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;spread&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">97H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Spread usb.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;bg_change&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">98H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Change the desktop background of the victim&#8217;s desktop.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;scr_off&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">99H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Turn off screen.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;browsers_clear&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">9BH<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Close the browsers such as Chrome, Firefox, Edge, Opera, IE, Vivaldi, Brave, Chromium, Torch, UCBrowser and clean its data.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;notes_get&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">9CH<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Obtain notes that were set to the victim\u2019s device.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;notes_set&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">9DH<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Set notes to the victim device.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;website_open&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">9FH<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Open a website with the default web browser on the victim&#8217;s device.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;vol_edit&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">A0H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Change master volume.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;msgbox&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">A3H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Display the victim a message box with a message.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;clipboard_get&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">A2H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Obtain the system clipboard data from the victim&#8217;s system.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;injdll&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">A4H<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Inject a dll into a specified process or all processes.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;chat_start&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">A9H<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Pop up a chatting box to the victim.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;chat_msg&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">AAH<\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(251,251,175);border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Chat with the victim using the chatting box.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 156.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">&quot;chat_stop&quot;<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 48.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">ABH<\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 408.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">Stop chatting.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: center;\"><span style=\"color: rgb(153,153,153);\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">Table 3.1 \u2013 The most control commands of BitRat<\/span><\/span><\/span><\/span><\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h2>Conclusion<\/h2>\n<p>In this second part the series, I examined the three fileless malware payloads included in the phishing campaign. I also explained what processes they inject into and execute.<\/p>\n<p>Next, I introduced how these three malware connect to their C2 server and described the structure of the packets sending to the C2 server. I also presented the values in the control command packets sent to the malware clients to control the victim\u2019s device to perform further malicious tasks.<\/p>\n<p>I elaborated the features that the three malware provide and used several examples to prove how the attacker uses them. From my research, you also learned the differences between their features.<\/p>\n<p>I also made three tables to list the control commands with brief descriptions.<\/p>\n<h2>Fortinet Protections<\/h2>\n<p>Fortinet customers are already protected from this malware by FortiGuard\u2019s Web Filtering, AntiVirus, FortiMail, FortiClient, FortiEDR services and CDR (content disarm and reconstruction) feature, as follows:<\/p>\n<p>All relevant URLs have been rated as &quot;<b>Malicious Websites<\/b>&quot; by the FortiGuard Web Filtering service.<\/p>\n<p>The phishing email attached Excel document can be disarmed by the FortiGuard CDR (content disarm and reconstruction) feature.<\/p>\n<p>The captured\u00a0Excel sample at the beginning and the downloaded html file as well as the Powershell file with three fileless malware payload files are detected as &quot;<b>VBA\/Agent.DDON!tr<\/b>&quot;, &quot;<b>JS\/Agent.DDON!tr.dldr<\/b>&quot; and &quot;<b>PowerShell\/Agent.e535!tr<\/b>&quot; and are blocked by the FortiGuard Antivirus service.<b><\/b><\/p>\n<p>FortiEDR detects both the Excel file and the huge Powershell file as malicious based on its behavior.<\/p>\n<p>In addition to these protections, we suggest that organizations have their end users also go through the\u00a0FREE\u00a0<a href=\"https:\/\/training.fortinet.com\/?utm_source=blog&amp;utm_campaign=nse-institute\">NSE training<\/a>:\u00a0<a href=\"https:\/\/training.fortinet.com\/local\/staticpage\/view.php?page=nse_1&amp;utm_source=blog&amp;utm_campaign=nse-1\">NSE 1 \u2013 Information Security Awareness<\/a>. It includes a module on Internet threats that is designed to help end users learn how to identify and protect themselves from phishing attacks.<\/p>\n<h2>IOCs<\/h2>\n<h3><span style=\"font-weight: normal;\">URLs:<\/span><\/h3>\n<p>vncgoga[.]duckdns[.]org:1338<br \/> mubbibun[.]duckdns[.]org:999<br \/> danseeeee[.]duckdns[.]org:2022<br \/> maraipasoo[.]duckdns[.]org:890 <\/p>\n<p><i>Visit part one of this series <a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/phishing-campaign-delivering-fileless-malware\">here<\/a>.\u00a0<\/i><\/p>\n<p><i>Learn more about Fortinet\u2019s\u00a0<a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs?utm_source=blog&amp;utm_campaign=fortiguard-labs\">FortiGuard Labs<\/a>\u00a0threat research and intelligence organization and the FortiGuard Security Subscriptions and Services\u00a0<a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs?tab=security-bundles&amp;utm_source=blog&amp;utm_campaign=security-bundles\">portfolio<\/a>.<\/i><\/p>\n<\/p><\/div>\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\">\n<div id=\"om-b2dxtopzidsdt3fkzfsv-holder\"><\/div>\n<\/div><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/phishing-campaign-delivering-fileless-malware-part-two\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/fortinet\/blog\/threat-research<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"\/blog\/threat-research\/phishing-campaign-delivering-fileless-malware-part-two\/_jcr_content\/root\/responsivegrid\/image.img.png\/1653606501361\/img1.1.png\"\/><br \/>FortiGuard Labs discovered a phishing campaign delivering fileless malware AveMariaRAT, BitRAT, and PandoraHVNC to steal sensitive information from a victim\u2019s device. Read part II of our analysis to find out more about the malware payload details and the control commands.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10424,10378],"tags":[],"class_list":["post-19132","post","type-post","status-publish","format-standard","hentry","category-fortinet","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19132"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19132\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19132"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19132"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}