http://xmr.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/HTB/Hard/10.html
Then it connects, generates an exe payload, only to drop that meterpreter file into system32.
Then lastly it uses the generate_mof() function and then uploads the generated payload into \\system32\\wbem\\mof\\
and then it just disconnects.
Which means, that you get remote code execution just by dropping a file into that folder. now let's check generate_mof() from interactive ruby mode: msf6 exploit(windows/smb/psexec) > irb
[*] Starting...