Malware Analysis Report

2025-03-15 05:42

Sample ID 240509-mb4xhacf4v
Target bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451
SHA256 bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451
Tags
aspackv2 discovery spyware stealer
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451

Threat Level: Likely malicious

The file bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451 was found to be: Likely malicious.

Malicious Activity Summary

aspackv2 discovery spyware stealer

Drops file in Drivers directory

Checks computer location settings

ASPack v2.12-2.42

Reads user/profile data of web browsers

Enumerates connected drives

Checks installed software on the system

Unsigned PE

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SendNotifyMessage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-09 10:18

Signatures

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-09 10:18

Reported

2024-05-09 10:20

Platform

win7-20240221-en

Max time kernel

122s

Max time network

142s

Command Line

"C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe"

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A

Enumerates physical storage devices

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000003113f6ceab8535c7d1ef394e6eea08c8864a9356675903411fa6d14e715dff3f000000000e80000000020000200000003ae6baa4c70f4d639154f0e49c689ae14690be9eb01ddc9932f05a515925dfbb20000000c4e4b93bf32f469930259cbcc6e6850869cc4dacf8adf9ad8966bffce3b6b7b840000000d5a55a4992e308c7e2eb56a2cb737de35f0378bade059473d0a5610e3cacdfd43c31bcf04f1ca31e36f2d5c71efb0b50525f716438ab3cd65b39c3546cd51442 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00f6646dfaa1da01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F603B31-0DED-11EF-878B-CAFA5A0A62FD} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421411786" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2128 wrote to memory of 1832 N/A C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe
PID 2128 wrote to memory of 1832 N/A C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe
PID 2128 wrote to memory of 1832 N/A C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe
PID 2128 wrote to memory of 1832 N/A C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe
PID 1832 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 1832 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 1832 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 1832 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2628 wrote to memory of 2452 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2628 wrote to memory of 2452 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2628 wrote to memory of 2452 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2628 wrote to memory of 2452 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

Processes

C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe

"C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe"

C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe

"C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe" Master

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2628 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 info.178stu.com udp
HK 103.133.93.52:80 info.178stu.com tcp
US 8.8.8.8:53 www.178stu.com udp
US 8.8.8.8:53 www.178stu.com udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

memory/2128-0-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2128-2-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2128-4-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2128-3-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2128-1-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2128-5-0x00000000001B0000-0x00000000001B1000-memory.dmp

memory/1832-6-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2128-8-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/1832-12-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/1832-11-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/1832-10-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/1832-9-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/1832-13-0x00000000002A0000-0x00000000002A1000-memory.dmp

memory/1832-16-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/1832-20-0x0000000000400000-0x00000000006A6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Cab19F7.tmp

MD5 ac05d27423a85adc1622c714f2cb6184
SHA1 b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256 c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA512 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

MD5 29f65ba8e88c063813cc50a4ea544e93
SHA1 05a7040d5c127e68c25d81cc51271ffb8bef3568
SHA256 1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512 e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

C:\Users\Admin\AppData\Local\Temp\Tar1AEA.tmp

MD5 435a9ac180383f9fa094131b173a2f7b
SHA1 76944ea657a9db94f9a4bef38f88c46ed4166983
SHA256 67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA512 1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c24ce8454acf4f326b0ff4c71a174da6
SHA1 df11020fe0c0fcf9a66f8e4c7f71551392302993
SHA256 40cf1c047556fd87836f3d6ed26621b3978a938f97dd4d07481047b06e6a049f
SHA512 016b5fb0a86d7071c7054bf4c5ad4784572d3c3f1f94b38eccab35d74e5a983d120b8b0b6bb79841c8f67a869cebd92d0de8907cb553fdfccb37def1e7cf1c05

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 aaba9d4a2e42f45d5bae893d6f99d0d9
SHA1 165f3ca27427c6f00c31f6d5668015b07eee0d5f
SHA256 b26cf3a7b27105155749671e7969aa034dce0b017dd64941cf8f2ae50da5b935
SHA512 01585a038f5fe05acc78e48dc5ef941abbe6c7cef052c2f8d5b80f581e3a2f2fc898371bbfa1048d7d7c5b244317c91278fededa3ee643ff38cf1b2726193d1f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 528a5e47191197a924cd71161e19ec71
SHA1 dc520a6f387b887887d14d15f38cbaed15d0311e
SHA256 9b3a909a9c83dc1b33821c532ede9f386a21986093a11a9bd0a6977b94acf193
SHA512 ca969d9802fa6f96146f20166a54ed400a050d29f9488552b466ce6fe5995071dcb6ad9b594038a60192e29de6ef3f8e49a7c6298ce0aba9f0d6fa1aef013262

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5680898ea1072332c05d7636bebfeeeb
SHA1 3dee467a2de228ca046c6bc8ae8046639b42570a
SHA256 dfb9ea59643912049195e216900319a139d60d0c4e84048a552b713c1cdf6662
SHA512 44b8914dff3771f3cb69d902c53fe9f42d0f8ffe626cc18d0923c0c84062532536abe1538bf58ee98d33d343f44e895045a9ee1ec439ec8ffe499ee749c8c382

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 898ca1f004191d9a517cf8b2f7384597
SHA1 7246ca0b14634714918bb8641a5698f85fcd45aa
SHA256 a68e0e9e94b29ae091a5f61c66c452189e755b08faae2351a414173ee0c2f54e
SHA512 2ddb51812e8ccf427829351ad04250446f76a13174b37e2439f30562c3ef41b17005e450ef9c813e32b19ef35f959daed624b4e1d8127df1895006b16b803ed8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ad6a85d0bf2a36ee2dcdac52e7715e80
SHA1 449b827e17d7f3fd6303b0423a52e73dedbd1fce
SHA256 e3c9d1500d1e2048902d284b807c7c60ba18e825fb24621cbe42c7f8afefba3e
SHA512 b67a1b0bce290be67bfb1e615309e20eab9ad08220ff11f93d34d4b59a60bfeb7d35837c73ded54fa8c49ee8e6759932815c1522570d4e082667a57c1b4ab389

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 67ef49423302c2f195ccf2a023b5e691
SHA1 b1fa7764fa72c347ea0daad2161aad1c058ea339
SHA256 b66684c4584859d4cc88064f2f77bf4ff4a06c73be34292b0d9d61ab00235062
SHA512 1d10d4288a6300efb3aae465e95863d4f45fd4ff522ba7b8df291f7218e9962880d56e4fb0e3e96dd40ce6d935c2e63f7ad8880ff383f1f79df3146a12739b7d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 dd091afee0b9f8e4ceb49eb3ccfbeeae
SHA1 d76dca4cea5d7f1ad5104cc56310618b1b4eddd8
SHA256 9249f2331a60847723eedefdc463d1e5c658043b1fc2ea11aae76e188c7df4be
SHA512 0ec907597e176043d265b54d9d27a966786ab03048aa253398e2e8cc54f1a4f4e5c59025fdc5511f7fed9f4edcefc1c1b86fa780bff0a9fbc4943604c2238e98

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d42b33d79f35f520c315df8164c571fd
SHA1 8bb160e0148ca045e752cec38873ba1fce01ac01
SHA256 ef91a3e18128f5c1933da547d209db25fb3aa0f6f7b635c3cfbf0041a9e795df
SHA512 7288ce824563b94d1616aa49d1dbfa7a15eee5923c1f9d75149fa47fdcdc5095fe4a44e216272b9ade7363867f4599977a6bf3d7f45602ba5c25c2c1400abba7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d5b1f426497c871362ec484dadf04848
SHA1 9e515d474ce65b97b77ab67d7fa3cf6b292f1637
SHA256 9aa0634f2a6f26d223d0c2aff775c766bd79e6a0d8fe058843f72cd313c97c72
SHA512 b65bf7020da00c8e902fba25ee50e803a3b1c8418aca2edcb08258471247dfa7fa66ce334b45d6d98ec8bb626a5d499cd2e53f10ef828d22460d4784af204968

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 201693486dc68ddbd8cb6ce01d02ea9c
SHA1 e808b929e937d29e27f6f8537d8d34bcf1be3935
SHA256 d23486fc7d7407eae5f25cf8264683fb8e43718a6fa6290e7689930c50ba225b
SHA512 f62d8f96b036154bcfe93fb3fb5f4d0f77d9b4237cc934374c0c43046049c980333ec4621e087015830439fafc4604907e1e95886a7255c718d5a9accf3e66ac

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 88478c0a77ff6a330eec38537574402b
SHA1 fbc34f55f022e0492f0022bc009d485d60fead3a
SHA256 6e9443832564d26cc9aadcbc272abeaf293ccefd11c01187429982ff274e4a9a
SHA512 ce6238ad7977e109b2ba41d1c682bffde2e7317da3dd12223d58eafb690c75f8288faac97f3f3af6503a969e9d620ef1b2562540e96a1a6db81b39147ce9c42f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d2ec7542b72d072f224280d07be4aa92
SHA1 163cc8e92973e386f325cdf75d474071067adeb6
SHA256 a053ade469de2bf3a3b971754de1407ff12832506a3675d4387ccb588ff03e53
SHA512 a45b74f726fefa9534227cb7c09d01c2321a6c9a5d823a50cb148f649ea2b3e61195ab349081c8125457fbdada1646f54ade18a7d3dceb5fc1e77eef53c23cc7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ecd0572811141851fc454db4be07d4a1
SHA1 d2aea46b623318e572d1502d23c79173c6379e9d
SHA256 84ac0a25b777ec8ac265f385004cb41fb30de466e925b81dab8ff92ad36dce5d
SHA512 e20a3da8cca3bed610e0c4348b1728a532eb09cd10ee9e9f764265449bf4625cfed4c5639f9e2db602e2acf126dcb5d38000bbb1f974cec20cdd853167cfd4e7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 0082400240ca41589da32be774b291a6
SHA1 0705c82a28656322fdeb78ae8e8bea769b07687c
SHA256 73272d76789cc99730c08c665bcdeab26878d074f77df8db36c9790cc9c70e5e
SHA512 fa3f8da80b1b14ece57bb42d78b9434e1f666699da056712a4b4ce58cbb5c6c9f1471c3b65da77a8d07e5b63205e2968c8a54b8926d92b43aa7264321281c97a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 16d259a287de334b5c0993db014d60bc
SHA1 8778185b1f42470e8e4e7cf54b16e671d711fef6
SHA256 4f8cde93bcb1aa465b6a0757581b2bd1723331ae16879370d334aad8d6d974df
SHA512 75f3026bf16ecd2909e718c3f2d4e918d30274aa9328c5879bf5422c86d94f06f2d75c88885078acf8187ef2b1c9bb97001b6cff5c88fbb63130efbc6953fe4f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4339c5f661704902238785c2a0b20bcf
SHA1 391afb9843c08b02dda04ba893ed452977d1c590
SHA256 d56b460233c88119266d3be5dd94c8e18c52d023375bc8e95a7d29fcd5bf4e0a
SHA512 6a58120f433d2ebcc48295f5684d0225323f9f7a5f48501ef2317371ed0cb74f1f2feb3e68b824a0e2218b34f18e057fab6e1f431029b34421dd17c151068dae

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4752099011159c5f10035b9bbc2392e2
SHA1 e47a788316d50aa7df495b4fc7f47d0cf7598a6c
SHA256 0b046caf2eb9862be01a5b6ea39fc879522dc97326e7915325df266155ad39ef
SHA512 84ea59e1d90b731f01b67bf87004ccae2ad25b121e16f3b645cd56b2b6dd45b8d74b1ac6d4ba00eb82cf47c221c642be16a1a66002a2b6ebcdbde6e0423a1bea

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-09 10:18

Reported

2024-05-09 10:20

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe"

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe N/A

Enumerates physical storage devices

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3220 wrote to memory of 4332 N/A C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe
PID 3220 wrote to memory of 4332 N/A C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe
PID 3220 wrote to memory of 4332 N/A C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe
PID 4332 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4332 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 960 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 960 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 4980 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 4980 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 4772 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 4772 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 4772 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 4772 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 4772 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 4772 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 4772 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 4772 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 4772 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 4772 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 4772 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 4772 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 4772 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 4772 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 64 wrote to memory of 4772 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe

"C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe"

C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe

"C:\Users\Admin\AppData\Local\Temp\bd51228ad6f44f57047b4cf7bd8574d5485a7e9321bef3f0cf7323d42d265451.exe" Master

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.178stu.com/my.htm

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x7c,0x108,0x7ffb611046f8,0x7ffb61104708,0x7ffb61104718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,2810275762201485114,17857805238754000989,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,2810275762201485114,17857805238754000989,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,2810275762201485114,17857805238754000989,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2810275762201485114,17857805238754000989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2810275762201485114,17857805238754000989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,2810275762201485114,17857805238754000989,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,2810275762201485114,17857805238754000989,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2810275762201485114,17857805238754000989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3920 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2810275762201485114,17857805238754000989,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4320 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2810275762201485114,17857805238754000989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2810275762201485114,17857805238754000989,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2810275762201485114,17857805238754000989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2810275762201485114,17857805238754000989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3636 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2810275762201485114,17857805238754000989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4256 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2810275762201485114,17857805238754000989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2372 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,2810275762201485114,17857805238754000989,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3568 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 info.178stu.com udp
HK 103.133.93.52:80 info.178stu.com tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 68.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 www.178stu.com udp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 www.178stu.com udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 arc.srv.lan udp
US 8.8.8.8:53 edge.msiserver.lan udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 ntp.srv.lan udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 edge.msiserver.lan udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 edge.msiserver.lan udp
US 8.8.8.8:53 10.179.89.13.in-addr.arpa udp

Files

memory/3220-0-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/3220-4-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/3220-3-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/3220-2-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/3220-1-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/3220-5-0x0000000000990000-0x0000000000991000-memory.dmp

memory/4332-6-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/4332-9-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/4332-8-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/3220-12-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/4332-10-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/4332-11-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/4332-13-0x0000000000850000-0x0000000000851000-memory.dmp

memory/4332-16-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/4332-17-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/4332-21-0x0000000000400000-0x00000000006A6000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 439b5e04ca18c7fb02cf406e6eb24167
SHA1 e0c5bb6216903934726e3570b7d63295b9d28987
SHA256 247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512 d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2

\??\pipe\LOCAL\crashpad_64_NHTSMFZDIFGATQRS

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 a8e767fd33edd97d306efb6905f93252
SHA1 a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256 c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA512 07b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\ba3215c3-7c51-420f-af03-eb708a65556d.tmp

MD5 b647e96dd9877e292eea78e301954f31
SHA1 75529b1d944dc0abf8443e567aa6c20990d02d70
SHA256 7be886d1b2d81505bca53a7be96a383986bb8fa457f6fee54a14f2a90ccf53bb
SHA512 c82fc28b3a18983ba0b7cc5366f2e44de171fe69ea822927b92da56e401262c7f1de209e9286bed16a5807be196138ed8cee417c89733cb02eb7abcbf4fc7f06

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 58a982ad62cf4a94b2fdb3b960619583
SHA1 83a3570eff9f3a62720ef515986ea591570e76c3
SHA256 850a9ba542505b92b6d8b5bdaa77eacf349bc1bba89b4fa3349e8d7c53e352fe
SHA512 92fd9f7ef22a17f6e4f41b0804a90cdd7d72547aa5c062d4e1aacd373b24dd4691af21b7298498c4ff8160fb548409166d83922076a901cbac5eb549ac7ed81e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 80688503c7048c010639f597d08a462e
SHA1 7526287dc6333637aabb0aed1657eea1d722a776
SHA256 f4969b004caff90129d5c6f7248c2e4d58b4882729fb03dc8de4dc52fcc5bafd
SHA512 1a797f6ad76a19c3ca9293e07522963dc86f392f455519d7083651fa7148c709466904e140bb80576749ad6395d386c9863b32407d42091a7e191a95b91f4e7b