Malware Analysis Report

2025-03-15 05:43

Sample ID 240509-mf7tysch2y
Target ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0
SHA256 ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0
Tags
aspackv2 discovery spyware stealer
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0

Threat Level: Likely malicious

The file ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0 was found to be: Likely malicious.

Malicious Activity Summary

aspackv2 discovery spyware stealer

Drops file in Drivers directory

ASPack v2.12-2.42

Checks computer location settings

Reads user/profile data of web browsers

Enumerates connected drives

Checks installed software on the system

Unsigned PE

Enumerates physical storage devices

Suspicious use of SendNotifyMessage

Modifies Internet Explorer settings

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SetWindowsHookEx

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-09 10:25

Signatures

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-09 10:25

Reported

2024-05-09 10:28

Platform

win7-20240508-en

Max time kernel

117s

Max time network

140s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe"

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A

Enumerates physical storage devices

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F1707C1-0DEE-11EF-A649-4E87F544447C} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000f9e1a52001e891473199c8d3cdd85df8002ac16c3b5b2df101ad4ab9d1bc5881000000000e800000000200002000000013c4ebf00a8ba923dac47e7ff42392a507a31c8b79dc5dedc412a64a3ac38405900000001b5b985641bfdb0423dbf3562678de2ebd5d1eccad3d69e6975e6b042a0cb0bb8630f3caed5cb5e5d6ded080295ac99763146ab0bf9e6a2a5f40b7f77bac42421ee79d88c05a9f6e2a6ed1cbd6790892796c134197e5e5a66776d3ff61cda24607ba992a0df766667636d37564167119f9f93cc4f661cb62022b974184d002a4932725e4ea392ee4f6f9b01e6b389af340000000a935acbcab2be25f155eada09a7b1882a5e1cfc2d4e83c8b79eeb9a067025478ee238881d68be08d15d89fcda6bff130c0e1677f63dd393830c5fe5407203d9b C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0e9ab6cfba1da01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421412213" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000003b0063891b737c9202d9ef53d4207d2bb1b5c292a05dbb0e1756d416b740876c000000000e8000000002000020000000a5c58da5bdb96e106792c5e3bc03d1877a2c6542379bd3940baca00c7ea29aba20000000cdf06490299fb7862e39b4a3e7c93ffc13f5e698d17a3afaeb4aeb773e315692400000003ae17d5703eeb6b1fe6af06133c633a179ea9116403cd236988588b3d5f3d13d782ff4d14cc51fd170e2f3b80ec9f77d0c86d724796793889a932231858ef20b C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2432 wrote to memory of 2820 N/A C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe
PID 2432 wrote to memory of 2820 N/A C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe
PID 2432 wrote to memory of 2820 N/A C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe
PID 2432 wrote to memory of 2820 N/A C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe
PID 2820 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2820 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2820 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2820 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2540 wrote to memory of 2560 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2540 wrote to memory of 2560 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2540 wrote to memory of 2560 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2540 wrote to memory of 2560 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

Processes

C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe

"C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe"

C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe

"C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe" Master

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 info.178stu.com udp
HK 103.133.93.52:80 info.178stu.com tcp
US 8.8.8.8:53 www.178stu.com udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

memory/2432-0-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2432-4-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2432-3-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2432-2-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2432-1-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2432-5-0x0000000000230000-0x0000000000231000-memory.dmp

memory/2820-6-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2820-9-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2820-11-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2432-12-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2820-10-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2820-7-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2820-13-0x0000000000230000-0x0000000000231000-memory.dmp

memory/2820-16-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2820-20-0x0000000000400000-0x00000000006A6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CabDE9.tmp

MD5 29f65ba8e88c063813cc50a4ea544e93
SHA1 05a7040d5c127e68c25d81cc51271ffb8bef3568
SHA256 1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512 e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

C:\Users\Admin\AppData\Local\Temp\TarE49.tmp

MD5 435a9ac180383f9fa094131b173a2f7b
SHA1 76944ea657a9db94f9a4bef38f88c46ed4166983
SHA256 67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA512 1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 33c2a9f5c3f68d4287b04c3c6235e849
SHA1 014f7c9c1519e8fcb6895e9194f5d50451df7650
SHA256 bf76b5e577537218572f160b1b5bff876910152e5c9bcf66f991cad8e5d06eef
SHA512 34923553789aca6cff4c5483f969dbed286300139dbdc6a20877886d541c6e946f08b0839b4f66a75ed0acc202624cb3f842c4039066d9c5b40ae52e5fee6ee2

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 366344520123248291752f932eb6d858
SHA1 859b82943bffcbea2c206237f2b9040aff24ddf4
SHA256 8941299d54b93cde3a535ae666899f73ebd6ba0767794e5a0c5473edf3704881
SHA512 3f36948d11738e228643eb20bdb56d60e788562fa11f30236100d1ba137b967a93f15e26635101b32f145581109fbf2f9bbe1a226ab13840c86e5aee700e6088

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a1035097f2edbabcb6f717dcc7f8eccf
SHA1 b8f9ec0c8b0687351faf2da8cb743c6816b24d92
SHA256 df833f0cf2e70e6c41c791edcd547aa6bd4b9532077d836439b09a0349bb6193
SHA512 f0958f320cb3e8675ed1a5cbb3c5f32fc1417dde38e105656ae8646f6d38586bf855673f28c6ed1be60a144912713ab35be3224c3ddec832a0c5235d4a6a9b79

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 56f0b3160956435ceac1b6e44bb11aed
SHA1 1303235d4169b5f06d4658b8b5da250f999130f0
SHA256 626ff527a12778e491a569a12f81251dae4c45e94f5c9c903f8739f906daac15
SHA512 ec2c63ce6e4b860f2f8822375310c922dcccce46ce15e958d1ee8902a23ffc6eea02f6e8d403a22472c2136d0de24683cb944828ccbd6c09b25c49192185fb6c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e90155649c5b0331d9225c817daa1f48
SHA1 d911f8b45bb8690a3f978eb694e23a23a4b7aa8e
SHA256 8f9976bf73f7ab6b58d3767fc11eba91d4cacaa98c2b26307d3d3c7430a97d6c
SHA512 e37317ea1bbb971ccb7d75ead688cf7b7b3ef09e682cd05128f9764757f92a313c768b4b2ff01786d49dcc18de3eea27c487a15f15627f2ccf81ba5a86bec824

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 79bab983a805e309a9dc89d8ccdd949b
SHA1 1ce72424cab5a7d465a53e7eb6ee0e536376552d
SHA256 e090ab3d6ae22cf3194c0d0378058a34228b2becbc4ddaf773dd82cb99567ad5
SHA512 6e6889afaef8c3d9f813ae4de1828739a6294224d38fb343477a89a64d1217eff126dc3755e8b40424449be3b54a4408351a0a992c82d005991032557c044ddf

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ef5a6e3166abcc3d6e877809a6f55b38
SHA1 50be8a1f2616d8259b456d6b9b736d1fd0ca0d22
SHA256 af0dfffb60f5ba789ee4de73b863d8bfd6b9feb33694676df01d591a0d057ce6
SHA512 98b978b04b60ad896a3fd097b9c6e788071eaf4826499540e773a0211b3b37dc23bbbd0579331e22cbf010470082e0064ab36e73c0105c8135f1ec0045b8a61a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 93d463782f90e0ed638453144cdd5b52
SHA1 14d42934d2f28ec7b6ab6b1de001a81fc0d6be05
SHA256 011ebbab3adbba9e057d0c6ac29979d660ed9022d95c0398c66a55b7f95a273c
SHA512 e37860225dc59697b008f4a44fae2e62ca77d68a9cb53295b458455aa20992b8967c430e1020b50605b24c52f82bb156b3cd2617469f31f751b8d4f1f8229130

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1e1f6fa393871cc34bd2cdf9f40007d9
SHA1 5bb7165f4c227d5d3a53730ee01b3daa07a022d3
SHA256 b2b2ab22bdd5d5fa6cee5c54e23ea0a632ef99757e74f25b875747d88c489b44
SHA512 3e5393fc2b019329ea49cc4f1644a6e635d85f8731a0c169455ef957ca8f1048b86910ebed60197fa5d88cb38f31bfb93b7350ef44a5c581a1bb4a1a1b9e524b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f04d39f0fb8f846ae1542276a6ef5a86
SHA1 2cb7b72a1a008b418f840a4e178f92fef5dfd59a
SHA256 c2c7d5cef6dc8f567a83c7aff866db7cfe896ed8177343d588fedafa52e8d537
SHA512 3ecbbae402c980a5f004e53a3f38ee014efde66219fdd2888bef1b3a17d16fe2df04c59de1bcf9fa42579f617d7ee8a6ad88a59c75fe355a3e4983b3af727754

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 64a4a6974c26d85733e22228843bc5fa
SHA1 fadbdb5002932df84a7bf1b7d00fcb3b199c9f33
SHA256 228426fdcf6547b82050e003c790931d42319cb4b9e3018b2950f6f067b9db2c
SHA512 8349ff587f6b7e967694d97c09e074ce40a1ea6353834241797f30072b037fe4a7a0656206126d0081caec02d14f9a32c76d655daa36e15492350d743e6f342a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f4beafd0aff1bb745a3940eb78fe62fa
SHA1 a1b845794336b57a0bbed83f140b1113340730ee
SHA256 57b2e0dd6c279ef3ea34fcfb687576b7763a470ea9ed970a7ba22378d5bb4280
SHA512 23b7502da31431ffe9cce17636c85b3869eee3ee153f0921ad76c33b091e8ccaa441fb5ed737875ad887b4b1e9515f15f806d59c097a8eec7d2a5024a43eef26

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 24da99e39d580876d183bf4f46c793ac
SHA1 7260ab05a09c4bc4d50e8a84264aa605a0aa6895
SHA256 755523815277f324f38223f3c04907209055158e9ee4c412835e76dbe8adf837
SHA512 5e29adb9a96564bb5a54288d00ecbbc373ad51af4fa4b63bba0aa98752191dc7c27428d27828d7119ef2b70cd5337362aecf25fcb5f4ac24e960fea46f7b4747

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9109f7c8cfbebf250e16aa3ede867ce6
SHA1 19d304f9c0ed14ef1c0b5cf56645264719079879
SHA256 3138ca366d498520379b25cf56565f2353c8dabc3009d8d03102ed7fafbd904b
SHA512 c96e45c43d867940b110ab80625b585df991dbf14f1ee39ad00d2d0948dcc45cb4eb72538c663c5d7fa266cc708c53182548e0f5079b836a73ca204a182d262e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e1c4c530b497002782c4222b1034c127
SHA1 31359d938f2718070e58eabcabb1b591cc52a96c
SHA256 94abbb26c66a97c94187c595fb13a903be7e0d1ea4492ab006c5ad6ddbae3893
SHA512 73155f5eb4e630673476e7bc76b27620f9ebdccabe68233b83b2d8e248983d309b0ddc5c7927d08e1ed33ceb20461594c3b9d833600d9c10a4bd5e1e027ba1f3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 fa6515400e2780ced7ff5c1b9387f7b7
SHA1 86ea5f5546319670f4f64dc8bfd43cd60ed28fa2
SHA256 42ec99a168d7e38e68726afba2c4d152f3ffd75eb09bd5b9f57a6585ca842465
SHA512 bff8269c117ba7142a8e7af8fdc123de3727347579218ba57b9c74773afbef40ed10dd2f510cc99bf1e17508047d3b3656e75fd086ce4aaeb4a4272ba62e3f74

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ec93acd1144a4c24f7e4daae8015515a
SHA1 24a05c3d0ab2e817a9913074947112d3606923d9
SHA256 74736c7c744e770c0342f5653d65e3995c33822f324cd171550bf5f2975a7bac
SHA512 59657859e033a21198ab48ec7358808dd80e80174c006476ac8ae28a07ac123f734b998be81aa5bb9129bbc002ffce4089d47ced9bc8a1c96311bf0d8179e253

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6791ba467ae3edcd5aa0ce2e000b5ca9
SHA1 7d9f02a3e7c59d14793d07780fdfec880670e523
SHA256 fbf02c8ea8921bff307360f227c25277cd623adcef68c1278ac7773385bf6f7b
SHA512 7ab163365ee14873bbcbe5e33aa5fbf62c752c1f315605b9df7ae0e96c3ebbd200a85b236e8e4ab37223af7cbf35b681949a564644e4d92fa9c6467613636e66

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 129346f342842e4f79e3d859c1bca350
SHA1 db9ceb0ba8f5f24219167a97dd421a1780f5a44d
SHA256 9fa18a3990baa8059d57c3e0374bb57f7dc129fff079395594b4599bb36079af
SHA512 cbb07edf1a0a1666a4c2f5a4fd99afbfe73745a708d72a5bd7ad99dbc7d7c3d2630a96391ed5041ff7d784345a0f6a66624bd08b818e97ff6ac4472311785035

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-09 10:25

Reported

2024-05-09 10:28

Platform

win10v2004-20240508-en

Max time kernel

140s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe"

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe N/A

Enumerates physical storage devices

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1428 wrote to memory of 2600 N/A C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe
PID 1428 wrote to memory of 2600 N/A C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe
PID 1428 wrote to memory of 2600 N/A C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe
PID 2600 wrote to memory of 1916 N/A C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2600 wrote to memory of 1916 N/A C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 3244 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 4148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 4148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 4528 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 4528 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 4528 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 4528 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 4528 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 4528 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 4528 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 4528 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 4528 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 4528 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 4528 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 4528 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 4528 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 4528 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1916 wrote to memory of 4528 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe

"C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe"

C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe

"C:\Users\Admin\AppData\Local\Temp\ecc29681c0c5dfe5a7d7bf8d4ec364fe0fc2b5c6d5e99508b0fb73ef1c5ef3c0.exe" Master

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.178stu.com/my.htm

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9050646f8,0x7ff905064708,0x7ff905064718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15865048970025658196,16390463810075064275,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,15865048970025658196,16390463810075064275,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,15865048970025658196,16390463810075064275,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15865048970025658196,16390463810075064275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15865048970025658196,16390463810075064275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15865048970025658196,16390463810075064275,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15865048970025658196,16390463810075064275,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15865048970025658196,16390463810075064275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15865048970025658196,16390463810075064275,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15865048970025658196,16390463810075064275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15865048970025658196,16390463810075064275,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15865048970025658196,16390463810075064275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15865048970025658196,16390463810075064275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3752 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15865048970025658196,16390463810075064275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15865048970025658196,16390463810075064275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15865048970025658196,16390463810075064275,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5564 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 info.178stu.com udp
HK 103.133.93.52:80 info.178stu.com tcp
US 8.8.8.8:53 www.178stu.com udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 arc.srv.lan udp
US 8.8.8.8:53 edge.msiserver.lan udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 ntp.srv.lan udp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 edge.msiserver.lan udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
HK 103.133.93.52:80 www.178stu.com tcp

Files

memory/1428-1-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/1428-0-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/1428-4-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/1428-2-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/1428-3-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/1428-5-0x0000000002340000-0x0000000002341000-memory.dmp

memory/2600-6-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2600-7-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2600-10-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/1428-12-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2600-11-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2600-9-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2600-13-0x0000000002240000-0x0000000002241000-memory.dmp

memory/2600-16-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2600-20-0x0000000000400000-0x00000000006A6000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 4158365912175436289496136e7912c2
SHA1 813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256 354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA512 74b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b

\??\pipe\LOCAL\crashpad_1916_ETUXAOCFIFGSUYVF

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 ce4c898f8fc7601e2fbc252fdadb5115
SHA1 01bf06badc5da353e539c7c07527d30dccc55a91
SHA256 bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA512 80fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 5e9325b2db13418dfe6c6970f2cc1321
SHA1 2fbcb8a08faeb7f1a624af489caccc91d468d21a
SHA256 178eda4d8da5bd3c0133a57caee87cfc97a24976a5acca434dcfa27de8694a56
SHA512 22d44d4afcc845e607032b0c954fc30e50dfa4eee1ac12466e54d14194b2e12b95cae7a23318de8872b06f845ce568b4fbfd65e45d7500ddb8aa6766dbf5424a

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 5463fc93d889132457f1f1b7781bb4ce
SHA1 9cd1059dd56b2d1c98421a643304e207074c530b
SHA256 7e356699106d848c2bd1b65a6a5891b418766fb8b549e03e4e9422f7a1b67db4
SHA512 b6436a7e4bebbf07240bd1b53e4926983faf9348439b2a97dbcffccbac503b3e3f42f6f75ba27de515d6a955e08214cd0ffe0a375f36de383f02380b73fcf57a

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 8d736e5729304f61f68e0a9c0d63f5f1
SHA1 7c7d888fb79a018053bdb493017d3f518b9a05cd
SHA256 e7c81ee55a3d213be2febcf48a20d14c6128e49212cdbe7c2e821b0ad724b8e8
SHA512 22ae1e82ac68d12e10de35f5eca0a95fe836c4d5a327fad6368e0d49c9c77230e9e113d3645b6e2393b232033c5dd9b1fa4f7388506abe7fe2effcd8c38825f0