Malware Analysis Report

2025-03-15 05:45

Sample ID 240510-16ah2acg2s
Target c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee
SHA256 c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee
Tags
discovery spyware stealer aspackv2
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee

Threat Level: Likely malicious

The file c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee was found to be: Likely malicious.

Malicious Activity Summary

discovery spyware stealer aspackv2

Drops file in Drivers directory

ASPack v2.12-2.42

Reads user/profile data of web browsers

Checks computer location settings

Enumerates connected drives

Checks installed software on the system

Enumerates physical storage devices

Unsigned PE

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Modifies Internet Explorer settings

Suspicious use of SetWindowsHookEx

Suspicious use of SendNotifyMessage

Suspicious behavior: EnumeratesProcesses

Enumerates system info in registry

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-10 22:15

Signatures

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-10 22:15

Reported

2024-05-10 22:17

Platform

win10v2004-20240426-en

Max time kernel

148s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe"

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A

Enumerates physical storage devices

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3812 wrote to memory of 1408 N/A C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe
PID 3812 wrote to memory of 1408 N/A C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe
PID 3812 wrote to memory of 1408 N/A C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe
PID 1408 wrote to memory of 4660 N/A C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1408 wrote to memory of 4660 N/A C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 4992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 4992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4660 wrote to memory of 2560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe

"C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe"

C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe

"C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe" Master

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.178stu.com/my.htm

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc01ed46f8,0x7ffc01ed4708,0x7ffc01ed4718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,4577877606593581576,16359249063264190169,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,4577877606593581576,16359249063264190169,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,4577877606593581576,16359249063264190169,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4577877606593581576,16359249063264190169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4577877606593581576,16359249063264190169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3148 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,4577877606593581576,16359249063264190169,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4196 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,4577877606593581576,16359249063264190169,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4196 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4577877606593581576,16359249063264190169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4577877606593581576,16359249063264190169,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4577877606593581576,16359249063264190169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4577877606593581576,16359249063264190169,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4577877606593581576,16359249063264190169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4577877606593581576,16359249063264190169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4577877606593581576,16359249063264190169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4577877606593581576,16359249063264190169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3676 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,4577877606593581576,16359249063264190169,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5868 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 info.178stu.com udp
HK 103.133.93.52:80 info.178stu.com tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
NL 23.62.61.155:443 www.bing.com tcp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 www.178stu.com udp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 155.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 www.178stu.com udp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 arc.srv.lan udp
US 8.8.8.8:53 edge.msiserver.lan udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 ntp.srv.lan udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
NL 23.62.61.106:443 www.bing.com tcp
US 8.8.8.8:53 106.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
NL 23.62.61.162:443 www.bing.com tcp
US 8.8.8.8:53 162.61.62.23.in-addr.arpa udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 edge.msiserver.lan udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
HK 103.133.93.52:80 www.178stu.com tcp

Files

memory/3812-1-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/3812-3-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/3812-4-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/3812-2-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/3812-0-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/3812-5-0x0000000002340000-0x0000000002341000-memory.dmp

memory/1408-8-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/1408-10-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/1408-9-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/1408-7-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/1408-6-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/1408-13-0x00000000009C0000-0x00000000009C1000-memory.dmp

memory/3812-12-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/1408-16-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/1408-17-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/1408-21-0x0000000000400000-0x00000000006A6000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 ecdc2754d7d2ae862272153aa9b9ca6e
SHA1 c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256 a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512 cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2

\??\pipe\LOCAL\crashpad_4660_JOXNSWTQHTWPWAAY

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 2daa93382bba07cbc40af372d30ec576
SHA1 c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA256 1826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA512 65635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 b30b3a1dbedd7b3d6baa0e59ec3f6221
SHA1 e731dcae1feb4c6386c90ed458e6a31f4491d1f8
SHA256 212414159121122a3a9d6311a8a4cf45ed5542e3d0a4abb311f3e1466f001149
SHA512 a7eb4586a74b06324c4b6e75feb60cd962f56df63501e12a685817a8699e1b5d08548d9bd5b4e155e91c9caa602a35dab845047038319ae99190781c7ad9a0c5

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 3be402df98d10ec6fedf5bf37fccbe1f
SHA1 1551859d83de685b5a2ef2443dd7698bb4181083
SHA256 62c532b93f43ae6cefd9b13b86b76bb7ad8e8b8f71cd048010fbde03b62718fa
SHA512 b96df5b31f903f7da39ae11e098446021c9054ad2ad9aabf56e9e9709a6a5ee6ffcc92d258da989463a5166113fbaef0db06a01935f9918870948a46dc35df6d

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 fcb4307a34273ecfa38a36c5f0f2e9ca
SHA1 d783480df58a0a205e904e7ad9ea03ce32972b5a
SHA256 44ddb18947857de45d9646cc81954693d7cc25ec420dde6e69fdf952eaff3a4f
SHA512 1c2e86d9043f36dac9cc492c65962c37851f9ea0b341995c378394d7f51d62033af6612324e3966229f4f783bc50a76829733bc4fbed05f72b4c4bdc6948134f

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-10 22:15

Reported

2024-05-10 22:17

Platform

win7-20231129-en

Max time kernel

121s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe"

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe N/A

Enumerates physical storage devices

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045114284b18f3c409460b41351ec43d700000000020000000000106600000001000020000000d90f683a6aa3fa241093704d5b0df22fe3f87acde906f5c07ad34450717a6b08000000000e8000000002000020000000961dccbf47e23c5d96d18092db6fbce0f3743d1d7d139abb8ff751300c4c702320000000e5babf2b92e410faa4a245cd176835091ff0a4958f14629240f6ce5d0ea2a0ee40000000b6f6a64dc3106edfaf99adebf21c69063eee89569c3e2b52159cf10828ebbe3aea3eafad44cf7e315e9fafb045acb97f09d91865e9112461d5b9777eba6aa9b5 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045114284b18f3c409460b41351ec43d700000000020000000000106600000001000020000000748d2821c58b0e09319740c3deb5a030b5264d5354aa2618302bf1559e9a8507000000000e8000000002000020000000c2d41394efd1ad7203a2a809a7c0efde56d686681591d82d7e5af2311fe7122a9000000075aabd573062e376fc4a79321ebb3c092784dddd398980f7b7e4d8adb6163a56b9c5b98f092582807dbbb36a4cb3ec5e6e49408cb7d3293b04af780869bef54369413e80b5b7612cb0eca397e6b5497fb3099cbf3f13cf51898286bb567c6d29a3c12fdfbbf8e577e3635c693f03365ba2f8363489bf1becfb97a305c46f29598b9d31fa06d3f6d48c80da8d70bc9bf34000000018a7b6d629dfd95a00536f9991787b71b6ccbcc6b48d2007f72d485243a9578b17b4d592ff181b4a393e3e7984ffef0798dcbd861f3f8069ac899fdba92bca75 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421541200" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CE536951-0F1A-11EF-BDEB-D6E40795ECBF} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 506c21bc27a3da01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2168 wrote to memory of 2364 N/A C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe
PID 2168 wrote to memory of 2364 N/A C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe
PID 2168 wrote to memory of 2364 N/A C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe
PID 2168 wrote to memory of 2364 N/A C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe
PID 2364 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2364 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2364 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2364 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2640 wrote to memory of 2456 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2640 wrote to memory of 2456 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2640 wrote to memory of 2456 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2640 wrote to memory of 2456 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

Processes

C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe

"C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe"

C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe

"C:\Users\Admin\AppData\Local\Temp\c0875aa970dd743eedfe8e1cc8335cc7ddd8136056da9280ba3b2a266e6d59ee.exe" Master

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2640 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 info.178stu.com udp
HK 103.133.93.52:80 info.178stu.com tcp
US 8.8.8.8:53 www.178stu.com udp
US 8.8.8.8:53 www.178stu.com udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 www.microsoft.com udp
NL 23.62.61.139:80 www.bing.com tcp
NL 23.62.61.139:80 www.bing.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

memory/2168-0-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2168-1-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2168-2-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2168-3-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2168-4-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2168-5-0x0000000000220000-0x0000000000221000-memory.dmp

memory/2168-6-0x0000000003700000-0x00000000039A6000-memory.dmp

memory/2364-10-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2364-8-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2364-11-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2168-13-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2364-9-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2364-7-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2364-14-0x00000000001B0000-0x00000000001B1000-memory.dmp

memory/2364-17-0x0000000000400000-0x00000000006A6000-memory.dmp

memory/2364-21-0x0000000000400000-0x00000000006A6000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

MD5 29f65ba8e88c063813cc50a4ea544e93
SHA1 05a7040d5c127e68c25d81cc51271ffb8bef3568
SHA256 1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512 e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

C:\Users\Admin\AppData\Local\Temp\Tar7F3.tmp

MD5 435a9ac180383f9fa094131b173a2f7b
SHA1 76944ea657a9db94f9a4bef38f88c46ed4166983
SHA256 67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA512 1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 be364fcc310d464cf8e08d5bd1857826
SHA1 78c8329d421bd9cbe0d57f51a5f3551e6df8be92
SHA256 6c61e1927a039897214b6d348e3eaf4e06b5a786b80c5dfb5204aba737a127fd
SHA512 6eaa2979d2bf823405ebf3fc2f537d7fe9cc9e6a28e2223db6c80e7645f1c1e5b3200ee9b9b8335daf9280ec7e9d8579dd7a3823cea348894b140c042e82d4d5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 122e5d586b88609f6d7dc7b6f1d6854e
SHA1 ca9f3cd4ca93a40496e8772e0227169cfc2a6955
SHA256 269caf6dbc6b915a2000c3931bdea5e7775456fadb09e89c68c2ed5b2b45c986
SHA512 7739230a78c74731eac0384369922843e3df461b627bc404fef45c3cfaf6eefd37b49a3bf46c1948fd2e27a16b13a6d604f75e60629597d92b318ea416d9b96d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 6f783e7ea25984ed85d5688c9c18217d
SHA1 43b164c27e3daa6cc31b0fba3a1c4cb4da433360
SHA256 5768d6a610b7e97e445f02816373832c4e77f9dd0c3cd82616e89e07200dc0cf
SHA512 f5b5d7a8ec91429ec289be0dfb289b0a9462411100403f2e3301d5d92694215182876868aa129fca49e49e76d251de9ba7b3acfe65a8681e842dc4c9c203047b

C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

MD5 da597791be3b6e732f0bc8b20e38ee62
SHA1 1125c45d285c360542027d7554a5c442288974de
SHA256 5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512 d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b2fd439135b55f2a8dfb62cf9488ae6f
SHA1 0c6e0a3518294a27bace5defd3bb23bdc5f0c11b
SHA256 b3770916ce29389d0725d2dbf68667966c478fe2dde80cc25ad4caabb911db99
SHA512 afc2861cd037d6ddee355f6abd5c30c31645cf4571637a6ee57d39cb6b129c8779b09550674973c56878901a51c44ac9d7b81deeaaecf0c3a556d5372348645b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f4a8586590a1bcb8e71485c202bff9e5
SHA1 c1044370387b6c0339827ca0fd4c91bc682d3a44
SHA256 d463cd05b8424f78a1c3517442588199eda39e381041247671415705a073f319
SHA512 85b601c33ea1d4bb92402e152e5eb24582b68b1fee066e9fa4d53d8de4445970133d39ed24c3facafd14a73271bbfc3196e56bab65d06760c0c3de88b8507d0c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f3c2d8585cc08c5af746fb78e01fb909
SHA1 0763e49862348bd62338b96ee03f0c949a42e9be
SHA256 b9a85b29cc9232afd953b411ade56ff2b847b4ffa144c70ca44405883a2077f9
SHA512 4eca6a0ae53b7e926b050232aaf6144154907f0bdd78b30b0ee25a159565e8e244e3c2023242a31b348edf34a6a64ee58c75b60d0916c9f37ff2dfb9a2e4d391

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5873aa367a300dbabaf1bc42cc723cda
SHA1 016f39dfff151773470ad3717ea77c14ea968c67
SHA256 6150e276475d9bda56003b100d22bbe3b7a3fc324f4d7998213817beb181a5ad
SHA512 d083eba3f2b514d705d17afa85f3dc7a635c40fc5b0891a5502cf2d8cbf0e677d2035bc5618959cb7c222a2b6a526329e36662b48e84c4f80c14bed7d6f5ca1e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 12a0df0c46b79f6f80a8aaf8b0b399b9
SHA1 888b41e3539706ccbdaee1222f1198322ba231f3
SHA256 dae2a760259f4283996748b8ee9612fa3fd4559eb8e6f167a0bb0414d1979ff1
SHA512 80c3c6ed2f1ad34dd2a0c045a8844c489a0aa298784325ca92f5b43f1ce843a8abad410768541313a39870f2225ce3766c0802e721cb51d1988a4f6275dc4903

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e7797c4d896aaf1e897837470f801832
SHA1 23870f256537ff3e96794a54fd1e8e5fd7ae1e26
SHA256 97c4bf1e0c9290392262e77cae870a9fc244b2183016e71e1c408dcdce8fe7a7
SHA512 7410d1491d2f2f0d3e6a819241915b8e21bf9aa84592290c2df40a87cb3cea1ab68c7f6b96249bfa2082a7c838c80d51cc3b1ce1f00609e8fcca35b35f9c9e97