Malware Analysis Report

2024-09-23 03:49

Sample ID 240528-2pn6jagg35
Target 40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f
SHA256 40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f
Tags
metasploit backdoor discovery spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f

Threat Level: Known bad

The file 40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f was found to be: Known bad.

Malicious Activity Summary

metasploit backdoor discovery spyware stealer trojan

MetaSploit

Drops file in Drivers directory

Reads user/profile data of web browsers

Checks computer location settings

Checks installed software on the system

Enumerates connected drives

Unsigned PE

Enumerates physical storage devices

Modifies Internet Explorer settings

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Suspicious use of SendNotifyMessage

Suspicious use of SetWindowsHookEx

Suspicious use of FindShellTrayWindow

Suspicious use of AdjustPrivilegeToken

Enumerates system info in registry

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-28 22:45

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-28 22:45

Reported

2024-05-28 22:48

Platform

win7-20240221-en

Max time kernel

119s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe"

Signatures

MetaSploit

trojan backdoor metasploit

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A

Enumerates physical storage devices

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423098235" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd895a92517649448c312dbfcbfa056c00000000020000000000106600000001000020000000637dc555260a4c1cba19b010de8d22005ddf46b4baac9999391af19560af964b000000000e8000000002000020000000802f3278f7074a5d5cbbdf973524cc128cc4550941395b29f4fac6ce52c1702820000000217ac9fd0778574f7b97a22423ac71a1389671f4542c913629c54d6a2ec32b5640000000c6311e446088b1caf25e46fefedd2795ebe12692369976a5cb170c3630927ddd7f7100e825f42621c5cc69a4c56310ff286758ecd630555d9ac539402a410849 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d031a60051b1da01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{128E6C01-1D44-11EF-8706-CEEE273A2359} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2168 wrote to memory of 2084 N/A C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe
PID 2168 wrote to memory of 2084 N/A C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe
PID 2168 wrote to memory of 2084 N/A C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe
PID 2168 wrote to memory of 2084 N/A C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe
PID 2084 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2084 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2084 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2084 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2712 wrote to memory of 2396 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2712 wrote to memory of 2396 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2712 wrote to memory of 2396 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2712 wrote to memory of 2396 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

Processes

C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe

"C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe"

C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe

"C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe" Admin

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
CN 1.15.12.73:4567 tcp
CN 1.15.12.73:4567 tcp
US 8.8.8.8:53 info.178stu.com udp
HK 103.133.93.52:80 info.178stu.com tcp
US 8.8.8.8:53 www.178stu.com udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

memory/2084-6-0x0000000000230000-0x0000000000231000-memory.dmp

memory/2168-4-0x0000000000400000-0x00000000005E5000-memory.dmp

memory/2168-2-0x0000000000270000-0x0000000000271000-memory.dmp

memory/2168-0-0x0000000000260000-0x0000000000261000-memory.dmp

memory/2168-1-0x0000000000260000-0x0000000000261000-memory.dmp

memory/2084-9-0x0000000000400000-0x00000000005E5000-memory.dmp

memory/2084-10-0x0000000000400000-0x00000000005E5000-memory.dmp

memory/2084-12-0x0000000000400000-0x00000000005E5000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Cab9CCE.tmp

MD5 ac05d27423a85adc1622c714f2cb6184
SHA1 b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256 c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA512 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

C:\Users\Admin\AppData\Local\Temp\Cab9D8C.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5e2bee66b76fb2c1cdaecbb6fb47382d
SHA1 35ee1a779711298748508064f71b461c43745d1b
SHA256 aac0f8c085604a328f5d328860a1b965e1ad1628afc4c21642466c3c27ce57d9
SHA512 00be4c0410201f90305ceb67999ec7c5a31a63806bdfdd02088e14a80da93f4a85713f71ffe2f36c2afc4335bbf51f74162b6d87c86870019862ebd1e46ec6f7

C:\Users\Admin\AppData\Local\Temp\Tar9E2D.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 805a65eb73453552d5b671bb0cb3091e
SHA1 50622477b2ae360ba8f276f88820cb1763110af7
SHA256 e767bc2d85e1befe183ec51f3a9b7b328974d859fb37c6de8ab11008d6d383de
SHA512 f91eddadae789ae8cd4756d4b194a48a599563ddff5d7f195e5176757ee291946249e1af55b7bf3d41b6f5a9071c0068b6d311981e6d3e016c19eaacf1653290

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f6dfa8aacd335bcd23d544d403fa3ee1
SHA1 3104b56a75ad6a7f6e9ecad1d75c1bf0f5204164
SHA256 7df2bff6efde6c84f6d9062fef78d372996c8e70b395701453bdd7625059db44
SHA512 4b66f327ba55ec6c8519d3b525a29638aad0a72914ec942b6bec19666d84cf8a82777ea7d037afd68ff51a15e88b0ec538d1d60c8f4a896493144f90d3ac902a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 dd07aadeaed8e840316c23b454f4913c
SHA1 1eaec461eb0c2befe76d049d8fc968d622d0c285
SHA256 7f386e854d98218fc91e03eb77ea1c7639f0b2a7e22eb3b5c213e6de3e5e4615
SHA512 eedee53c10cb0b5bdb2b9c91ac1238244689926f4d7fee7ed8c6a1290034d049109d63b1913ad34d3657b2bfd12a35bf1dc0b88080b0cfed333f21e0c9a01e7f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 98d4a15ca9b89f03f43ec0a2a5592474
SHA1 8dada216dc7abaf30f236c32ccd4adf695e607ec
SHA256 54753cf1084670fab719b8b022bbb94acd8f7e7e1d3d9af61b4b317e6456cc99
SHA512 9bc8604a3fb7f3e7341ff5665a65d5fbe0db341a163f5268648ff4e09f59769e63e00bd04d0f2c57aa652f444ad2f48e839e2aa4e920c32c458d9b2e6ac03e09

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 cf64afbe6a9ad658af9cdc86f7a9a164
SHA1 9b3f51e76b63f0f7c034c92d925d6a594344599a
SHA256 0d9be72e3a221bbf3d8e4ec6f182bbb2219870a069e1ae57e793629373afd882
SHA512 041b5b422dab94ceb3747dc8b46b901d5dd547ad8bd8c8406abf1fa3e8905bfb8047886fd311e7363605cca73e91cba48ad5f82f64af03d2c70aeb7774e3caa8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3a31963bd36c2ae0ce10b6b85f9117a9
SHA1 ff5ae63282d7c4ecec8db6727c27c810b786bcd7
SHA256 edf71ae85f10de42ac977c91aa008b819f601f07cefcd462cecda7bd205300c2
SHA512 ae72c136988b80c66d2aea91d087ab022d77e4281cb17137f7be60a3199776a9d38e20d54f9c8ecdb3ae099b8333ce8035a7c406857bc3f74662f709a0869ce0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1c338e66d06fe6bba12af1dc6d6741ec
SHA1 03a5eeffaf98c1c73e2a64c96caa0dbebdef1cb6
SHA256 f916440c872d4f9b629108f3686243c24d1edd01e2132a77d94f32d19f75fa07
SHA512 1cd170e108d24412d1aaffbb63655fef3d8282b1a77c2699842ca99b50f0b8d8e98774203c99fcdf1dd078cf95d85022ebb7f85ea40f7b2848df63102cd21dcd

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 15dca4924a49b7916209ab0326b516e8
SHA1 dcf92b5eb3e9ab86b1b9a46404e70ea66ba9abdb
SHA256 876fe424cea26ed135e88534e6de2e73c6bfc2a5f8c9688789765011ca67b946
SHA512 ef287051617f794d6daeb24bb63bdd58929ae9ee7813bdbf168cbf83e41ea35c9a563dabd30e029720fecc0adc471c4df12ab2249de921059c07066ea8c203e4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b8744fbe63acd499128e35c2141f8bed
SHA1 35bf48efd3aa667c34c814085deaf7ba081ca352
SHA256 d924a9d30ff23be505cc6425269de1a6bf47a3dcba82d12c0155fb5ed39f273f
SHA512 e2fd55f3e7a97a1459bb47bc644e2ca3f87d9457feab47b710a1dfda5a1ca2cce291e344c03eefab360821ed8d222b7fd590a2f61fa7f25fa15fd499d97157cb

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 832f86e021caf79ef5253531f93a4a5c
SHA1 f99ee84c6fbe64889a19844fe4daf44fa99b430a
SHA256 00de663389176d85f554a60f56d56eaf8e22b0d7b423e0cfaa191ee69ad3b2fd
SHA512 6dcb934909b6d40e2f7db121afa4ded321d2df69ba273a1b981ef6c5eb56ea31415eddc723827960ce20936bc593fbd2d9c3ab41e56cf58b9b646fd5828c46c8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ef1ff0cee8820d206e12179bd6b28b38
SHA1 ffd4df9424baadd6b7a17e4db9d3bb43d9f65131
SHA256 3033d2f37487551d64611685675e0a444685e2b495b2d6c35f35df1ef953f92c
SHA512 8cb48cc0131f6cb17558da167d610ba63ab04400b96c5559d62deaa17366355e395633704a0ce73d128fd07496122a1c2746aee31f2aa5bd39ff2204acfbcd73

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 131b9ce87cc8f9b0966b627708d42433
SHA1 4e797be6acf2413d943d7522773e25974ec29487
SHA256 32f6e878e74e11cee80cac043258ca3ea2a172b188a7e74a1b792c2e7965585c
SHA512 5f3be5836f41229e1cfe7a0ddc53a5c38f4484ac42cf6e77da8d14c81af361a85642c1be9968b71d7c6e95586f1f705915b45ded11704cba58ef5a8e0b777f09

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 905964f7682d12b77ec810e751e0c652
SHA1 f63521fd8d4a9cc38b1c832df0d64575aaea5190
SHA256 e777ad1194749741e97de85ff1dc5dd29bf42590b840ed3e0c4d72f184362403
SHA512 d8e726294d7e6745bcb900548d83a5e912e8ec8860a07358742d32e5e7671158f3a70b7ac633f303c55a58fc6e0aaa0177a3a3f1d2d972cec30dd0925d870ff7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a1ef47065587757498f0bd896f79be66
SHA1 dad41c13b36ed7fd245094e803ecf9ca2b87c13b
SHA256 d4d8cd0e7b9a8050eaa43299e2b763fb6b4eed6094c203a3c4b702cc9d631cc3
SHA512 6fda890037e88682946420cb0fffee3e1fde795e4c7296b2261dfb7f27318df543f5e37491a792de6dab4130622ee23b610629f4c99840ce3f3aa7e8e818256d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5bfdca0ed08ff592b1d03245e099cff8
SHA1 07531d32612e6a7d380fdfc97dd6feced4f80566
SHA256 86c141cf206173a6c427feec223faae98ea88114e8e81e3495e0913136acc341
SHA512 d04a52fbf79fddd406cafb1ec1c8100be1fa9ffd9cc96da77938b219c3c8805636c5cc885598d06363ce05eb5ecba8047c1de084f99f2bace99748dfdd8de996

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c6f3f9ebb6bc5a176c3ecb29b510139b
SHA1 8ad96760fc2f1a271b38971ba20eab4db45233d2
SHA256 3a8094de896a9167155555891a6bf20c0d6fd27f7a9038fb65e3cb7a81133657
SHA512 edf1bb021b6c4350d7cc6427766657422471d9166c1efd7087e71c2f51542bf46801bf2a31e2b61e70c626f7db970dda7dcffb82f8a0ded5d36485c0159fe518

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 dc0ad0dd32276d8fbb5bc020185577da
SHA1 69ee4dab2595263ec1c6b45081b5b7ca5ef7eff1
SHA256 f90bf51ceebb7f821f4dcb5603dc3dfa65b1e8f96ee5f7c87b5e1f131ff770d5
SHA512 4a8e29a6d12d4f242def01541ec1284ab3a02cb68555cd1cac32f70e2a20b1a81ccd50a776026f401cdc1cb331ce38fc2009cddb6172f654dba14b1d588fff14

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 bd45d63d82c62985fe4a6a7860f3e87c
SHA1 39064e042ffe23e620edb5ca1b31af3b4e66872f
SHA256 439f6e55f9343f27eb4ea2427bfbe21a51bca20dbd0430ddee778a04283ff1d1
SHA512 579a41990569905b87227412939f4408a28a0ae9d411717677bc4b6a5a5ebfe33172ba95502b6dc1ada7aa19bb7c0d718e1ff0aef97da520e30e8a836f46b919

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a4f768f8295109f3effc2fb0006d248f
SHA1 bddc0e353c27d1f79c68c14834825d2635e173a5
SHA256 d5a0509a99b999ea7429787b1cca6527d8af5af8094f6c64cd007117f7aeb7ca
SHA512 25e4fcb0af39b9aba3233b2aaeeb7759b76a2a1726b09fe9ebea0cc21cc01cd3756e2913c3b134273204e555a9ade06726a69adde6dd8a6f20f1983ae81bac24

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-28 22:45

Reported

2024-05-28 22:48

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe"

Signatures

MetaSploit

trojan backdoor metasploit

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe N/A

Enumerates physical storage devices

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4400 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe
PID 4400 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe
PID 4400 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe
PID 2576 wrote to memory of 4392 N/A C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2576 wrote to memory of 4392 N/A C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 1740 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 1740 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 2416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 4852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 4852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 4748 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 4748 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 4748 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 4748 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 4748 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 4748 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 4748 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 4748 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 4748 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 4748 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 4748 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 4748 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 4748 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 4748 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4392 wrote to memory of 4748 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe

"C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe"

C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe

"C:\Users\Admin\AppData\Local\Temp\40651e3f874b6ae3a26dfaa48dcc364b9233768c2520829e9e5932b6a5396d7f.exe" Admin

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.178stu.com/my.htm

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa70ac46f8,0x7ffa70ac4708,0x7ffa70ac4718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,15248421240671457593,13017756346042671157,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,15248421240671457593,13017756346042671157,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,15248421240671457593,13017756346042671157,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2612 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15248421240671457593,13017756346042671157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15248421240671457593,13017756346042671157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,15248421240671457593,13017756346042671157,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,15248421240671457593,13017756346042671157,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15248421240671457593,13017756346042671157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15248421240671457593,13017756346042671157,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15248421240671457593,13017756346042671157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15248421240671457593,13017756346042671157,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15248421240671457593,13017756346042671157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15248421240671457593,13017756346042671157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15248421240671457593,13017756346042671157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15248421240671457593,13017756346042671157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,15248421240671457593,13017756346042671157,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5960 /prefetch:2

Network

Country Destination Domain Proto
CN 1.15.12.73:4567 tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
CN 1.15.12.73:4567 tcp
US 8.8.8.8:53 info.178stu.com udp
HK 103.133.93.52:80 info.178stu.com tcp
US 8.8.8.8:53 242.137.73.23.in-addr.arpa udp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 www.178stu.com udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 arc.srv.lan udp
US 8.8.8.8:53 edge.msiserver.lan udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 ntp.srv.lan udp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 91.90.14.23.in-addr.arpa udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 edge.msiserver.lan udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
HK 103.133.93.52:80 www.178stu.com tcp

Files

memory/4400-0-0x0000000000950000-0x0000000000951000-memory.dmp

memory/4400-1-0x0000000000950000-0x0000000000951000-memory.dmp

memory/4400-2-0x00000000022D0000-0x00000000022D1000-memory.dmp

memory/4400-4-0x0000000000400000-0x00000000005E5000-memory.dmp

memory/2576-6-0x0000000002500000-0x0000000002501000-memory.dmp

memory/2576-9-0x0000000000400000-0x00000000005E5000-memory.dmp

memory/2576-11-0x0000000000400000-0x00000000005E5000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 eaa3db555ab5bc0cb364826204aad3f0
SHA1 a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256 ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512 e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4

C:\Windows\system32\drivers\etc\hosts

MD5 03450e8ddb20859f242195450c19b8f1
SHA1 9698f8caf67c8853e14c8bf4933949f458c3044a
SHA256 1bdd8f1dd7bd82b5b2313d8770dfe4f41cd3f45bbaeab8b8a7f75fc5e2d3720b
SHA512 87371e57bf2296af5ec7f5db772a4ce66729d54aa23a8b384e3f4c42310b97b636576c7dff67c27a3b679339cdeee05b836563ae2a878f0367caf247b3e1ba7b

\??\pipe\LOCAL\crashpad_4392_RRDAWEWYRWZOEBRE

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 4b4f91fa1b362ba5341ecb2836438dea
SHA1 9561f5aabed742404d455da735259a2c6781fa07
SHA256 d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512 fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 c764e6e54f13470545f4257cd0da9b35
SHA1 af4b80f14cbda9fc0aaacbb5ed046edb8ad8ba96
SHA256 cd26e465bb32f31c03b0f71ff89a9cc0f6e153c5c734f8290b463af0a9529d90
SHA512 58fe33bd64ef1822ee0a0d61b6b0ca3e103095c13130e246745ae4db3102694a5fb1136c2fe35280afa38b85bda36b3a2272799fdab5581b8e0b8f91556884ea

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 2a7c2e0d472b4c6cc6ff087af05b1797
SHA1 a04c2ecd0c4dc27381fc6c883e9edddcc052a01b
SHA256 7fb324a0087f5d097f63a8d68806220b43b64305b971966105d6ba9252cc1a93
SHA512 eedcf83405e959bc342eb8b0707e95e86c600432bb86ff662904f55e3a50d3f80b87f3d092b079a5fb13ee79fc329db943ecd97543b8cd59c8856c5591470617

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 645db35b2ed96e36a2f9e6aa630a59f6
SHA1 843166ff7b2419c0e30379a8e872aec584a3dc69
SHA256 d15f261eb8aaf1c37368430413bae0c4954a2e38e0ead4399a84bfd9d07d802b
SHA512 bbb0255f20fe86218ef2c33bab60032e83105bfe2d4db6eada1e46423251fcede8b46de0b92e8b6b842e22d789d3545c9305b3891585fd2d6400f929f8fdc187