Malware Analysis Report

2024-11-30 06:13

Sample ID 240612-qwqgdswhrg
Target 7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6
SHA256 7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6
Tags
discovery spyware stealer
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6

Threat Level: Likely malicious

The file 7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6 was found to be: Likely malicious.

Malicious Activity Summary

discovery spyware stealer

Drops file in Drivers directory

Checks computer location settings

Reads user/profile data of web browsers

Checks installed software on the system

Enumerates connected drives

Enumerates physical storage devices

Unsigned PE

Modifies Internet Explorer settings

Suspicious use of AdjustPrivilegeToken

Enumerates system info in registry

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious behavior: EnumeratesProcesses

Suspicious use of SendNotifyMessage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-12 13:36

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-12 13:36

Reported

2024-06-12 13:39

Platform

win7-20240508-en

Max time kernel

120s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe"

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A

Enumerates physical storage devices

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424361322" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10e1fbc4cdbcda01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000c914ed076ccb4fd8a075000bb1a51ce3f3e076ee6096628834ec81c8e8435f2a000000000e800000000200002000000034b0f84e2568261906d4df37e1183c627315efdd483e9fe0fb4eb142011c5661900000004698198c52db11cb83bbadae6be6dd9ff655f6a10da84744c99a35cab64dc70cbb8d738b16c859b4b45b7b45b84feb36e72c60226db08d9c794000594c0b6a5356596dea25d686a6db191a7e0cba735fb084df16dc0b9a3fbd417e07b4fb100bdf7adbe9a39f30ba734426814fbd89ddfa6bfa6399d3f01fca5d66a8e0f3d80f5920d7515a84d9799573daece3a4b07f400000003f45568e2b28e4ff7e31bf761814e74aee16a2f879bdbde77147ff60b1a37edea21c96212e5e7ce7ca828fd1d96f8c68f7319df71cfa9d4ccffca61ccd58f9a8 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF5A4651-28C0-11EF-BA8B-4EB079F7C2BA} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000bce5517f10a1ae44023b2308f382f8f652ffca3ef368c7c1b3eb3de5f2a3da62000000000e80000000020000200000007e1d5993245503bcce7d34612519e1e1d25f44010ea83705e9ac79efce2c70d720000000f971c8e455370f95e8f0b604c5a72bf3d8b358d99d3352d1ff67a0cd051ce197400000005a992bc5992246563e862b6bfd1403d41351902dadadef4a6ac31a7591991831d89314c9d6be2bdc8fdbb20c7ab1aeff37ea9ffbce2ddd2ff02f55f5c3f47393 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2236 wrote to memory of 2092 N/A C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe
PID 2236 wrote to memory of 2092 N/A C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe
PID 2236 wrote to memory of 2092 N/A C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe
PID 2236 wrote to memory of 2092 N/A C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe
PID 2092 wrote to memory of 3028 N/A C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2092 wrote to memory of 3028 N/A C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2092 wrote to memory of 3028 N/A C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2092 wrote to memory of 3028 N/A C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 3028 wrote to memory of 1724 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 3028 wrote to memory of 1724 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 3028 wrote to memory of 1724 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 3028 wrote to memory of 1724 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

Processes

C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe

"C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe"

C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe

"C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe" Master

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 info.178stu.com udp
US 8.8.8.8:53 www.178stu.com udp
US 8.8.8.8:53 www.178stu.com udp
US 8.8.8.8:53 www.178stu.com udp

Files

memory/2236-0-0x0000000000220000-0x0000000000221000-memory.dmp

memory/2092-2-0x0000000000220000-0x0000000000221000-memory.dmp

memory/2236-1-0x0000000000400000-0x000000000069F000-memory.dmp

memory/2092-5-0x0000000000400000-0x000000000069F000-memory.dmp

memory/2092-8-0x0000000000400000-0x000000000069F000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-12 13:36

Reported

2024-06-12 13:39

Platform

win10v2004-20240611-en

Max time kernel

141s

Max time network

145s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe"

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe N/A

Enumerates physical storage devices

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2152 wrote to memory of 224 N/A C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe
PID 2152 wrote to memory of 224 N/A C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe
PID 2152 wrote to memory of 224 N/A C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe
PID 224 wrote to memory of 1704 N/A C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 224 wrote to memory of 1704 N/A C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2848 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2848 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2672 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2876 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 2876 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1704 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe

"C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe"

C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe

"C:\Users\Admin\AppData\Local\Temp\7551f8e5bc6d55765b77fed8c1314a7f2bb82cfa9ad65a6d7813995f99127ce6.exe" Master

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.178stu.com/my.htm

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb41f546f8,0x7ffb41f54708,0x7ffb41f54718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,5389922330998991278,8008085868902318104,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,5389922330998991278,8008085868902318104,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,5389922330998991278,8008085868902318104,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,5389922330998991278,8008085868902318104,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,5389922330998991278,8008085868902318104,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,5389922330998991278,8008085868902318104,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,5389922330998991278,8008085868902318104,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,5389922330998991278,8008085868902318104,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,5389922330998991278,8008085868902318104,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,5389922330998991278,8008085868902318104,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,5389922330998991278,8008085868902318104,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,5389922330998991278,8008085868902318104,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,5389922330998991278,8008085868902318104,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,5389922330998991278,8008085868902318104,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,5389922330998991278,8008085868902318104,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1336 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,5389922330998991278,8008085868902318104,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4156 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 info.178stu.com udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
HK 103.133.93.52:80 info.178stu.com tcp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
BE 88.221.83.232:443 www.bing.com tcp
US 8.8.8.8:53 23.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 232.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
US 8.8.8.8:53 www.178stu.com udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 arc.srv.lan udp
US 8.8.8.8:53 edge.msiserver.lan udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 ntp.srv.lan udp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 edge.msiserver.lan udp
HK 103.133.93.52:80 www.178stu.com tcp
HK 103.133.93.52:80 www.178stu.com tcp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
HK 103.133.93.52:80 www.178stu.com tcp

Files

memory/2152-0-0x0000000000860000-0x0000000000861000-memory.dmp

memory/224-2-0x00000000022D0000-0x00000000022D1000-memory.dmp

memory/2152-1-0x0000000000400000-0x000000000069F000-memory.dmp

memory/224-5-0x0000000000400000-0x000000000069F000-memory.dmp

memory/224-8-0x0000000000400000-0x000000000069F000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 b4a74bc775caf3de7fc9cde3c30ce482
SHA1 c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256 dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA512 55578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f

\??\pipe\LOCAL\crashpad_1704_YQPVDQLRNZCSJJHY

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 c5abc082d9d9307e797b7e89a2f755f4
SHA1 54c442690a8727f1d3453b6452198d3ec4ec13df
SHA256 a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512 ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 6eee59154e0db64397a25be581e1cd7e
SHA1 4f24c511b4295c8bd7e2dd38e1d6c035157f3933
SHA256 3028740ca2f0f2222db6a1d9c7b8b152d6d4e7b41d5114545c2e4bb33b34ab61
SHA512 3ce0ef20881eff1049d42df1baa1864fabf8d193fa9ea3de23d6cc27b5f5e2267ed9367777c2c78435bd2c4bfa2067dbd3442dbad6ceeb227e4ee857b63eb7e1

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 6c861d1dc4dcff03df9d84887f518a36
SHA1 fc98b91b94b3d258cc06e3013c76f59320a5707b
SHA256 80ebb83a7bf52be871080e51763241139ae291fbdf2455c111ba084a4aa3d96b
SHA512 d5c7f503795f1df3c3ea95838e3e67226a2d3b5faea21fd5c6f07cdcfa4cc017f01b9af4a44626acfca3bb993a3a8c90264823fcb878bfeebb89e78b55f13926

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 8a7209b7268b667aa6d9cebc1f4b6851
SHA1 2c84ec47ae5f870d04d40005c9db1d7aa19a6ae7
SHA256 15fbcded3d58fe6778d0d205509056fcc97bb01b02f9543d6c048aade9dae0e5
SHA512 b8911a3895352567d7952f7f19ed8f461e92a057820e648f96ecc051abb662407634171869378ea651f3e5adc3cf362950b74dc03bcf34c9492b1dd3071ce515