Malware Analysis Report

2024-09-11 12:03

Sample ID 240616-v645razhja
Target aspnet80.exe
SHA256 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632
Tags
sality backdoor evasion trojan upx bootkit persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632

Threat Level: Known bad

The file aspnet80.exe was found to be: Known bad.

Malicious Activity Summary

sality backdoor evasion trojan upx bootkit persistence

Windows security bypass

Sality

UAC bypass

Modifies firewall policy service

Windows security modification

UPX packed file

Checks whether UAC is enabled

Enumerates connected drives

Writes to the Master Boot Record (MBR)

Drops autorun.inf file

Drops file in Program Files directory

Drops file in Windows directory

Unsigned PE

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

System policy modification

Suspicious use of SendNotifyMessage

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Enumerates system info in registry

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-16 17:37

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-16 17:37

Reported

2024-06-16 17:39

Platform

win7-20240508-en

Max time kernel

120s

Max time network

121s

Command Line

"taskhost.exe"

Signatures

Modifies firewall policy service

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

Sality

backdoor sality

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\SYSTEM.INI C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1616 wrote to memory of 1068 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\taskhost.exe
PID 1616 wrote to memory of 1168 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\Dwm.exe
PID 1616 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\Explorer.EXE
PID 1616 wrote to memory of 2384 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\DllHost.exe

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

Processes

C:\Windows\system32\taskhost.exe

"taskhost.exe"

C:\Windows\system32\Dwm.exe

"C:\Windows\system32\Dwm.exe"

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Windows\system32\DllHost.exe

C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}

C:\Users\Admin\AppData\Local\Temp\aspnet80.exe

"C:\Users\Admin\AppData\Local\Temp\aspnet80.exe"

Network

N/A

Files

memory/1616-0-0x0000000000400000-0x00000000005A9000-memory.dmp

memory/1616-6-0x0000000001F50000-0x0000000002FDE000-memory.dmp

memory/1616-1-0x0000000001F50000-0x0000000002FDE000-memory.dmp

memory/1616-3-0x0000000001F50000-0x0000000002FDE000-memory.dmp

memory/1616-5-0x0000000001F50000-0x0000000002FDE000-memory.dmp

memory/1616-7-0x0000000001F50000-0x0000000002FDE000-memory.dmp

memory/1616-9-0x0000000001F50000-0x0000000002FDE000-memory.dmp

memory/1616-4-0x0000000001F50000-0x0000000002FDE000-memory.dmp

memory/1616-8-0x0000000001F50000-0x0000000002FDE000-memory.dmp

memory/1616-13-0x0000000001F50000-0x0000000002FDE000-memory.dmp

memory/1616-14-0x0000000001F50000-0x0000000002FDE000-memory.dmp

memory/1616-31-0x0000000004600000-0x0000000004602000-memory.dmp

memory/1616-33-0x0000000076140000-0x0000000076230000-memory.dmp

memory/1616-32-0x0000000076140000-0x0000000076230000-memory.dmp

memory/1616-30-0x0000000076140000-0x0000000076230000-memory.dmp

memory/1616-29-0x0000000076150000-0x0000000076151000-memory.dmp

memory/1616-28-0x0000000004610000-0x0000000004611000-memory.dmp

memory/1616-26-0x0000000004610000-0x0000000004611000-memory.dmp

memory/1616-25-0x0000000004600000-0x0000000004602000-memory.dmp

memory/1068-15-0x0000000000210000-0x0000000000212000-memory.dmp

memory/1616-10-0x0000000001F50000-0x0000000002FDE000-memory.dmp

memory/1616-48-0x0000000076140000-0x0000000076230000-memory.dmp

memory/1616-34-0x0000000001F50000-0x0000000002FDE000-memory.dmp

memory/1616-44-0x0000000004600000-0x0000000004602000-memory.dmp

memory/1616-51-0x0000000076140000-0x0000000076230000-memory.dmp

memory/1616-50-0x0000000076140000-0x0000000076230000-memory.dmp

memory/1616-49-0x0000000000400000-0x00000000005A9000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-16 17:37

Reported

2024-06-16 17:39

Platform

win10v2004-20240611-en

Max time kernel

122s

Max time network

151s

Command Line

"fontdrvhost.exe"

Signatures

Modifies firewall policy service

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

Sality

backdoor sality

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\y: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\h: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\m: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\u: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\i: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\x: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\e: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\t: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\z: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\v: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\r: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\w: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\a: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\g: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\n: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\q: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\s: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\j: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\o: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\p: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\b: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\k: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\l: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

Writes to the Master Boot Record (MBR)

bootkit persistence
Description Indicator Process Target
File opened for modification \??\PhysicalDrive0 C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

Drops autorun.inf file

Description Indicator Process Target
File opened for modification C:\autorun.inf C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened for modification F:\autorun.inf C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeClickToRun.exe C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\InspectorOfficeGadget.exe C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\SYSTEM.INI C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1404 wrote to memory of 812 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\fontdrvhost.exe
PID 1404 wrote to memory of 820 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\fontdrvhost.exe
PID 1404 wrote to memory of 380 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\dwm.exe
PID 1404 wrote to memory of 792 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\sihost.exe
PID 1404 wrote to memory of 3080 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\svchost.exe
PID 1404 wrote to memory of 3152 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\taskhostw.exe
PID 1404 wrote to memory of 3440 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\Explorer.EXE
PID 1404 wrote to memory of 3544 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\svchost.exe
PID 1404 wrote to memory of 3760 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\DllHost.exe
PID 1404 wrote to memory of 3848 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
PID 1404 wrote to memory of 3916 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\System32\RuntimeBroker.exe
PID 1404 wrote to memory of 3996 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
PID 1404 wrote to memory of 3756 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\System32\RuntimeBroker.exe
PID 1404 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\System32\RuntimeBroker.exe
PID 1404 wrote to memory of 4400 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
PID 1404 wrote to memory of 1248 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\backgroundTaskHost.exe
PID 1404 wrote to memory of 4624 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\backgroundTaskHost.exe
PID 1404 wrote to memory of 1604 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\SysWOW64\explorer.exe
PID 1404 wrote to memory of 1604 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\SysWOW64\explorer.exe
PID 1404 wrote to memory of 1604 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\SysWOW64\explorer.exe
PID 2364 wrote to memory of 4084 N/A C:\Windows\explorer.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2364 wrote to memory of 4084 N/A C:\Windows\explorer.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4084 wrote to memory of 5008 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4084 wrote to memory of 5008 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1404 wrote to memory of 812 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\fontdrvhost.exe
PID 1404 wrote to memory of 820 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\fontdrvhost.exe
PID 1404 wrote to memory of 380 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\dwm.exe
PID 1404 wrote to memory of 792 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\sihost.exe
PID 1404 wrote to memory of 3080 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\svchost.exe
PID 1404 wrote to memory of 3152 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\taskhostw.exe
PID 1404 wrote to memory of 3440 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\Explorer.EXE
PID 1404 wrote to memory of 3544 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\svchost.exe
PID 1404 wrote to memory of 3760 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\DllHost.exe
PID 1404 wrote to memory of 3848 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
PID 1404 wrote to memory of 3916 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\System32\RuntimeBroker.exe
PID 1404 wrote to memory of 3996 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
PID 1404 wrote to memory of 3756 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\System32\RuntimeBroker.exe
PID 1404 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\System32\RuntimeBroker.exe
PID 1404 wrote to memory of 4400 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
PID 1404 wrote to memory of 1248 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\backgroundTaskHost.exe
PID 1404 wrote to memory of 4624 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\system32\backgroundTaskHost.exe
PID 1404 wrote to memory of 2364 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\explorer.exe
PID 1404 wrote to memory of 4084 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1404 wrote to memory of 5008 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1404 wrote to memory of 3876 N/A C:\Users\Admin\AppData\Local\Temp\aspnet80.exe C:\Windows\System32\RuntimeBroker.exe
PID 4084 wrote to memory of 1188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4084 wrote to memory of 1188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4084 wrote to memory of 1188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4084 wrote to memory of 1188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4084 wrote to memory of 1188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4084 wrote to memory of 1188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4084 wrote to memory of 1188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4084 wrote to memory of 1188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4084 wrote to memory of 1188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4084 wrote to memory of 1188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4084 wrote to memory of 1188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4084 wrote to memory of 1188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4084 wrote to memory of 1188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4084 wrote to memory of 1188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4084 wrote to memory of 1188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4084 wrote to memory of 1188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4084 wrote to memory of 1188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4084 wrote to memory of 1188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4084 wrote to memory of 1188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\aspnet80.exe N/A

Processes

C:\Windows\system32\fontdrvhost.exe

"fontdrvhost.exe"

C:\Windows\system32\fontdrvhost.exe

"fontdrvhost.exe"

C:\Windows\system32\dwm.exe

"dwm.exe"

C:\Windows\system32\sihost.exe

sihost.exe

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc

C:\Windows\system32\taskhostw.exe

taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc

C:\Windows\system32\DllHost.exe

C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}

C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe

"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe

"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe

"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca

C:\Windows\system32\backgroundTaskHost.exe

"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca

C:\Windows\system32\backgroundTaskHost.exe

"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca

C:\Users\Admin\AppData\Local\Temp\aspnet80.exe

"C:\Users\Admin\AppData\Local\Temp\aspnet80.exe"

C:\Windows\SysWOW64\explorer.exe

explorer.exe "http://localhost:80"

C:\Windows\explorer.exe

C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://localhost/

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff86a1346f8,0x7ff86a134708,0x7ff86a134718

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,1852215113151593215,6871301595786779277,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,1852215113151593215,6871301595786779277,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2500 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,1852215113151593215,6871301595786779277,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1852215113151593215,6871301595786779277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1852215113151593215,6871301595786779277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1852215113151593215,6871301595786779277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1852215113151593215,6871301595786779277,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,1852215113151593215,6871301595786779277,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3412 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,1852215113151593215,6871301595786779277,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3412 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1852215113151593215,6871301595786779277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1852215113151593215,6871301595786779277,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,1852215113151593215,6871301595786779277,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1872 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.netbox.cn udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 4.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 144.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
N/A 127.0.0.1:80 tcp
N/A 127.0.0.1:80 tcp
N/A 127.0.0.1:80 tcp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 140.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 104.193.132.51.in-addr.arpa udp

Files

memory/1404-0-0x0000000000400000-0x00000000005A9000-memory.dmp

memory/1404-3-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-6-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-5-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-9-0x0000000003830000-0x0000000003831000-memory.dmp

memory/1404-8-0x0000000000720000-0x0000000000722000-memory.dmp

memory/1404-1-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-10-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-12-0x0000000000720000-0x0000000000722000-memory.dmp

memory/1404-11-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-13-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-7-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-15-0x0000000000720000-0x0000000000722000-memory.dmp

memory/1404-14-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-20-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-19-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-21-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-23-0x0000000002350000-0x00000000033DE000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 b4a74bc775caf3de7fc9cde3c30ce482
SHA1 c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256 dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA512 55578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f

memory/1404-24-0x0000000002350000-0x00000000033DE000-memory.dmp

\??\pipe\LOCAL\crashpad_4084_SIHKJTKGPLRINMJB

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 c5abc082d9d9307e797b7e89a2f755f4
SHA1 54c442690a8727f1d3453b6452198d3ec4ec13df
SHA256 a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512 ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 195781e0c21817793a59785d21c21340
SHA1 23451b2a950f6e0255dafb4eb2ba57ceaf83d593
SHA256 d4aebab050f55102fa4fdd859bf7d4edeb2faef8039a32597050fa4004d3aa32
SHA512 cd40ccf6c8959c763c49a3bbdeca764dd2628894c8b66ce19cad9ac873701d068c31c231f78866ceb50a34200f147fdbb932771cbc82fb382d5ebb598d715034

memory/1404-47-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-50-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-51-0x0000000002350000-0x00000000033DE000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

memory/1404-73-0x0000000000400000-0x00000000005A9000-memory.dmp

memory/1404-74-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-75-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-79-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-83-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-86-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-93-0x0000000002350000-0x00000000033DE000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 6f3fed8398bb575684cb7d966ae4275d
SHA1 447036b76b66e8e8b91851ea9bdf710bc4b54753
SHA256 67e3f9e429ecfaa707c440540f463e9e54d120c06e4be3503fbb01a0f35ead5e
SHA512 6b9935d36bf0673819a0eef8857e42d9103970a70ee1481b17746d0aabb13d2b1ae20c64887530a90e4b067f430415b80ff2e14d88eeb3e543d1c9f3a37085c5

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 5915020ea520beef055ede0770ccce15
SHA1 073bade26c7fae924fbf013f1a550090bb525cb3
SHA256 8be7186dde1548529293072481db13afe91ee2e9056f0282f60a4eedf9ed3f1e
SHA512 2f112b1e654744a8d75489751f27c28f1b539e748177e97962defd1252049590959a5423469c508b30ef86879199c02eb5a003e9fb82ee4350b53007060ba41e

memory/1404-109-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-110-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-113-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-114-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-117-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-119-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-120-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-122-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-123-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-125-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-127-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-131-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-134-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-135-0x0000000002350000-0x00000000033DE000-memory.dmp

memory/1404-136-0x0000000002350000-0x00000000033DE000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 0c66ff16c862778c6748ace7482c547e
SHA1 67dc9c8a39dfaf4766f885448caeae0e72206c5c
SHA256 7808b2275ee6776c23e61009f54d8cb2f098c8a8c7667f84e4767c88587b8248
SHA512 d8dc241045cde2b057b37891fd74da7902e4ba3809abefb9100a84a6534402d9c9a1e51dcb22088e9abd0e91e8b7d47992766cad4ee12ee4802b3e01a33f7023

memory/1404-155-0x0000000002350000-0x00000000033DE000-memory.dmp

F:\ppwgan.exe

MD5 f14f45f250028fe2c7c7fb7938528cbe
SHA1 7513722fb6163feeb5b1615e6a982ffd82c5080e
SHA256 1340ed55b39df2c4062eb2cb89aae2ff2394c9c6b52c9ed245637566d72fe8a0
SHA512 936cb45f110684441c770fa69f418f1d1c6b33219386fee6162692abfa69f080fe40f59097607f3ff611248ffa2233aeb933bafe4cb8e4172ea73564475e0607

memory/1404-165-0x0000000000720000-0x0000000000722000-memory.dmp