Malware Analysis Report

2025-08-10 21:40

Sample ID 240602-246dcsad9v
Target 8fc17a38d51c8e67a5ac0fbebe8a1773_JaffaCakes118
SHA256 dd21fe6c09fc7949745450867d11f1f2cacd239b7881ecbc428f969e1cc73783
Tags
score
1/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
1/10

SHA256

dd21fe6c09fc7949745450867d11f1f2cacd239b7881ecbc428f969e1cc73783

Threat Level: No (potentially) malicious behavior was detected

The file 8fc17a38d51c8e67a5ac0fbebe8a1773_JaffaCakes118 was found to be: No (potentially) malicious behavior was detected.

Malicious Activity Summary


Suspicious behavior: EnumeratesProcesses

Suspicious use of SendNotifyMessage

Modifies Internet Explorer settings

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of FindShellTrayWindow

Enumerates system info in registry

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-02 23:09

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-02 23:09

Reported

2024-06-02 23:11

Platform

win7-20240508-en

Max time kernel

150s

Max time network

150s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8fc17a38d51c8e67a5ac0fbebe8a1773_JaffaCakes118.html

Signatures

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1EAB9F91-2135-11EF-BF51-4E559C6B32B6} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423531618" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8fc17a38d51c8e67a5ac0fbebe8a1773_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2984 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 image.zeroauction.co.kr udp
US 8.8.8.8:53 www.zeroauction.co.kr udp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp

Files

C:\Users\Admin\AppData\Local\Temp\Cab2168.tmp

MD5 29f65ba8e88c063813cc50a4ea544e93
SHA1 05a7040d5c127e68c25d81cc51271ffb8bef3568
SHA256 1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512 e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\Tar220B.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ab59748bbca8f56d23db7b96f1fee493
SHA1 833cf66f2e61b8b14bf9d84d150559944fce0fe9
SHA256 a70e514e6c3af303e88599dd63f6aaf0d600b5f115eb580e13cb71c0a454b9d0
SHA512 ada120f640c38db4a3be3314efbf32b2e7354c9c0aefd534980555eeb368cc5a154ea7d3625b92a3b6d1b6cbebc38d73cd15472c2919210736c029faf06d95e1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5d61e73f41b47bfa1637f2977530d117
SHA1 206d677fbbdbe5bc48f703093f589241dc6bf21d
SHA256 6c26611f0d7007939a23a449b79a89345170723b0195d32b2fc9c3f6b5966d0a
SHA512 6478839926383170aa99cf2b91b17516bb2f1186254dfa4c0a0e1c3a09d8fd3778bcbfdcf9e3e5096d0ef74562aeb796f88c96a1c68a92c305b63598e02f332c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c0395b408ba8a48e81045504f2d1709b
SHA1 fb3c95519e6b0cdc90e6921d16ad1781f481b82f
SHA256 5bbd04e338f4b6448ee2132a143bf5b200e02cfec8071ff1e3c0c23150f9e498
SHA512 817d247aeb2a630299260cfd442dbb822400207ba64e7d2ca0877dde2eb9a64f0a396e0abe305c834a7a2e1a8f87540dbad7a3cc7dbbb133c84d424a729eb63a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 148ba4594da3ff944e5c706deaec4e8d
SHA1 8dc82332f63fe00b360641a1c33a6a0ee0995cfc
SHA256 3e8dfaf21b54e0a15c2bfc33834b9601bf40e0359d80c3f55ea31d7e0ac9ffd8
SHA512 66aef2b717bbda764864260d84ec7958bf7f95b4480d0fbf4c8ddd76ab8c1b5d863a7ada97b663fe9f4cfa4924eee2ec424567b4d7d66849184d3774b62d137a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 05c6af61526ad63ca50891904915444c
SHA1 e1faea2779cac7128ceb8ef618db06e6196046cf
SHA256 a4bf03c84d989239a2203d946e02ba88d8aa67517eda43da4594c785135b73a9
SHA512 30807f38832177bb96c5f2768764c55b046acecb92fb7ba08d0b4242cd2bcccf6673de36b1cddd4c7b10795c1c4f60e398df4294c70389a30ece45a47e1884f5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 eb664687a3300734af8cd267cd7e7d6b
SHA1 b23192dfd367446cc4eff41ecc7b91a221026d06
SHA256 40e240ef15de7749df3dd9a0f82663235fc5121400341a5ad649f51d0e9d369f
SHA512 dcbb356e37d20156d182dbf929d53e052ba9990e16997d49a6db938914b3ae8c53eadd58c575633a7b9550598883ae709fd0e86908e337521dd07e89426090ca

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d9c75b15a6ea7e44560e3db92a23f518
SHA1 e242ddc2b1acb7de46df52d2beaccb921fe0e801
SHA256 668df45828b6e7fba87e74418ef24f30375047ec9b91c29ebbbc08b53b4e5eec
SHA512 cc48369f0be489958d9fcc12d2c92034812a499df2a8924d8aa38ede5a5fc777362d855472ffa19f9d6093760c7c470b404b3d4b1b96af54e1a8f6aa93a69940

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3a5037a82bf6740fe1f975232c4b5e65
SHA1 c55c021e818e21a32603b2a3e0b67f1d502f0ccb
SHA256 dfd87a7f6d2f71b5ecde827717290ad5e9bee5f1d195a2ff59f1c2eca26746b9
SHA512 2dbdf174215cd6abf1489ec4b340debcfc687c3bf720775b7f19ce58ac2da393e35b52054785c56f1a4dfc60d58558ff50411f4db0880fcb152e936725daef72

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a7c1a8977f58e82339c4896e3ec14b29
SHA1 0724d8966a5bb81cf7ba717f89cb1dbaa508e2a7
SHA256 06b641f7dac16d52cb5bb4957ec744f4a5e9e570346cfda993b04c94108d74a1
SHA512 11f25f2c68ce025ae3f3fb790ac77f633ed010bf2fed4b25ce58277caeb4bd05746f701aa4b682efadfbfb4efdd73fd021f0b760605e560050013cb75a937e42

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5960c706586d35420b91abf878ae2590
SHA1 e3853eded365f50867433a201b4a74f3a27ebe10
SHA256 e26b19ba7f7d93946282f8426668d84494008b76e24af36fa5fd0df6a7d377b1
SHA512 d31279d981a5a3a52d76e563f0755a0cc7b5bbb1385196ad5bc9a776be04aa0739c2c1775fbc338b383a371d904cdcfe42c9019fc90e4f7f36187bab321e4fbb

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-02 23:09

Reported

2024-06-02 23:11

Platform

win10v2004-20240508-en

Max time kernel

148s

Max time network

151s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8fc17a38d51c8e67a5ac0fbebe8a1773_JaffaCakes118.html

Signatures

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1712 wrote to memory of 2640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 1112 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 1112 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2164 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2164 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2164 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2164 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2164 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2164 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2164 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2164 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2164 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2164 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2164 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2164 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2164 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2164 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2164 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2164 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2164 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2164 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2164 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1712 wrote to memory of 2164 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8fc17a38d51c8e67a5ac0fbebe8a1773_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcdad846f8,0x7ffcdad84708,0x7ffcdad84718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,9712510602356541361,16026239937523875909,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,9712510602356541361,16026239937523875909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,9712510602356541361,16026239937523875909,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9712510602356541361,16026239937523875909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9712510602356541361,16026239937523875909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,9712510602356541361,16026239937523875909,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 image.zeroauction.co.kr udp
US 8.8.8.8:53 www.zeroauction.co.kr udp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
US 8.8.8.8:53 14.213.58.216.in-addr.arpa udp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp
KR 182.162.73.77:80 www.zeroauction.co.kr tcp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 4158365912175436289496136e7912c2
SHA1 813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256 354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA512 74b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b

\??\pipe\LOCAL\crashpad_1712_NHAIEHVMKQCJPMWL

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 ce4c898f8fc7601e2fbc252fdadb5115
SHA1 01bf06badc5da353e539c7c07527d30dccc55a91
SHA256 bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA512 80fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 bebb4391dfe9576d88006cfa40e5d485
SHA1 7996d72f74a96bf6ce72bad3c85533658f035aba
SHA256 644bdb10d27198d343c2fa7d7f4ba18966257b1a6a61034409ce87400a1c69cf
SHA512 6dcc649b7d0187e642d373f5fb1870ccb3f1ec261b8cecee72d5856b1e49d5c36142d267f24abd024a1fec81052aac08975fb5d12e01fcc72dfb8b8d4729778a

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 fa89160ff67a42a2b16d0c2a1cab58c8
SHA1 87b5a34d1a1eff1164a6655f9e2c383c5e8ee908
SHA256 2a02f0a00ca9661125f6afeaf2c569676cc5ff14ec30d3cb75598972726cdb9e
SHA512 fb963569138c1e02a2518416d068fa615dd44f7f4795d0f6feac266664369c23f6fd9772d643a877794bcc1daf0f40cd92c54fdc663e11e1c0ef7c235a05b2dc

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 d748abb9826b30c1515ea9e62bf96944
SHA1 56168dbd339d783c6365eab564bdbdd7c89d4d83
SHA256 206aaa9d80627a343d4251910bf0e7480b297323d5d5170248d5cbc81c41abdd
SHA512 ae162d35621beddf3760dbea20c745dd5eef73452b04955a5aeb09b3795b1bb82835627d47ce16009207c457e128d26a3c9c04b66c497c99fdd6d16ded87eb2b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 08da97be124d9da5883fbde713060cca
SHA1 645fb441fd203d3a90c7acd384a9f126f102079f
SHA256 4d8deab774baed8fb7cab320777a10915b357d722caaf7bd8e9dc0f42d58c706
SHA512 aa55a83bf8d2105bab3ef63739e04151922962a80d4c37dc3b0bba86c3b4d8e32a8cc24cdd2afe88f622c47a6f4b3b69e6e3a533ed9481f86682ada068718cb5

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 2bfe4cc63ec86b5d50c194086680cb7a
SHA1 3f4e9dfe6ceb7c11082b3e2fcd06a737d113d744
SHA256 1ad79d24a32c2f5dbda2dbf635dfd2c799c8781473fd85a2859fb2fe070855ef
SHA512 bfc66f798cc827d2a81d83a4b3aa07c617833ee62f5dede4baf67e6d700411668e034d99d89443b0a13342308ea83fff5f44df93df1348edf1d58dc4df234c8a