Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 20:28 UTC
Static task
static1
Behavioral task
behavioral1
Sample
b596ac812543b633e8bc44148b9424ec.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b596ac812543b633e8bc44148b9424ec.html
Resource
win10v2004-20240226-en
General
-
Target
b596ac812543b633e8bc44148b9424ec.html
-
Size
2KB
-
MD5
b596ac812543b633e8bc44148b9424ec
-
SHA1
a53f4e52e1a210ce74be4ddd7bfb878548d42b64
-
SHA256
040b8a7a3a6eadc78aa0206c0e857d3371b02bba29955d6931494eda3967d374
-
SHA512
2a73f69281e2ab54cfa05ab92d13ea7b074524e28b99c096f3ec9f8976383cfa4ce7afc5ef762dfbbb0f87ee01a6dd0f315e14d616d440c6f65b6fb1e9f56651
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 1136 msedge.exe 1136 msedge.exe 1696 identity_helper.exe 1696 identity_helper.exe 5604 msedge.exe 5604 msedge.exe 5604 msedge.exe 5604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1136 wrote to memory of 3912 1136 msedge.exe 87 PID 1136 wrote to memory of 3912 1136 msedge.exe 87 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 2092 1136 msedge.exe 88 PID 1136 wrote to memory of 4848 1136 msedge.exe 89 PID 1136 wrote to memory of 4848 1136 msedge.exe 89 PID 1136 wrote to memory of 3764 1136 msedge.exe 90 PID 1136 wrote to memory of 3764 1136 msedge.exe 90 PID 1136 wrote to memory of 3764 1136 msedge.exe 90 PID 1136 wrote to memory of 3764 1136 msedge.exe 90 PID 1136 wrote to memory of 3764 1136 msedge.exe 90 PID 1136 wrote to memory of 3764 1136 msedge.exe 90 PID 1136 wrote to memory of 3764 1136 msedge.exe 90 PID 1136 wrote to memory of 3764 1136 msedge.exe 90 PID 1136 wrote to memory of 3764 1136 msedge.exe 90 PID 1136 wrote to memory of 3764 1136 msedge.exe 90 PID 1136 wrote to memory of 3764 1136 msedge.exe 90 PID 1136 wrote to memory of 3764 1136 msedge.exe 90 PID 1136 wrote to memory of 3764 1136 msedge.exe 90 PID 1136 wrote to memory of 3764 1136 msedge.exe 90 PID 1136 wrote to memory of 3764 1136 msedge.exe 90 PID 1136 wrote to memory of 3764 1136 msedge.exe 90 PID 1136 wrote to memory of 3764 1136 msedge.exe 90 PID 1136 wrote to memory of 3764 1136 msedge.exe 90 PID 1136 wrote to memory of 3764 1136 msedge.exe 90 PID 1136 wrote to memory of 3764 1136 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b596ac812543b633e8bc44148b9424ec.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd661146f8,0x7ffd66114708,0x7ffd661147182⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,7874674917636772047,562943834246340630,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,7874674917636772047,562943834246340630,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,7874674917636772047,562943834246340630,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,7874674917636772047,562943834246340630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,7874674917636772047,562943834246340630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,7874674917636772047,562943834246340630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,7874674917636772047,562943834246340630,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 /prefetch:82⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,7874674917636772047,562943834246340630,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,7874674917636772047,562943834246340630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,7874674917636772047,562943834246340630,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,7874674917636772047,562943834246340630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,7874674917636772047,562943834246340630,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,7874674917636772047,562943834246340630,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5604
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5012
Network
-
Remote address:8.8.8.8:53Request79.121.231.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.159.190.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request0.159.190.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request0.159.190.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Requesttrafficmagnat.comIN AResponsetrafficmagnat.comIN A91.201.41.178
-
GEThttp://trafficmagnat.com/in/rpeo.cgi?default&jrqle=0&ferjs=0&fczaq=1371381407&ur=1&HTTP_REFERER=msedge.exeRemote address:91.201.41.178:80RequestGET /in/rpeo.cgi?default&jrqle=0&ferjs=0&fczaq=1371381407&ur=1&HTTP_REFERER= HTTP/1.1
Host: trafficmagnat.com
Connection: keep-alive
Upgrade-Insecure-Requests: 1
DNT: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Date: Tue, 05 Mar 2024 20:28:30 GMT
Content-Type: text/javascript
Content-Length: 0
Connection: keep-alive
Set-Cookie: fnjjx=BvghAGRlZmF1bHQAAgABAG6A52X__26A52VAAAEAAABugOdlAA--; expires=Wed, 05-Mar-2025 20:28:30 GMT; path=/; domain=trafficmagnat.com
-
Remote address:91.201.41.178:80RequestGET /favicon.ico HTTP/1.1
Host: trafficmagnat.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
DNT: 1
Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer: http://trafficmagnat.com/in/rpeo.cgi?default&jrqle=0&ferjs=0&fczaq=1371381407&ur=1&HTTP_REFERER=
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: fnjjx=BvghAGRlZmF1bHQAAgABAG6A52X__26A52VAAAEAAABugOdlAA--
ResponseHTTP/1.1 404 Not Found
Date: Tue, 05 Mar 2024 20:28:30 GMT
Content-Type: text/html; charset=iso-8859-1
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
Content-Encoding: gzip
-
Remote address:8.8.8.8:53Request178.41.201.91.in-addr.arpaIN PTRResponse178.41.201.91.in-addr.arpaIN PTRtrafficmagnatcom
-
Remote address:8.8.8.8:53Request178.41.201.91.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request67.179.17.96.in-addr.arpaIN PTRResponse67.179.17.96.in-addr.arpaIN PTRa96-17-179-67deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request167.109.18.2.in-addr.arpaIN PTRResponse167.109.18.2.in-addr.arpaIN PTRa2-18-109-167deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request167.109.18.2.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request167.109.18.2.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request167.109.18.2.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request167.109.18.2.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request103.169.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.126.166.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.1.37.23.in-addr.arpaIN PTRResponse183.1.37.23.in-addr.arpaIN PTRa23-37-1-183deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request183.142.211.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.142.211.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request119.110.54.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request28.160.77.104.in-addr.arpaIN PTRResponse28.160.77.104.in-addr.arpaIN PTRa104-77-160-28deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request68.179.17.96.in-addr.arpaIN PTRResponse68.179.17.96.in-addr.arpaIN PTRa96-17-179-68deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request57.110.18.2.in-addr.arpaIN PTRResponse57.110.18.2.in-addr.arpaIN PTRa2-18-110-57deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request23.160.77.104.in-addr.arpaIN PTRResponse23.160.77.104.in-addr.arpaIN PTRa104-77-160-23deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request23.160.77.104.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request23.160.77.104.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request58.99.105.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request55.179.17.96.in-addr.arpaIN PTRResponse55.179.17.96.in-addr.arpaIN PTRa96-17-179-55deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request57.169.31.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request57.169.31.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317300951_1DEESSRWOJQZD4FVQ&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317300951_1DEESSRWOJQZD4FVQ&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 455761
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 36DFD1F9F54F4337B4B1EE9512FD468F Ref B: LON04EDGE0822 Ref C: 2024-03-05T20:30:31Z
date: Tue, 05 Mar 2024 20:30:30 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301384_1HQXQBTAMSF7ILYA2&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301384_1HQXQBTAMSF7ILYA2&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 457945
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 00C4FA4BA761481296FC47A05774B4DC Ref B: LON04EDGE0822 Ref C: 2024-03-05T20:30:31Z
date: Tue, 05 Mar 2024 20:30:30 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418570_1AILBHE008ZL9RHPC&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239340418570_1AILBHE008ZL9RHPC&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 374984
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 9B50F82B7E8D4065B0117166DB59457A Ref B: LON04EDGE0822 Ref C: 2024-03-05T20:30:31Z
date: Tue, 05 Mar 2024 20:30:30 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418569_13408TD3CSPQQLS8W&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239340418569_13408TD3CSPQQLS8W&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 519937
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 98F7DC1972164C21A9691605A876451D Ref B: LON04EDGE0822 Ref C: 2024-03-05T20:30:31Z
date: Tue, 05 Mar 2024 20:30:30 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301244_17N91ZKZSGROIQHSO&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301244_17N91ZKZSGROIQHSO&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
Remote address:8.8.8.8:53Request60.179.17.96.in-addr.arpaIN PTRResponse60.179.17.96.in-addr.arpaIN PTRa96-17-179-60deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request90.65.42.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request90.65.42.20.in-addr.arpaIN PTRResponse
-
2.1kB 1.1kB 11 7
HTTP Request
GET http://trafficmagnat.com/in/rpeo.cgi?default&jrqle=0&ferjs=0&fczaq=1371381407&ur=1&HTTP_REFERER=HTTP Response
200HTTP Request
GET http://trafficmagnat.com/favicon.icoHTTP Response
404 -
288 B 184 B 6 4
-
386 B 236 B 8 5
-
1.2kB 8.1kB 15 14
-
204.79.197.200:443https://tse1.mm.bing.net/th?id=OADD2.10239317301244_17N91ZKZSGROIQHSO&pid=21.2&w=1920&h=1080&c=4tls, http253.3kB 1.5MB 1102 1105
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317300951_1DEESSRWOJQZD4FVQ&pid=21.2&w=1920&h=1080&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301384_1HQXQBTAMSF7ILYA2&pid=21.2&w=1080&h=1920&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418570_1AILBHE008ZL9RHPC&pid=21.2&w=1080&h=1920&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418569_13408TD3CSPQQLS8W&pid=21.2&w=1920&h=1080&c=4HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301244_17N91ZKZSGROIQHSO&pid=21.2&w=1920&h=1080&c=4HTTP Response
200HTTP Response
200HTTP Response
200 -
1.2kB 8.1kB 15 14
-
1.2kB 8.1kB 15 14
-
1.7kB 8.5kB 19 14
-
72 B 158 B 1 1
DNS Request
79.121.231.20.in-addr.arpa
-
284 B 157 B 4 1
DNS Request
0.159.190.20.in-addr.arpa
DNS Request
0.159.190.20.in-addr.arpa
DNS Request
0.159.190.20.in-addr.arpa
DNS Request
0.159.190.20.in-addr.arpa
-
63 B 79 B 1 1
DNS Request
trafficmagnat.com
DNS Response
91.201.41.178
-
144 B 103 B 2 1
DNS Request
178.41.201.91.in-addr.arpa
DNS Request
178.41.201.91.in-addr.arpa
-
444 B 7
-
71 B 135 B 1 1
DNS Request
67.179.17.96.in-addr.arpa
-
146 B 147 B 2 1
DNS Request
133.211.185.52.in-addr.arpa
DNS Request
133.211.185.52.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
241.154.82.20.in-addr.arpa
DNS Request
241.154.82.20.in-addr.arpa
-
355 B 135 B 5 1
DNS Request
167.109.18.2.in-addr.arpa
DNS Request
167.109.18.2.in-addr.arpa
DNS Request
167.109.18.2.in-addr.arpa
DNS Request
167.109.18.2.in-addr.arpa
DNS Request
167.109.18.2.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
103.169.127.40.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
56.126.166.20.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
183.1.37.23.in-addr.arpa
-
146 B 159 B 2 1
DNS Request
183.142.211.20.in-addr.arpa
DNS Request
183.142.211.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
119.110.54.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
28.160.77.104.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
68.179.17.96.in-addr.arpa
-
146 B 144 B 2 1
DNS Request
240.221.184.93.in-addr.arpa
DNS Request
240.221.184.93.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
57.110.18.2.in-addr.arpa
-
216 B 137 B 3 1
DNS Request
23.160.77.104.in-addr.arpa
DNS Request
23.160.77.104.in-addr.arpa
DNS Request
23.160.77.104.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
58.99.105.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
55.179.17.96.in-addr.arpa
-
142 B 157 B 2 1
DNS Request
57.169.31.20.in-addr.arpa
DNS Request
57.169.31.20.in-addr.arpa
-
62 B 173 B 1 1
DNS Request
tse1.mm.bing.net
DNS Response
204.79.197.20013.107.21.200
-
73 B 106 B 1 1
DNS Request
200.197.79.204.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
60.179.17.96.in-addr.arpa
-
140 B 312 B 2 2
DNS Request
90.65.42.20.in-addr.arpa
DNS Request
90.65.42.20.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5f5f2f7b36e9b56b6dcd62d99fd687df7
SHA1659fa4220a27bf74622a37868bcd5e429040098a
SHA25611d64bd19714403667cc3efca511e44fbdad30605487d3ea0ac725bb5651d34a
SHA5126ab1e226df55191319ea53f311dcb0b0f5be11ce9b7f2bec33b86f48553fb7da188e066c385fbe358aa0f880f9042ec1005d4adae72610c27c6c7a7688da97ba
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\bfff2681-fe09-42d6-a2c2-6a8d76ce7dce.tmp
Filesize6KB
MD5bf4eb8c6aa56e2dc69bc0928827983a4
SHA175d9564ad149077bb63b052157bae0777fceb2fd
SHA256755f97a6ff20911db8139f43b301c6be7d13c67ede777238331fc56ed1fdb8c5
SHA51230a914aaa4c04c4805dcf9a03fceed0d8bf69082466eebdc07f48e7c45597acd749fee4b945cd4dc41988ad03509e11f5e920ead793cd70f089bc84edef7ca0f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5dca2a99223e74eb0c0e38412c0742cdf
SHA11538a52168abc948d1815b19c9ef2f513b5651bb
SHA25641e7bd241cee709ec47de81b20e5fa97dc1609fcfdbe26018a27976c9f1232f5
SHA51249a0492ff8bfb14f36f00760d0c6208d1c149bc097204c6bfa47525f49e40970c4d5af6d47d24e1e37c63b56b7e516d0c3484e5e4257c1eb13a006e0cfea7544