Malware Analysis Report

2025-01-18 01:10

Sample ID 240613-ha4g5axenc
Target a438e4f38cfe2472f337760de12a309a_JaffaCakes118
SHA256 b4cba4ecaaa19d64188f60f41c14f8a2335bb4908b27dce04e19a26ceb401529
Tags
score
1/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
1/10

SHA256

b4cba4ecaaa19d64188f60f41c14f8a2335bb4908b27dce04e19a26ceb401529

Threat Level: No (potentially) malicious behavior was detected

The file a438e4f38cfe2472f337760de12a309a_JaffaCakes118 was found to be: No (potentially) malicious behavior was detected.

Malicious Activity Summary


Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-13 06:32

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 06:32

Reported

2024-06-13 06:35

Platform

win7-20240611-en

Max time kernel

150s

Max time network

154s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a438e4f38cfe2472f337760de12a309a_JaffaCakes118.html

Signatures

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424422248" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C6E78BD1-294E-11EF-AA16-D671A15513D2} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a438e4f38cfe2472f337760de12a309a_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 yellowstudio.pl udp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 tcp
PL 91.237.52.196:443 tcp

Files

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 91d4bc660eee2981f27c7cdb0efcc22d
SHA1 6f90e50051867c5b64601454945335883dce5f3f
SHA256 0f5ab1b4d97e88e172f15c926e38ac23301b0f795884891af8011b9b045d1db5
SHA512 33407619a9739d4e60ba8105f7146c6ee62824360c8e353ac16dd5f330150118c8d12e983c819f22c75667f19e5f4537d43c0c68e2be21ca7640a22f5450f7fb

C:\Users\Admin\AppData\Local\Temp\Cab6B23.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\Tar6B25.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 47c397e6057e0af842530b5d2642c399
SHA1 5f5249a1529c2a75321fa1c833bc629f7321dc6b
SHA256 9021917c12866c7a95003f6ee71dd0dbe7e12f87b4b78d81bb96d6719e6b9542
SHA512 159f960f7fc8b3255da75f3401e3a7d3819a25cea7f5a3f9d19ee8365ea0de859c264c33cf66af5bdbd5a4376832cd8182595a01e1f363c02f30045f4aba6df0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 dd1e2d5191393728ffeffeb58ea2e053
SHA1 e92ca46d7dc42913386a96f69ad640d1dc7593a1
SHA256 8c065636e51e3fb1aacb63a3cc933535c08546868df75ff0f667320eba4cd126
SHA512 c2a1bae874cbc27021796dfbac633afa7bdc93edccd099729069f9908e6b4af31a9e14733c6eca0cdd85171e09729f273769e544658f2e091e6fc4c7a7895310

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 fee8dc1bcaee5b6111c8fa1c1330f823
SHA1 9796e75393be6a1e2fecf37c642b8101040ac2f0
SHA256 f7a0ce1f61a2efe7432e9d8a282eec39b0c194a7de203560c6c7bd37dc1919b4
SHA512 515bb5b80aa20e5b2580a8f6742cc0d7faa39df49d366facedc5a55a7582e7f8ea3256778ecce180ec3b216daf4a77d37a0bb34ab72a88a41e8a1671dcabad6c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 416bac7c493d52d7fe61129425bfe954
SHA1 478502d1d94b6411a4a32f642730a3ec289392ab
SHA256 8e8502536817140e59b313e46b7eec843b0b804a6cc3983e68b97abae411c16e
SHA512 52c99e9ac4184dd320faf84accd5872d21481defd32b6d6f01f20648b51b32d9b6add3e28f211f4a2359eeb171e31413a1eae82359248ec1385dfffe97887e6d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3762d83c6bc050e2262412f248d643fc
SHA1 514ddc63c83803d48a851de2e41639f9f2f3f524
SHA256 39e682994cdf1a32e88b734e5404c74fbdf83dd2b615b5cd1dadc32ce1d2ed51
SHA512 2290d3fdaf80459c9de96ef69db73b741cbe02f4cdfecd9a6e7e29d19a5d21a5bf4386a045a77e4665c3fe4affc57be33ed75804a6285549585d2a64d5de196b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5e18d094c6e38e5735674584e077aa28
SHA1 564336646a491587bf99f2dcb989025b1d8f6b39
SHA256 c8ae54eccbce00081bc38d8e1b2871a35756c280c4dc64b6762567d07ed9bb64
SHA512 0ff148df00390afee6650683b17e106d51cc6d2a80f5bfd43eab38e27fa5ef3798f5cd08dfd1b420d6252125def81e50cf0e3a5759fab74a28efd890cd2cd47b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 84a2ee6807a193a8e4dcdb20b462184f
SHA1 a32dd4f6425fc885fdc3838b093f02b2d9b5bc1b
SHA256 3f833370b9268d03f4fa7ccb14bfcc6cf557fb7cbbfbab09b4b5e6a2700e412c
SHA512 ee3945b94fbfef62db5b4ce9f7180a29a4633b554a7c2f49bd96c61165896b1ebb6f2cdc491caff54ae32e14e5ba330739c4daae4cf0f6630285f87c7c0c8ce8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9d9860282e574908e42b4eb838a27cd5
SHA1 3a07a269bf8bbfd22d2988785160c0ba9cf1cefe
SHA256 7e6c137e0c8a2758891ee111267b9592e727bf68f4043c3121b340cbfa6de3ad
SHA512 2db2ad194f8f11296e4830b87f0fef9a86a70904b5857784ffc10f296c15e196696ef9c5c5a21b8a676e0bc46b0b6d1b4f6e4ea94ad5a1019df32515a1c999c0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4522e34b3ccf50e6b66aee769bf45e75
SHA1 8bf95d5d30791f9b2013ea9394e03522375031f7
SHA256 12321597dfd12d4ea1fe742ff79f9c0c95b16bd058fb1c744c0bf7d9b24c11f3
SHA512 0357517b832adaa958bf6538b7e84ba2b43ef4d68acf84fd33f56436f3f3a43741f631a9656fd5e96944e96156485dc64f8281041b8ba06fefece0391dd06b5f

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 06:32

Reported

2024-06-13 06:35

Platform

win10v2004-20240611-en

Max time kernel

148s

Max time network

153s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a438e4f38cfe2472f337760de12a309a_JaffaCakes118.html

Signatures

N/A

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a438e4f38cfe2472f337760de12a309a_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=3932,i,3144109701624127473,12586215149656995128,262144 --variations-seed-version --mojo-platform-channel-handle=3772 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --field-trial-handle=3384,i,3144109701624127473,12586215149656995128,262144 --variations-seed-version --mojo-platform-channel-handle=4588 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=4928,i,3144109701624127473,12586215149656995128,262144 --variations-seed-version --mojo-platform-channel-handle=5336 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=5364,i,3144109701624127473,12586215149656995128,262144 --variations-seed-version --mojo-platform-channel-handle=5484 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --field-trial-handle=5476,i,3144109701624127473,12586215149656995128,262144 --variations-seed-version --mojo-platform-channel-handle=5552 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --field-trial-handle=4632,i,3144109701624127473,12586215149656995128,262144 --variations-seed-version --mojo-platform-channel-handle=6016 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --field-trial-handle=6864,i,3144109701624127473,12586215149656995128,262144 --variations-seed-version --mojo-platform-channel-handle=6872 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 api.edgeoffer.microsoft.com udp
US 8.8.8.8:53 api.edgeoffer.microsoft.com udp
IE 94.245.104.56:443 api.edgeoffer.microsoft.com tcp
US 8.8.8.8:53 business.bing.com udp
US 8.8.8.8:53 business.bing.com udp
US 13.107.6.158:443 business.bing.com tcp
US 8.8.8.8:53 yellowstudio.pl udp
US 8.8.8.8:53 yellowstudio.pl udp
US 8.8.8.8:53 bzib.nelreports.net udp
US 8.8.8.8:53 bzib.nelreports.net udp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
NL 2.18.121.10:443 bzib.nelreports.net tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
BE 23.55.97.181:443 www.microsoft.com tcp
US 8.8.8.8:53 56.104.245.94.in-addr.arpa udp
US 8.8.8.8:53 76.234.34.23.in-addr.arpa udp
US 8.8.8.8:53 202.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 nav-edge.smartscreen.microsoft.com udp
US 8.8.8.8:53 nav-edge.smartscreen.microsoft.com udp
GB 172.165.61.93:443 nav-edge.smartscreen.microsoft.com tcp
GB 172.165.61.93:443 nav-edge.smartscreen.microsoft.com tcp
GB 172.165.61.93:443 nav-edge.smartscreen.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.160:443 www.bing.com tcp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 10.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 181.97.55.23.in-addr.arpa udp
US 8.8.8.8:53 99.201.58.216.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 93.61.165.172.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 160.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 edgestatic.azureedge.net udp
US 8.8.8.8:53 edgestatic.azureedge.net udp
US 8.8.8.8:53 c.s-microsoft.com udp
US 8.8.8.8:53 c.s-microsoft.com udp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
US 8.8.8.8:53 wcpstatic.microsoft.com udp
US 8.8.8.8:53 wcpstatic.microsoft.com udp
US 13.107.246.64:443 wcpstatic.microsoft.com tcp
US 13.107.246.64:443 wcpstatic.microsoft.com tcp
NL 23.62.61.187:443 www.bing.com udp
US 8.8.8.8:53 187.61.62.23.in-addr.arpa udp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
NL 52.111.243.29:443 tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 203.107.17.2.in-addr.arpa udp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
NL 23.62.61.163:443 www.bing.com tcp
US 8.8.8.8:53 163.61.62.23.in-addr.arpa udp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
NL 23.62.61.160:443 www.bing.com tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp
PL 91.237.52.196:443 yellowstudio.pl tcp

Files

N/A