Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 19:42 UTC
Static task
static1
Behavioral task
behavioral1
Sample
361deb7fe8b9fb913ec0fa4940a5dc74_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
361deb7fe8b9fb913ec0fa4940a5dc74_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
361deb7fe8b9fb913ec0fa4940a5dc74_JaffaCakes118.html
-
Size
9KB
-
MD5
361deb7fe8b9fb913ec0fa4940a5dc74
-
SHA1
ef6f9c190f4cd8440beec55d413fe8f1b9583c74
-
SHA256
48883e58c7f83b39e95a052674cdb0feeb8c44418b8cfb9255e53e033a2e8baa
-
SHA512
841410c2c003dbd51e82b93461c22812999dff57fe011b856f60216dde1c395a18a29f3f4c5a2949d1d4e7b2bc66f0247254c7cf3e6ae09fc235c89fbf00acae
-
SSDEEP
96:uzVs+ux7w0LLY1k9o84d12ef7CSTU3GT/kd6pNQlVHcEZ7ru7f:csz7w0AYS/GONQPHb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2632 msedge.exe 2632 msedge.exe 3540 msedge.exe 3540 msedge.exe 4788 identity_helper.exe 4788 identity_helper.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3540 wrote to memory of 3132 3540 msedge.exe 83 PID 3540 wrote to memory of 3132 3540 msedge.exe 83 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 2632 3540 msedge.exe 86 PID 3540 wrote to memory of 2632 3540 msedge.exe 86 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\361deb7fe8b9fb913ec0fa4940a5dc74_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe0d6b46f8,0x7ffe0d6b4708,0x7ffe0d6b47182⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3728 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4860
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requestcounters.gigya.comIN AResponse
-
Remote address:8.8.8.8:53Requestanalytics.hosting24.comIN AResponse
-
Remote address:8.8.8.8:53Requestfc01.deviantart.netIN AResponsefc01.deviantart.netIN A52.43.125.69fc01.deviantart.netIN A54.212.131.150fc01.deviantart.netIN A54.203.226.187
-
GEThttp://fc01.deviantart.net/fs47/f/2009/249/a/c/Red_and_Black_Vista_Wallpaper_by_Treber.jpgmsedge.exeRemote address:52.43.125.69:80RequestGET /fs47/f/2009/249/a/c/Red_and_Black_Vista_Wallpaper_by_Treber.jpg HTTP/1.1
Host: fc01.deviantart.net
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
DNT: 1
Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 301 Moved Permanently
Content-Type: text/html
Content-Length: 162
Connection: keep-alive
Server: nginx
Location: http://orig01.deviantart.net/2350/f/2009/249/a/c/red_and_black_vista_wallpaper_by_treber.jpg
-
Remote address:8.8.8.8:53Requestorig01.deviantart.netIN AResponseorig01.deviantart.netIN A35.165.70.199orig01.deviantart.netIN A34.218.68.46orig01.deviantart.netIN A54.189.14.144
-
GEThttp://orig01.deviantart.net/2350/f/2009/249/a/c/red_and_black_vista_wallpaper_by_treber.jpgmsedge.exeRemote address:35.165.70.199:80RequestGET /2350/f/2009/249/a/c/red_and_black_vista_wallpaper_by_treber.jpg HTTP/1.1
Host: orig01.deviantart.net
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
DNT: 1
Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 404 Not Found
Content-Type: text/html; charset=UTF-8
Content-Length: 0
Connection: keep-alive
Server: da-redirector/0.5.2
-
Remote address:8.8.8.8:53Request68.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request130.211.222.173.in-addr.arpaIN PTRResponse130.211.222.173.in-addr.arpaIN PTRa173-222-211-130deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.dual-a-0034.a-msedge.netg-bing-com.dual-a-0034.a-msedge.netIN CNAMEdual-a-0034.a-msedge.netdual-a-0034.a-msedge.netIN A13.107.21.237dual-a-0034.a-msedge.netIN A204.79.197.237
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7b9244876c6a421982cbf73230ea6b67&localId=w:02CFF369-7177-605D-73C2-BA4DB418EA60&deviceId=6896204246996124&anid=Remote address:13.107.21.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7b9244876c6a421982cbf73230ea6b67&localId=w:02CFF369-7177-605D-73C2-BA4DB418EA60&deviceId=6896204246996124&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=03AF17BC30BD60EF00DB03043106612E; domain=.bing.com; expires=Mon, 04-Aug-2025 19:42:24 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 4B94A4DBFD0D400386186A5010E9307B Ref B: LON04EDGE0909 Ref C: 2024-07-10T19:42:24Z
date: Wed, 10 Jul 2024 19:42:24 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=7b9244876c6a421982cbf73230ea6b67&localId=w:02CFF369-7177-605D-73C2-BA4DB418EA60&deviceId=6896204246996124&anid=Remote address:13.107.21.237:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=7b9244876c6a421982cbf73230ea6b67&localId=w:02CFF369-7177-605D-73C2-BA4DB418EA60&deviceId=6896204246996124&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=03AF17BC30BD60EF00DB03043106612E
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=MwM46YP4cdzbuo5rU7fuLEEJXOyJ3Qc8eUTGRUvRFmc; domain=.bing.com; expires=Mon, 04-Aug-2025 19:42:24 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: D340EEDB8AC74627BD1523E62919AF92 Ref B: LON04EDGE0909 Ref C: 2024-07-10T19:42:24Z
date: Wed, 10 Jul 2024 19:42:24 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7b9244876c6a421982cbf73230ea6b67&localId=w:02CFF369-7177-605D-73C2-BA4DB418EA60&deviceId=6896204246996124&anid=Remote address:13.107.21.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7b9244876c6a421982cbf73230ea6b67&localId=w:02CFF369-7177-605D-73C2-BA4DB418EA60&deviceId=6896204246996124&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=03AF17BC30BD60EF00DB03043106612E; MSPTC=MwM46YP4cdzbuo5rU7fuLEEJXOyJ3Qc8eUTGRUvRFmc
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: F3245DF92D994173858126589B026FDB Ref B: LON04EDGE0909 Ref C: 2024-07-10T19:42:24Z
date: Wed, 10 Jul 2024 19:42:24 GMT
-
Remote address:8.8.8.8:53Request69.125.43.52.in-addr.arpaIN PTRResponse69.125.43.52.in-addr.arpaIN PTRec2-52-43-125-69 us-west-2compute amazonawscom
-
Remote address:8.8.8.8:53Request199.70.165.35.in-addr.arpaIN PTRResponse199.70.165.35.in-addr.arpaIN PTRec2-35-165-70-199 us-west-2compute amazonawscom
-
Remote address:8.8.8.8:53Request205.47.74.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request237.21.107.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request86.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.126.166.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request99.58.20.217.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request69.190.18.2.in-addr.arpaIN PTRResponse69.190.18.2.in-addr.arpaIN PTRa2-18-190-69deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request11.227.111.52.in-addr.arpaIN PTRResponse
-
52.43.125.69:80http://fc01.deviantart.net/fs47/f/2009/249/a/c/Red_and_Black_Vista_Wallpaper_by_Treber.jpghttpmsedge.exe735 B 686 B 7 6
HTTP Request
GET http://fc01.deviantart.net/fs47/f/2009/249/a/c/Red_and_Black_Vista_Wallpaper_by_Treber.jpgHTTP Response
301 -
35.165.70.199:80http://orig01.deviantart.net/2350/f/2009/249/a/c/red_and_black_vista_wallpaper_by_treber.jpghttpmsedge.exe737 B 439 B 7 6
HTTP Request
GET http://orig01.deviantart.net/2350/f/2009/249/a/c/red_and_black_vista_wallpaper_by_treber.jpgHTTP Response
404 -
13.107.21.237:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7b9244876c6a421982cbf73230ea6b67&localId=w:02CFF369-7177-605D-73C2-BA4DB418EA60&deviceId=6896204246996124&anid=tls, http22.0kB 9.3kB 21 19
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7b9244876c6a421982cbf73230ea6b67&localId=w:02CFF369-7177-605D-73C2-BA4DB418EA60&deviceId=6896204246996124&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=7b9244876c6a421982cbf73230ea6b67&localId=w:02CFF369-7177-605D-73C2-BA4DB418EA60&deviceId=6896204246996124&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7b9244876c6a421982cbf73230ea6b67&localId=w:02CFF369-7177-605D-73C2-BA4DB418EA60&deviceId=6896204246996124&anid=HTTP Response
204
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
64 B 129 B 1 1
DNS Request
counters.gigya.com
-
69 B 124 B 1 1
DNS Request
analytics.hosting24.com
-
65 B 113 B 1 1
DNS Request
fc01.deviantart.net
DNS Response
52.43.125.6954.212.131.15054.203.226.187
-
67 B 115 B 1 1
DNS Request
orig01.deviantart.net
DNS Response
35.165.70.19934.218.68.4654.189.14.144
-
71 B 157 B 1 1
DNS Request
68.32.126.40.in-addr.arpa
-
74 B 141 B 1 1
DNS Request
130.211.222.173.in-addr.arpa
-
56 B 151 B 1 1
DNS Request
g.bing.com
DNS Response
13.107.21.237204.79.197.237
-
71 B 133 B 1 1
DNS Request
69.125.43.52.in-addr.arpa
-
72 B 135 B 1 1
DNS Request
199.70.165.35.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
205.47.74.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
237.21.107.13.in-addr.arpa
-
515 B 8
-
70 B 144 B 1 1
DNS Request
86.23.85.13.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
56.126.166.20.in-addr.arpa
-
71 B 131 B 1 1
DNS Request
99.58.20.217.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
69.190.18.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
11.227.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
Filesize
6KB
MD563a00361383f29daab7798e208a4a6ee
SHA1d2f8da8dc7f86261711113be097a845eda054766
SHA2563a03519eb1175d8a75876b8bd857449730323716bb4b6c21dff922e09821a483
SHA512ce632b1713b25021dd49887c927af2cef61d5721c30c81565f16b5efd70ccc1caadc8f9cabb3fa2d26cb552af4fa3bbbd62e91fa0c844c70f2893b7a1afb032e
-
Filesize
6KB
MD5b2cf2822b80bc2aaebc8689868428c8a
SHA1e05a3bc7d12205e8bd068afef8c4a40d7a2f7f9c
SHA256546acadb028d90f3fe3e44b4ce42f79259db19764a9d6192e446008bc3e27744
SHA512b01ac624bb4fe7a26ea1938fea75eca10e83154feab59f455b0648d5d6ed0af48439654d858aa752329550dbe1ab4dee72d0f9cdebace2fe42fb2e1f55bf4249
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD55f5531b6dfaaa9d4ec88c2231d384b6a
SHA1f1b30127d9d986cb862965be8428ddac1332a80d
SHA2560a14afe78cd361f8f3639e2fa1c5246313b17f47666d113750446a149ac3ad1f
SHA5129e8a6565e6a8748c82c23d2ec04a7e301ad1d4bf77465c6fde4c3124eac84c9e10730bf8fc7a5b13141915f64a917cbfb2802feb6fde5855806916bfd61c5008