Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 08:15 UTC
Static task
static1
Behavioral task
behavioral1
Sample
09b8d1e01ea233d38b3b4c7eb6278b7f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
09b8d1e01ea233d38b3b4c7eb6278b7f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
09b8d1e01ea233d38b3b4c7eb6278b7f_JaffaCakes118.html
-
Size
79KB
-
MD5
09b8d1e01ea233d38b3b4c7eb6278b7f
-
SHA1
65cb693e6338782212b39f69bf567f45d2c53915
-
SHA256
0cda1c9074d9e57271362a4b745018f16b89ecf19723448b21f5e6a6369a43e1
-
SHA512
4305a1cd223f441a9d43321c4a28d8eecce25508310bdb8f8b3a4d5a657c6753637ac31aaff0b2a22283f074c8fb569b677300d8257ecc773484c5f70763bf2d
-
SSDEEP
1536:3u06PWQI9t8byMePIuDbAEx4LAfaPzDlphlpHlp6RSE:l6PWWAfabxpTpFpW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 1780 msedge.exe 1780 msedge.exe 4056 identity_helper.exe 4056 identity_helper.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1780 wrote to memory of 1732 1780 msedge.exe 82 PID 1780 wrote to memory of 1732 1780 msedge.exe 82 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 844 1780 msedge.exe 83 PID 1780 wrote to memory of 2656 1780 msedge.exe 84 PID 1780 wrote to memory of 2656 1780 msedge.exe 84 PID 1780 wrote to memory of 1400 1780 msedge.exe 85 PID 1780 wrote to memory of 1400 1780 msedge.exe 85 PID 1780 wrote to memory of 1400 1780 msedge.exe 85 PID 1780 wrote to memory of 1400 1780 msedge.exe 85 PID 1780 wrote to memory of 1400 1780 msedge.exe 85 PID 1780 wrote to memory of 1400 1780 msedge.exe 85 PID 1780 wrote to memory of 1400 1780 msedge.exe 85 PID 1780 wrote to memory of 1400 1780 msedge.exe 85 PID 1780 wrote to memory of 1400 1780 msedge.exe 85 PID 1780 wrote to memory of 1400 1780 msedge.exe 85 PID 1780 wrote to memory of 1400 1780 msedge.exe 85 PID 1780 wrote to memory of 1400 1780 msedge.exe 85 PID 1780 wrote to memory of 1400 1780 msedge.exe 85 PID 1780 wrote to memory of 1400 1780 msedge.exe 85 PID 1780 wrote to memory of 1400 1780 msedge.exe 85 PID 1780 wrote to memory of 1400 1780 msedge.exe 85 PID 1780 wrote to memory of 1400 1780 msedge.exe 85 PID 1780 wrote to memory of 1400 1780 msedge.exe 85 PID 1780 wrote to memory of 1400 1780 msedge.exe 85 PID 1780 wrote to memory of 1400 1780 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\09b8d1e01ea233d38b3b4c7eb6278b7f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff540d46f8,0x7fff540d4708,0x7fff540d47182⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,6434468154924233074,12863095981719434798,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,6434468154924233074,12863095981719434798,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,6434468154924233074,12863095981719434798,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6434468154924233074,12863095981719434798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6434468154924233074,12863095981719434798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,6434468154924233074,12863095981719434798,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,6434468154924233074,12863095981719434798,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6434468154924233074,12863095981719434798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6434468154924233074,12863095981719434798,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6434468154924233074,12863095981719434798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6434468154924233074,12863095981719434798,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,6434468154924233074,12863095981719434798,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2344
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4728
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:932
Network
-
Remote address:8.8.8.8:53Requestam15.netIN AResponseam15.netIN A95.216.240.214am15.netIN A95.216.224.23am15.netIN A95.216.240.254am15.netIN A95.216.224.48am15.netIN A95.216.225.17
-
Remote address:95.216.240.214:80RequestGET /sb.php?s=45130 HTTP/1.1
Host: am15.net
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
DNT: 1
Accept: */*
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Date: Wed, 02 Oct 2024 08:15:44 GMT
Content-Type: text/javascript; charset=windows-1251
Transfer-Encoding: chunked
Connection: keep-alive
X-Powered-By: PHP/7.1.27-1+ubuntu16.04.1+deb.sury.org+1
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires: Tue, 01 Jan 2000 00:00:00 GMT
Last-Modified: Wed, 02 Oct 2024 08:15:44 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: wsb=10500; expires=Wed, 02-Oct-2024 18:15:44 GMT; Max-Age=36000; path=/; domain=.am15.net
Content-Encoding: gzip
-
Remote address:172.217.169.78:80RequestGET /ga.js HTTP/1.1
Host: www.google-analytics.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
DNT: 1
Accept: */*
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
X-Content-Type-Options: nosniff
Content-Encoding: gzip
Cross-Origin-Resource-Policy: cross-origin
Server: Golfe2
Content-Length: 17168
Content-Security-Policy-Report-Only: script-src 'none'; form-action 'none'; frame-src 'none'; report-uri https://csp.withgoogle.com/csp/scaffolding/ascnsrsgac:215:0
Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to=coop_reporting
Report-To: {"group":"coop_reporting","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/scaffolding/ascnsrsgac:215:0"}],}
Date: Wed, 02 Oct 2024 07:37:11 GMT
Expires: Wed, 02 Oct 2024 09:37:11 GMT
Cache-Control: public, max-age=7200
Age: 2313
Last-Modified: Tue, 12 Dec 2023 18:09:08 GMT
Content-Type: text/javascript
Vary: Accept-Encoding
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestfl1.yep.comIN AResponse
-
Remote address:8.8.8.8:53Requestam15.netIN AResponseam15.netIN A95.216.240.254am15.netIN A95.216.224.48am15.netIN A95.216.240.214am15.netIN A95.216.225.17am15.netIN A95.216.224.23
-
Remote address:8.8.8.8:53Requestcountbiz.ruIN AResponse
-
Remote address:8.8.8.8:53Requestopenstat.netIN AResponseopenstat.netIN A172.67.176.207openstat.netIN A104.21.17.138
-
Remote address:8.8.8.8:53Requestmc.yandex.ruIN AResponsemc.yandex.ruIN A77.88.21.119mc.yandex.ruIN A93.158.134.119mc.yandex.ruIN A87.250.251.119mc.yandex.ruIN A87.250.250.119
-
Remote address:77.88.21.119:80RequestGET /metrika/watch.js HTTP/1.1
Host: mc.yandex.ru
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
DNT: 1
Accept: */*
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 302 Moved temporarily
Location: https://mc.yandex.ru/metrika/watch.js
-
Remote address:172.67.176.207:80RequestGET /cnt.js HTTP/1.1
Host: openstat.net
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
DNT: 1
Accept: */*
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 301 Moved Permanently
Content-Type: text/html
Content-Length: 167
Connection: keep-alive
Cache-Control: max-age=3600
Expires: Wed, 02 Oct 2024 09:15:45 GMT
Location: https://openstat.net/cnt.js
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=N7TmRP3d2e5USPySpu310MtCNL3M3GMj4NBNyhxoM9%2BSdUbwc6tI8gO0n0%2BV9bx9l8C1J%2F5Tw40A8ojl0zR9jLQ0f%2BDyQdCTGGD%2B6Ftv1JJbgOFiQNQE%2BwyuK6%2B8j64%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Vary: Accept-Encoding
Speculation-Rules: "/cdn-cgi/speculation"
Server: cloudflare
CF-RAY: 8cc33f123b68654a-LHR
-
Remote address:172.67.176.207:443RequestGET /cnt.js HTTP/2.0
host: openstat.net
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
dnt: 1
accept: */*
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: script
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 404
content-type: text/html
cache-control: max-age=14400
cf-cache-status: STALE
age: 1153560
report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2TWo96jhi%2BpBogOguwkLy5%2F1X%2BTtHpLX%2B3gCEglCaO76yO3%2BEe2fRFk3TH5NFlvS1KXBX47DMKCTQ89aRGC8nW2KqLukLOeeMw2iYGHCOzG7P1vBPC4uQ8cQnXkS84g%3D"}],"group":"cf-nel","max_age":604800}
nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
vary: Accept-Encoding
speculation-rules: "/cdn-cgi/speculation"
server: cloudflare
cf-ray: 8cc33f134fdfcd48-LHR
content-encoding: br
alt-svc: h3=":443"; ma=86400
-
Remote address:77.88.21.119:443RequestGET /metrika/watch.js HTTP/2.0
host: mc.yandex.ru
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
dnt: 1
accept: */*
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: script
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Request78.169.217.172.in-addr.arpaIN PTRResponse78.169.217.172.in-addr.arpaIN PTRlhr48s09-in-f141e100net
-
Remote address:8.8.8.8:53Request67.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request214.240.216.95.in-addr.arpaIN PTRResponse214.240.216.95.in-addr.arpaIN PTRstatic21424021695clientsyour-serverde
-
Remote address:8.8.8.8:53Request207.176.67.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request119.21.88.77.in-addr.arpaIN PTRResponse119.21.88.77.in-addr.arpaIN PTRmcyandexru
-
Remote address:8.8.8.8:53Requestmc.yandex.comIN AResponsemc.yandex.comIN CNAMEmc.yandex.rumc.yandex.ruIN A87.250.250.119mc.yandex.ruIN A93.158.134.119mc.yandex.ruIN A87.250.251.119mc.yandex.ruIN A77.88.21.119
-
Remote address:8.8.8.8:53Request149.220.183.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesta.nel.cloudflare.comIN AResponsea.nel.cloudflare.comIN A35.190.80.1
-
OPTIONShttps://a.nel.cloudflare.com/report/v4?s=2TWo96jhi%2BpBogOguwkLy5%2F1X%2BTtHpLX%2B3gCEglCaO76yO3%2BEe2fRFk3TH5NFlvS1KXBX47DMKCTQ89aRGC8nW2KqLukLOeeMw2iYGHCOzG7P1vBPC4uQ8cQnXkS84g%3Dmsedge.exeRemote address:35.190.80.1:443RequestOPTIONS /report/v4?s=2TWo96jhi%2BpBogOguwkLy5%2F1X%2BTtHpLX%2B3gCEglCaO76yO3%2BEe2fRFk3TH5NFlvS1KXBX47DMKCTQ89aRGC8nW2KqLukLOeeMw2iYGHCOzG7P1vBPC4uQ8cQnXkS84g%3D HTTP/2.0
host: a.nel.cloudflare.com
origin: https://openstat.net
access-control-request-method: POST
access-control-request-headers: content-type
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
POSThttps://a.nel.cloudflare.com/report/v4?s=2TWo96jhi%2BpBogOguwkLy5%2F1X%2BTtHpLX%2B3gCEglCaO76yO3%2BEe2fRFk3TH5NFlvS1KXBX47DMKCTQ89aRGC8nW2KqLukLOeeMw2iYGHCOzG7P1vBPC4uQ8cQnXkS84g%3Dmsedge.exeRemote address:35.190.80.1:443RequestPOST /report/v4?s=2TWo96jhi%2BpBogOguwkLy5%2F1X%2BTtHpLX%2B3gCEglCaO76yO3%2BEe2fRFk3TH5NFlvS1KXBX47DMKCTQ89aRGC8nW2KqLukLOeeMw2iYGHCOzG7P1vBPC4uQ8cQnXkS84g%3D HTTP/2.0
host: a.nel.cloudflare.com
content-length: 405
content-type: application/reports+json
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Request1.80.190.35.in-addr.arpaIN PTRResponse1.80.190.35.in-addr.arpaIN PTR18019035bcgoogleusercontentcom
-
Remote address:8.8.8.8:53Requestw10500.am15.netIN AResponsew10500.am15.netIN A95.216.240.214
-
Remote address:8.8.8.8:53Requestw10500.am15.netIN AResponsew10500.am15.netIN A95.216.240.214
-
Remote address:8.8.8.8:53Requestyep.comIN AResponseyep.comIN A104.18.41.17yep.comIN A172.64.146.239
-
Remote address:104.18.41.17:80RequestGET /favicon_ru.ico HTTP/1.1
Host: yep.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
DNT: 1
Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 301 Moved Permanently
Content-Type: text/html
Content-Length: 167
Connection: keep-alive
Cache-Control: max-age=3600
Expires: Wed, 02 Oct 2024 09:16:10 GMT
Location: https://yep.com/favicon_ru.ico
Set-Cookie: __cf_bm=qOHwVIpIH08zUTmC2gstTtYGflluL.hAUQ9Bkv78TRc-1727856970-1.0.1.1-ssMQ3lx1Blp7LMFXckuA3y9k_lNBnCqqfBRYVmpVQOy_kFkGSWmBpHo2zVCo.Unzz0RKNRd26hI6.20qcIPIaw; path=/; expires=Wed, 02-Oct-24 08:46:10 GMT; domain=.yep.com; HttpOnly
Vary: Accept-Encoding
Server: cloudflare
CF-RAY: 8cc33fb33f4d93e9-LHR
-
Remote address:104.18.41.17:443RequestGET /favicon_ru.ico HTTP/2.0
host: yep.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
dnt: 1
accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: image
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 404
content-type: text/html; charset=utf-8
last-modified: Mon, 24 Jun 2024 04:28:25 GMT
cf-cache-status: EXPIRED
expires: Wed, 02 Oct 2024 12:16:11 GMT
cache-control: public, max-age=14400
set-cookie: __cf_bm=azeEdduJu857xwkicV_aIW1hFWdorgkdZxV4R2UAQJw-1727856971-1.0.1.1-zMb.1iOw.dO5oWX_TPUq_zu.lsBbwS60NDQ7psQ8pzBAbPLNSu3dRdt5P79djSAZQmlVN4f_kX3ETUqGORdXuw; path=/; expires=Wed, 02-Oct-24 08:46:11 GMT; domain=.yep.com; HttpOnly; Secure; SameSite=None
vary: Accept-Encoding
server: cloudflare
cf-ray: 8cc33fb55fecbf0f-LHR
content-encoding: br
-
Remote address:8.8.8.8:53Request17.41.18.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request197.87.175.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request29.243.111.52.in-addr.arpaIN PTRResponse
-
579 B 1.5kB 6 5
HTTP Request
GET http://am15.net/sb.php?s=45130HTTP Response
200 -
908 B 18.8kB 13 19
HTTP Request
GET http://www.google-analytics.com/ga.jsHTTP Response
200 -
260 B 5
-
260 B 200 B 5 5
-
631 B 390 B 7 6
HTTP Request
GET http://mc.yandex.ru/metrika/watch.jsHTTP Response
302 -
621 B 1.1kB 7 6
HTTP Request
GET http://openstat.net/cnt.jsHTTP Response
301 -
1.5kB 4.1kB 13 13
HTTP Request
GET https://openstat.net/cnt.jsHTTP Response
404 -
6.3kB 69.0kB 51 72
HTTP Request
GET https://mc.yandex.ru/metrika/watch.js -
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 5
-
260 B 200 B 5 5
-
260 B 5
-
35.190.80.1:443https://a.nel.cloudflare.com/report/v4?s=2TWo96jhi%2BpBogOguwkLy5%2F1X%2BTtHpLX%2B3gCEglCaO76yO3%2BEe2fRFk3TH5NFlvS1KXBX47DMKCTQ89aRGC8nW2KqLukLOeeMw2iYGHCOzG7P1vBPC4uQ8cQnXkS84g%3Dtls, http2msedge.exe2.6kB 4.9kB 17 19
HTTP Request
OPTIONS https://a.nel.cloudflare.com/report/v4?s=2TWo96jhi%2BpBogOguwkLy5%2F1X%2BTtHpLX%2B3gCEglCaO76yO3%2BEe2fRFk3TH5NFlvS1KXBX47DMKCTQ89aRGC8nW2KqLukLOeeMw2iYGHCOzG7P1vBPC4uQ8cQnXkS84g%3DHTTP Request
POST https://a.nel.cloudflare.com/report/v4?s=2TWo96jhi%2BpBogOguwkLy5%2F1X%2BTtHpLX%2B3gCEglCaO76yO3%2BEe2fRFk3TH5NFlvS1KXBX47DMKCTQ89aRGC8nW2KqLukLOeeMw2iYGHCOzG7P1vBPC4uQ8cQnXkS84g%3D -
260 B 200 B 5 5
-
628 B 971 B 6 5
HTTP Request
GET http://yep.com/favicon_ru.icoHTTP Response
301 -
1.7kB 12.4kB 16 19
HTTP Request
GET https://yep.com/favicon_ru.icoHTTP Response
404
-
54 B 134 B 1 1
DNS Request
am15.net
DNS Response
95.216.240.21495.216.224.2395.216.240.25495.216.224.4895.216.225.17
-
73 B 147 B 1 1
DNS Request
196.249.167.52.in-addr.arpa
-
57 B 116 B 1 1
DNS Request
fl1.yep.com
-
54 B 134 B 1 1
DNS Request
am15.net
DNS Response
95.216.240.25495.216.224.4895.216.240.21495.216.225.1795.216.224.23
-
57 B 118 B 1 1
DNS Request
countbiz.ru
-
58 B 90 B 1 1
DNS Request
openstat.net
DNS Response
172.67.176.207104.21.17.138
-
58 B 122 B 1 1
DNS Request
mc.yandex.ru
DNS Response
77.88.21.11993.158.134.11987.250.251.11987.250.250.119
-
73 B 112 B 1 1
DNS Request
78.169.217.172.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
67.31.126.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
73 B 131 B 1 1
DNS Request
214.240.216.95.in-addr.arpa
-
73 B 135 B 1 1
DNS Request
207.176.67.172.in-addr.arpa
-
71 B 97 B 1 1
DNS Request
119.21.88.77.in-addr.arpa
-
59 B 149 B 1 1
DNS Request
mc.yandex.com
DNS Response
87.250.250.11993.158.134.11987.250.251.11977.88.21.119
-
582 B 9
-
73 B 147 B 1 1
DNS Request
149.220.183.52.in-addr.arpa
-
66 B 82 B 1 1
DNS Request
a.nel.cloudflare.com
DNS Response
35.190.80.1
-
1.7kB 3.9kB 4 6
-
70 B 120 B 1 1
DNS Request
1.80.190.35.in-addr.arpa
-
61 B 77 B 1 1
DNS Request
w10500.am15.net
DNS Response
95.216.240.214
-
61 B 77 B 1 1
DNS Request
w10500.am15.net
DNS Response
95.216.240.214
-
53 B 85 B 1 1
DNS Request
yep.com
DNS Response
104.18.41.17172.64.146.239
-
71 B 133 B 1 1
DNS Request
17.41.18.104.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
197.87.175.4.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
29.243.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
604B
MD564e85931bee8e4856c5ef3b5d31f6f6e
SHA111cba857230cbbd99f1b6396d28796e34fac34ee
SHA256b4a982a3d7b937415f20bccfe647eb1b133fd9e5cc10215b8e502748c82992c6
SHA512dac972fa6d4789e140277399f206d0aeebf83d81b5d0a42ddfcc4bf2366b577132cc9cc196c68a5695d68afce49628cd834e000918f1ffc1841f4f228216fb7a
-
Filesize
6KB
MD56cb729e18169fe907d5f948074a247f4
SHA1f55c08260a417a832c7ecdcb45e344cd156a18bf
SHA256ead5a21458af9ada3b902b0f58e44a51a9e7ec7385b39014ca18ad6df5dd5fd5
SHA512ca9aeb020c0484e5037260e574c9884fe70b792a09334929327f152e86786f224ec67cc5e64cad40556ff5dd43a82fae45afe23d9ac0839d322f0e4a5331c876
-
Filesize
5KB
MD5a8a51d9cd49277114753ac50b2796587
SHA15e58737dcde35a7f65ecf1aee4c077fc91b9a8f4
SHA2564defd45ea0ebbe45f138c44c0741b3515722a100b0835c1229060c494cd941cb
SHA5124690db86542ad31f15a81bae090400a5a128e15caa84f5ed554f24ddb0bef8d47dac74b7c4fbaac43aae02d3015c2b2042085a0a53598341b21eba27255f200e
-
Filesize
6KB
MD533f9f7f79d33b70a325b5c911a2d5959
SHA16788bb2c715f0ae54a659e81878122f7741befca
SHA256c06bcf6939c8818ce5cecabc1e6fc462526939b635fcc4baee43d133b841fb69
SHA512f35656bf3ee667b34470b3398f7d8e8187bdafe306700a0a2f0e55b11e2b8b4eef859d3e0d6b85df3963a14b0982bc51eaf284e99830ee37e21902178c696309
-
Filesize
372B
MD5e00ddbbc99284ddb271907916b5988b6
SHA126fe502caf3a38af2bd88b45357b1cf80391b7cd
SHA2560f344afd7a8e8a3d5310c8e32ea1aa6295239a1b997e935546fbc012395f98e3
SHA5124678a86c34e4cff19e90c534b55b38541c8e75f20a713268eb7ecffaf5eac4ef5301d50885cfcacea22a4495eb45418376586a6b4ed83d0ae5bf95659403aa6f
-
Filesize
372B
MD50b063ddc13133931ec51c350065ac855
SHA1e7032a896f45d35cdbd7dd9645949a7123cb898c
SHA256aa087c446ec411bd5916f41aed477cd61bb17c90e3a07d68a0e0969c2a566498
SHA5122bb36c3dffd395f6a367ca316b4de2bea1105fccd2d315fe6d7bc68797c1ca560af33b3a1978237e39a7503f4d77a1a397fc61eceed218ee4a4279b311ab96a8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5918cd49a3409081bbdab0db4968f90bf
SHA1d8a668df79031f8ede9c0d5beb2544b94d9e4793
SHA2563b51944284e25db49abe2494b78b67696eccbe92ff7a4488034a65f09f32c191
SHA512f05ba69c54cca6e2035c3f915b2aae2aea522923c494a9ba4829963fdd8214f8e6f1915c8fb2bf640d91026b1353ab9c0a37a0b8964b422b8fb52d17699cd702