Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    214s
  • max time network
    234s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    20/02/2022, 05:42 UTC

General

  • Target

    748f2eb6ab11cdadd9a9db133aa4731c10de8c6a6f77d7da56a3e1e92615aa43.exe

  • Size

    205KB

  • MD5

    9a93f9da4f9556fde6ba47ed634bf5ca

  • SHA1

    56d1f6d60411119dbd5e58581af2440cc6acc78d

  • SHA256

    748f2eb6ab11cdadd9a9db133aa4731c10de8c6a6f77d7da56a3e1e92615aa43

  • SHA512

    9f77b6f8c0847d1a9f4aacd75bac316e204b1d18cf83d23fb189e0b6bc8ac06e1307cb0bea2d0d9d030d930fc22a9e661a6097f073168e6f3260978f7b614e9e

Score
10/10

Malware Config

Extracted

Path

C:\RyukReadMe.txt

Family

ryuk

Ransom Note
Your network has been penetrated. All files on each network host have been encrypted with a strong algorithm. Backups were encrypted too. Shadow copies also removed, so F8 or any other methods may damage encrypted data but not recover. Only we have exclusive decryption software, suitable for your situation. More than a year ago, world experts recognized the impossibility of such encryption deciphering by any means except the original decoder. No decryption software is available in the public. Antivirus companies, researchers, IT specialists, and any other persons cannot help you to decipher the data. Decryption takes from ten minutes up to several hours. It is performed automatically and doesn't require from you any actions except decoder launching. DO NOT RESET OR SHUTDOWN SYSTEM � files may be damaged. DO NOT DELETE readme files. To confirm our honest intentions. Send 2 different random files and you will get them back decrypted. It can be from different computers on your network to be sure that one key decrypts everything. We will unlock 2 files for free. To get info (decrypt your files) contact us a RemyngtonBourne@protonmail.com or Haniganagustine97@protonmail.com You will receive btc address for payment in the reply letter Ryuk No system is safe
Emails

RemyngtonBourne@protonmail.com

Haniganagustine97@protonmail.com

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops desktop.ini file(s) 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies data under HKEY_USERS 45 IoCs
  • Modifies registry class 8 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k UnistackSvcGroup
    1⤵
      PID:2224
    • C:\Windows\system32\taskhostw.exe
      taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
      1⤵
        PID:2276
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2816
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        PID:2948
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:2172
        • C:\Windows\system32\backgroundTaskHost.exe
          "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
          1⤵
            PID:2676
          • C:\Windows\System32\RuntimeBroker.exe
            C:\Windows\System32\RuntimeBroker.exe -Embedding
            1⤵
            • Modifies registry class
            PID:2932
          • C:\Windows\System32\RuntimeBroker.exe
            C:\Windows\System32\RuntimeBroker.exe -Embedding
            1⤵
              PID:3372
            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
              1⤵
                PID:3024
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                1⤵
                • Suspicious use of WriteProcessMemory
                PID:2712
                • C:\Windows\system32\WerFault.exe
                  C:\Windows\system32\WerFault.exe -u -p 2712 -s 1000
                  2⤵
                  • Program crash
                  PID:4316
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p
                1⤵
                  PID:2528
                • C:\Windows\system32\sihost.exe
                  sihost.exe
                  1⤵
                  • Drops desktop.ini file(s)
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2204
                  • C:\Windows\System32\net.exe
                    "C:\Windows\System32\net.exe" stop "spooler" /y
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4236
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 stop "spooler" /y
                      3⤵
                        PID:5784
                    • C:\Windows\System32\net.exe
                      "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3052
                      • C:\Windows\system32\net1.exe
                        C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                        3⤵
                          PID:5776
                      • C:\Windows\System32\net.exe
                        "C:\Windows\System32\net.exe" stop "samss" /y
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:5180
                        • C:\Windows\system32\net1.exe
                          C:\Windows\system32\net1 stop "samss" /y
                          3⤵
                            PID:5792
                        • C:\Windows\System32\net.exe
                          "C:\Windows\System32\net.exe" stop "spooler" /y
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:5800
                          • C:\Windows\system32\net1.exe
                            C:\Windows\system32\net1 stop "spooler" /y
                            3⤵
                              PID:3328
                          • C:\Windows\System32\net.exe
                            "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                            2⤵
                            • Suspicious use of WriteProcessMemory
                            PID:5108
                            • C:\Windows\system32\net1.exe
                              C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                              3⤵
                                PID:4612
                            • C:\Windows\System32\net.exe
                              "C:\Windows\System32\net.exe" stop "samss" /y
                              2⤵
                              • Suspicious use of WriteProcessMemory
                              PID:3744
                              • C:\Windows\system32\net1.exe
                                C:\Windows\system32\net1 stop "samss" /y
                                3⤵
                                  PID:5200
                              • C:\Windows\System32\net.exe
                                "C:\Windows\System32\net.exe" stop "spooler" /y
                                2⤵
                                  PID:6388
                                  • C:\Windows\system32\net1.exe
                                    C:\Windows\system32\net1 stop "spooler" /y
                                    3⤵
                                      PID:6440
                                  • C:\Windows\System32\net.exe
                                    "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                                    2⤵
                                      PID:6460
                                      • C:\Windows\system32\net1.exe
                                        C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                                        3⤵
                                          PID:6512
                                      • C:\Windows\System32\net.exe
                                        "C:\Windows\System32\net.exe" stop "samss" /y
                                        2⤵
                                          PID:6532
                                          • C:\Windows\system32\net1.exe
                                            C:\Windows\system32\net1 stop "samss" /y
                                            3⤵
                                              PID:6584
                                        • C:\Users\Admin\AppData\Local\Temp\748f2eb6ab11cdadd9a9db133aa4731c10de8c6a6f77d7da56a3e1e92615aa43.exe
                                          "C:\Users\Admin\AppData\Local\Temp\748f2eb6ab11cdadd9a9db133aa4731c10de8c6a6f77d7da56a3e1e92615aa43.exe"
                                          1⤵
                                          • Checks computer location settings
                                          • Drops desktop.ini file(s)
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:1540
                                          • C:\Windows\System32\net.exe
                                            "C:\Windows\System32\net.exe" stop "spooler" /y
                                            2⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:3148
                                            • C:\Windows\system32\net1.exe
                                              C:\Windows\system32\net1 stop "spooler" /y
                                              3⤵
                                                PID:5736
                                            • C:\Windows\System32\net.exe
                                              "C:\Windows\System32\net.exe" stop "spooler" /y
                                              2⤵
                                              • Suspicious use of WriteProcessMemory
                                              PID:4532
                                              • C:\Windows\system32\net1.exe
                                                C:\Windows\system32\net1 stop "spooler" /y
                                                3⤵
                                                  PID:5768
                                              • C:\Windows\System32\net.exe
                                                "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                                                2⤵
                                                • Suspicious use of WriteProcessMemory
                                                PID:5496
                                                • C:\Windows\system32\net1.exe
                                                  C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                                                  3⤵
                                                    PID:5824
                                                • C:\Windows\System32\net.exe
                                                  "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                                                  2⤵
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:5488
                                                  • C:\Windows\system32\net1.exe
                                                    C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                                                    3⤵
                                                      PID:5744
                                                  • C:\Windows\System32\net.exe
                                                    "C:\Windows\System32\net.exe" stop "samss" /y
                                                    2⤵
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:5840
                                                    • C:\Windows\system32\net1.exe
                                                      C:\Windows\system32\net1 stop "samss" /y
                                                      3⤵
                                                        PID:5992
                                                    • C:\Windows\System32\net.exe
                                                      "C:\Windows\System32\net.exe" stop "samss" /y
                                                      2⤵
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:5920
                                                      • C:\Windows\system32\net1.exe
                                                        C:\Windows\system32\net1 stop "samss" /y
                                                        3⤵
                                                          PID:6000
                                                      • C:\Windows\System32\net.exe
                                                        "C:\Windows\System32\net.exe" stop "spooler" /y
                                                        2⤵
                                                          PID:4504
                                                          • C:\Windows\system32\net1.exe
                                                            C:\Windows\system32\net1 stop "spooler" /y
                                                            3⤵
                                                              PID:1428
                                                          • C:\Windows\System32\net.exe
                                                            "C:\Windows\System32\net.exe" stop "spooler" /y
                                                            2⤵
                                                              PID:684
                                                              • C:\Windows\system32\net1.exe
                                                                C:\Windows\system32\net1 stop "spooler" /y
                                                                3⤵
                                                                  PID:3288
                                                              • C:\Windows\System32\net.exe
                                                                "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                                                                2⤵
                                                                  PID:1220
                                                                  • C:\Windows\system32\net1.exe
                                                                    C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                                                                    3⤵
                                                                      PID:5352
                                                                  • C:\Windows\System32\net.exe
                                                                    "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                                                                    2⤵
                                                                      PID:5104
                                                                      • C:\Windows\system32\net1.exe
                                                                        C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                                                                        3⤵
                                                                          PID:5080
                                                                      • C:\Windows\System32\net.exe
                                                                        "C:\Windows\System32\net.exe" stop "samss" /y
                                                                        2⤵
                                                                          PID:3788
                                                                          • C:\Windows\system32\net1.exe
                                                                            C:\Windows\system32\net1 stop "samss" /y
                                                                            3⤵
                                                                              PID:3476
                                                                          • C:\Windows\System32\net.exe
                                                                            "C:\Windows\System32\net.exe" stop "samss" /y
                                                                            2⤵
                                                                              PID:5148
                                                                              • C:\Windows\system32\net1.exe
                                                                                C:\Windows\system32\net1 stop "samss" /y
                                                                                3⤵
                                                                                  PID:1860
                                                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                              1⤵
                                                                              • Modifies registry class
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:4616
                                                                            • C:\Windows\System32\svchost.exe
                                                                              C:\Windows\System32\svchost.exe -k NetworkService -p
                                                                              1⤵
                                                                              • Drops file in Windows directory
                                                                              • Modifies data under HKEY_USERS
                                                                              PID:6072

                                                                            Network

                                                                            • flag-us
                                                                              GET
                                                                              http://crl4.digicert.com/DigiCertGlobalRootCA.crl
                                                                              Remote address:
                                                                              93.184.220.29:80
                                                                              Request
                                                                              GET /DigiCertGlobalRootCA.crl HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              Accept: */*
                                                                              User-Agent: Microsoft-CryptoAPI/10.0
                                                                              Host: crl4.digicert.com
                                                                              Response
                                                                              HTTP/1.1 200 OK
                                                                              Accept-Ranges: bytes
                                                                              Age: 2245
                                                                              Cache-Control: max-age=10800
                                                                              Content-Type: application/pkix-crl
                                                                              Date: Sun, 20 Feb 2022 06:08:41 GMT
                                                                              Etag: "455141192"
                                                                              Expires: Sun, 20 Feb 2022 09:08:41 GMT
                                                                              Last-Modified: Wed, 16 Feb 2022 21:15:06 GMT
                                                                              Server: ECS (amb/6B91)
                                                                              X-Cache: HIT
                                                                              Content-Length: 631
                                                                            • flag-us
                                                                              DNS
                                                                              geo.prod.do.dsp.mp.microsoft.com
                                                                              NetworkService
                                                                              Remote address:
                                                                              8.8.8.8:53
                                                                              Request
                                                                              geo.prod.do.dsp.mp.microsoft.com
                                                                              IN A
                                                                              Response
                                                                              geo.prod.do.dsp.mp.microsoft.com
                                                                              IN CNAME
                                                                              geo.prod.do.dsp.trafficmanager.net
                                                                              geo.prod.do.dsp.trafficmanager.net
                                                                              IN CNAME
                                                                              array608.prod.do.dsp.mp.microsoft.com
                                                                              array608.prod.do.dsp.mp.microsoft.com
                                                                              IN A
                                                                              51.104.167.245
                                                                            • flag-us
                                                                              DNS
                                                                              kv801.prod.do.dsp.mp.microsoft.com
                                                                              NetworkService
                                                                              Remote address:
                                                                              8.8.8.8:53
                                                                              Request
                                                                              kv801.prod.do.dsp.mp.microsoft.com
                                                                              IN A
                                                                              Response
                                                                              kv801.prod.do.dsp.mp.microsoft.com
                                                                              IN CNAME
                                                                              kv801.prod.do.dsp.mp.microsoft.com.edgekey.net
                                                                              kv801.prod.do.dsp.mp.microsoft.com.edgekey.net
                                                                              IN CNAME
                                                                              e12437.g.akamaiedge.net
                                                                              e12437.g.akamaiedge.net
                                                                              IN A
                                                                              184.29.205.60
                                                                            • flag-nl
                                                                              GET
                                                                              https://kv801.prod.do.dsp.mp.microsoft.com/all?doClientVersion=10.0.19041.1266&countryCode=US&profile=256&CacheId=1
                                                                              NetworkService
                                                                              Remote address:
                                                                              184.29.205.60:443
                                                                              Request
                                                                              GET /all?doClientVersion=10.0.19041.1266&countryCode=US&profile=256&CacheId=1 HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              Accept: */*
                                                                              Accept-Encoding: gzip, deflate
                                                                              User-Agent: Microsoft-Delivery-Optimization/10.0
                                                                              MS-CV: WsWKO+E/RUSI2oiZ.2.1.1
                                                                              Content-Length: 0
                                                                              Host: kv801.prod.do.dsp.mp.microsoft.com
                                                                              Response
                                                                              HTTP/1.1 200 OK
                                                                              Content-Type: text/json
                                                                              Server: Microsoft-IIS/10.0
                                                                              X-AspNet-Version: 4.0.30319
                                                                              X-Powered-By: ASP.NET
                                                                              Vary: Accept-Encoding
                                                                              Content-Encoding: gzip
                                                                              Content-Length: 808
                                                                              Cache-Control: max-age=322
                                                                              Date: Sun, 20 Feb 2022 06:11:19 GMT
                                                                              Connection: keep-alive
                                                                            • flag-us
                                                                              DNS
                                                                              cp801.prod.do.dsp.mp.microsoft.com
                                                                              NetworkService
                                                                              Remote address:
                                                                              8.8.8.8:53
                                                                              Request
                                                                              cp801.prod.do.dsp.mp.microsoft.com
                                                                              IN A
                                                                              Response
                                                                              cp801.prod.do.dsp.mp.microsoft.com
                                                                              IN CNAME
                                                                              cp801.prod.do.dsp.mp.microsoft.com.edgekey.net
                                                                              cp801.prod.do.dsp.mp.microsoft.com.edgekey.net
                                                                              IN CNAME
                                                                              e12437.g.akamaiedge.net
                                                                              e12437.g.akamaiedge.net
                                                                              IN A
                                                                              184.29.205.60
                                                                            • flag-nl
                                                                              GET
                                                                              https://cp801.prod.do.dsp.mp.microsoft.com/v3/content?Id=aqNSTVn6Z-S11CUPqJBC6j-rNd-FvNcwi4vtViIWIhg%253D&doClientVersion=10.0.19041.1266&altCatalogId=http%3A%2F%2Fmsedge.b.tlu.dl.delivery.mp.microsoft.com%2Ffilestreamingservice%2Ffiles%2F1f45075c-2899-44e9-9bd8-03649da92f34&countryCode=US&profile=256&CacheId=1
                                                                              NetworkService
                                                                              Remote address:
                                                                              184.29.205.60:443
                                                                              Request
                                                                              GET /v3/content?Id=aqNSTVn6Z-S11CUPqJBC6j-rNd-FvNcwi4vtViIWIhg%253D&doClientVersion=10.0.19041.1266&altCatalogId=http%3A%2F%2Fmsedge.b.tlu.dl.delivery.mp.microsoft.com%2Ffilestreamingservice%2Ffiles%2F1f45075c-2899-44e9-9bd8-03649da92f34&countryCode=US&profile=256&CacheId=1 HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              Accept: */*
                                                                              Accept-Encoding: gzip, deflate
                                                                              User-Agent: Microsoft-Delivery-Optimization/10.0
                                                                              MS-CV: fGaNESRY70uPCuTNchFYQw.0.2.8.1.1.1
                                                                              Content-Length: 0
                                                                              Host: cp801.prod.do.dsp.mp.microsoft.com
                                                                              Response
                                                                              HTTP/1.1 200 OK
                                                                              Content-Type: text/json
                                                                              Server: Microsoft-IIS/10.0
                                                                              X-AspNet-Version: 4.0.30319
                                                                              X-Powered-By: ASP.NET
                                                                              Vary: Accept-Encoding
                                                                              Content-Encoding: gzip
                                                                              Content-Length: 373
                                                                              Cache-Control: max-age=35073
                                                                              Date: Sun, 20 Feb 2022 06:11:29 GMT
                                                                              Connection: keep-alive
                                                                            • 93.184.220.29:80
                                                                              260 B
                                                                              5
                                                                            • 93.184.220.29:80
                                                                              322 B
                                                                              7
                                                                            • 93.184.220.29:80
                                                                              http://crl4.digicert.com/DigiCertGlobalRootCA.crl
                                                                              http
                                                                              464 B
                                                                              1.2kB
                                                                              7
                                                                              5

                                                                              HTTP Request

                                                                              GET http://crl4.digicert.com/DigiCertGlobalRootCA.crl

                                                                              HTTP Response

                                                                              200
                                                                            • 51.104.167.245:443
                                                                              geo.prod.do.dsp.mp.microsoft.com
                                                                              tls, https
                                                                              NetworkService
                                                                              1.2kB
                                                                              3.5kB
                                                                              12
                                                                              9
                                                                            • 184.29.205.60:443
                                                                              https://kv801.prod.do.dsp.mp.microsoft.com/all?doClientVersion=10.0.19041.1266&countryCode=US&profile=256&CacheId=1
                                                                              tls, http
                                                                              NetworkService
                                                                              1.0kB
                                                                              7.7kB
                                                                              8
                                                                              11

                                                                              HTTP Request

                                                                              GET https://kv801.prod.do.dsp.mp.microsoft.com/all?doClientVersion=10.0.19041.1266&countryCode=US&profile=256&CacheId=1

                                                                              HTTP Response

                                                                              200
                                                                            • 184.29.205.60:443
                                                                              https://cp801.prod.do.dsp.mp.microsoft.com/v3/content?Id=aqNSTVn6Z-S11CUPqJBC6j-rNd-FvNcwi4vtViIWIhg%253D&doClientVersion=10.0.19041.1266&altCatalogId=http%3A%2F%2Fmsedge.b.tlu.dl.delivery.mp.microsoft.com%2Ffilestreamingservice%2Ffiles%2F1f45075c-2899-44e9-9bd8-03649da92f34&countryCode=US&profile=256&CacheId=1
                                                                              tls, http
                                                                              NetworkService
                                                                              1.2kB
                                                                              7.2kB
                                                                              8
                                                                              11

                                                                              HTTP Request

                                                                              GET https://cp801.prod.do.dsp.mp.microsoft.com/v3/content?Id=aqNSTVn6Z-S11CUPqJBC6j-rNd-FvNcwi4vtViIWIhg%253D&doClientVersion=10.0.19041.1266&altCatalogId=http%3A%2F%2Fmsedge.b.tlu.dl.delivery.mp.microsoft.com%2Ffilestreamingservice%2Ffiles%2F1f45075c-2899-44e9-9bd8-03649da92f34&countryCode=US&profile=256&CacheId=1

                                                                              HTTP Response

                                                                              200
                                                                            • 8.8.8.8:53
                                                                              geo.prod.do.dsp.mp.microsoft.com
                                                                              dns
                                                                              NetworkService
                                                                              78 B
                                                                              165 B
                                                                              1
                                                                              1

                                                                              DNS Request

                                                                              geo.prod.do.dsp.mp.microsoft.com

                                                                              DNS Response

                                                                              51.104.167.245

                                                                            • 8.8.8.8:53
                                                                              kv801.prod.do.dsp.mp.microsoft.com
                                                                              dns
                                                                              NetworkService
                                                                              80 B
                                                                              190 B
                                                                              1
                                                                              1

                                                                              DNS Request

                                                                              kv801.prod.do.dsp.mp.microsoft.com

                                                                              DNS Response

                                                                              184.29.205.60

                                                                            • 8.8.8.8:53
                                                                              cp801.prod.do.dsp.mp.microsoft.com
                                                                              dns
                                                                              NetworkService
                                                                              80 B
                                                                              190 B
                                                                              1
                                                                              1

                                                                              DNS Request

                                                                              cp801.prod.do.dsp.mp.microsoft.com

                                                                              DNS Response

                                                                              184.29.205.60

                                                                            MITRE ATT&CK Enterprise v6

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • memory/2204-131-0x00007FF70BD10000-0x00007FF70C0A6000-memory.dmp

                                                                              Filesize

                                                                              3.6MB

                                                                            • memory/2224-132-0x00007FF70BD10000-0x00007FF70C0A6000-memory.dmp

                                                                              Filesize

                                                                              3.6MB

                                                                            • memory/2712-150-0x000001F617080000-0x000001F617088000-memory.dmp

                                                                              Filesize

                                                                              32KB

                                                                            • memory/2712-152-0x000001F617070000-0x000001F617071000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            We care about your privacy.

                                                                            This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.