Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 13:45 UTC
Static task
static1
Behavioral task
behavioral1
Sample
ac44be360811ad7bedb0985b6c0283e2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ac44be360811ad7bedb0985b6c0283e2.exe
Resource
win10v2004-20231215-en
General
-
Target
ac44be360811ad7bedb0985b6c0283e2.exe
-
Size
116KB
-
MD5
ac44be360811ad7bedb0985b6c0283e2
-
SHA1
77a62a4f616ea73976a266010ba59f5b75d0211a
-
SHA256
9eb7d6b504aa4033118f7c0848869b1529f60c397a450e6f66f6772717de5575
-
SHA512
b813f5e37d0c0bbc81ccf6fe9f12e23ab26b0e11221240e25215313a92bcb20c6c227f3d3ce414d6754f6d0f90aa023f989d0d530d64c9beb42207b947171950
-
SSDEEP
1536:X/0TcIg9MtpJFmAGUk+++pZgGEbplftRkDhfdxoMqYjFe1Jsl0KuwOZZZZH1gMiV:P0TUMBFmAGUIRsjsO0xdZZZZVg3x
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ac44be360811ad7bedb0985b6c0283e2.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cauofi.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation ac44be360811ad7bedb0985b6c0283e2.exe -
Executes dropped EXE 1 IoCs
pid Process 4896 cauofi.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /w" ac44be360811ad7bedb0985b6c0283e2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /f" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /m" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /a" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /k" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /u" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /g" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /b" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /l" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /j" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /v" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /p" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /y" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /x" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /d" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /e" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /c" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /s" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /z" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /t" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /w" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /h" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /i" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /o" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /r" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /q" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /n" cauofi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4936 ac44be360811ad7bedb0985b6c0283e2.exe 4936 ac44be360811ad7bedb0985b6c0283e2.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4936 ac44be360811ad7bedb0985b6c0283e2.exe 4896 cauofi.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4936 wrote to memory of 4896 4936 ac44be360811ad7bedb0985b6c0283e2.exe 96 PID 4936 wrote to memory of 4896 4936 ac44be360811ad7bedb0985b6c0283e2.exe 96 PID 4936 wrote to memory of 4896 4936 ac44be360811ad7bedb0985b6c0283e2.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac44be360811ad7bedb0985b6c0283e2.exe"C:\Users\Admin\AppData\Local\Temp\ac44be360811ad7bedb0985b6c0283e2.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\cauofi.exe"C:\Users\Admin\cauofi.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4896
-
Network
-
Remote address:8.8.8.8:53Request79.121.231.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request79.121.231.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request173.178.17.96.in-addr.arpaIN PTRResponse173.178.17.96.in-addr.arpaIN PTRa96-17-178-173deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request0.181.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.136.104.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.136.104.51.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request2.136.104.51.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Requestns1.musiczipz.comIN AResponse
-
Remote address:8.8.8.8:53Requestns1.musicmixa.netIN AResponse
-
Remote address:8.8.8.8:53Requestns1.musicmixa.orgIN AResponse
-
Remote address:8.8.8.8:53Requestns1.musicmixa.orgIN A
-
Remote address:8.8.8.8:53Requestns1.musicmixb.coIN AResponse
-
Remote address:8.8.8.8:53Requestns1.musicmixc.comIN AResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request217.135.221.88.in-addr.arpaIN PTRResponse217.135.221.88.in-addr.arpaIN PTRa88-221-135-217deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
Remote address:8.8.8.8:53Request57.169.31.20.in-addr.arpaIN PTRResponse
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301687_13GOH55SKYYKR3YGC&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301687_13GOH55SKYYKR3YGC&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 345324
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 308BA8FDB23A4D5E8E40C3D20088CBEA Ref B: LON04EDGE1012 Ref C: 2023-12-23T19:58:24Z
date: Sat, 23 Dec 2023 19:58:24 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301073_18LC40ETNMF8SEVBD&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301073_18LC40ETNMF8SEVBD&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 484032
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 846AC8FC36E5489F8600A929756005BE Ref B: LON04EDGE1012 Ref C: 2023-12-23T19:58:24Z
date: Sat, 23 Dec 2023 19:58:24 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301506_1F0FLOT3FW11VH0B0&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301506_1F0FLOT3FW11VH0B0&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 547436
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 1B56B5D26EF1437CA9E65AED49714EE1 Ref B: LON04EDGE1012 Ref C: 2023-12-23T19:58:24Z
date: Sat, 23 Dec 2023 19:58:24 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301278_1VRPF8TFV4TZXU6S8&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301278_1VRPF8TFV4TZXU6S8&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 488784
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 2503AE66C63040F095FCE1071C5CE7C3 Ref B: LON04EDGE1012 Ref C: 2023-12-23T19:58:24Z
date: Sat, 23 Dec 2023 19:58:24 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301001_13IM8GUOR3WVGE77H&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301001_13IM8GUOR3WVGE77H&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 289523
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 26137DC54BED48238E7532E4652105F7 Ref B: LON04EDGE1012 Ref C: 2023-12-23T19:58:24Z
date: Sat, 23 Dec 2023 19:58:24 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301434_155CLHAG1DOW615HP&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301434_155CLHAG1DOW615HP&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 270070
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: C21992A6BF4049F1929072486D68F082 Ref B: LON04EDGE1012 Ref C: 2023-12-23T19:58:28Z
date: Sat, 23 Dec 2023 19:58:27 GMT
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request48.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request48.229.111.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request48.229.111.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request88.65.42.20.in-addr.arpaIN PTRResponse
-
1.2kB 8.3kB 16 14
-
1.2kB 8.3kB 16 14
-
1.2kB 8.2kB 15 12
-
1.2kB 8.3kB 16 14
-
204.79.197.200:443https://tse1.mm.bing.net/th?id=OADD2.10239317301434_155CLHAG1DOW615HP&pid=21.2&w=1080&h=1920&c=4tls, http290.0kB 2.6MB 1903 1900
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301687_13GOH55SKYYKR3YGC&pid=21.2&w=1080&h=1920&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301073_18LC40ETNMF8SEVBD&pid=21.2&w=1920&h=1080&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301506_1F0FLOT3FW11VH0B0&pid=21.2&w=1080&h=1920&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301278_1VRPF8TFV4TZXU6S8&pid=21.2&w=1920&h=1080&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301001_13IM8GUOR3WVGE77H&pid=21.2&w=1920&h=1080&c=4HTTP Response
200HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301434_155CLHAG1DOW615HP&pid=21.2&w=1080&h=1920&c=4HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200 -
322 B 7
-
322 B 7
-
144 B 158 B 2 1
DNS Request
79.121.231.20.in-addr.arpa
DNS Request
79.121.231.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
173.178.17.96.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
0.181.190.20.in-addr.arpa
-
213 B 157 B 3 1
DNS Request
2.136.104.51.in-addr.arpa
DNS Request
2.136.104.51.in-addr.arpa
DNS Request
2.136.104.51.in-addr.arpa
-
63 B 136 B 1 1
DNS Request
ns1.musiczipz.com
-
63 B 136 B 1 1
DNS Request
ns1.musicmixa.net
-
126 B 145 B 2 1
DNS Request
ns1.musicmixa.org
DNS Request
ns1.musicmixa.org
-
62 B 127 B 1 1
DNS Request
ns1.musicmixb.co
-
63 B 136 B 1 1
DNS Request
ns1.musicmixc.com
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
217.135.221.88.in-addr.arpa
-
62 B 173 B 1 1
DNS Request
tse1.mm.bing.net
DNS Response
204.79.197.20013.107.21.200
-
71 B 157 B 1 1
DNS Request
57.169.31.20.in-addr.arpa
-
146 B 106 B 2 1
DNS Request
200.197.79.204.in-addr.arpa
DNS Request
200.197.79.204.in-addr.arpa
-
216 B 158 B 3 1
DNS Request
48.229.111.52.in-addr.arpa
DNS Request
48.229.111.52.in-addr.arpa
DNS Request
48.229.111.52.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
88.65.42.20.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5aae6a60b9b31bbca2089b7649adacd31
SHA1636a9782d116cf16471eda5c2f4f46c1144edc8c
SHA25616799089092dd24af98bfd3670aa99d186e536b9db0b891011ab0f4a34c432c5
SHA51253bb3bf7e9a44572da8e2704d3d356af725f284deee8ff01b8ef1e7502438feeeb16225c3f46bf6c76bb1740688a840b04152eea37d828e8584c0211f533c817