Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 19:14 UTC

General

  • Target

    aa52d2b35d0a5669a54193a76d9fe9e1.exe

  • Size

    1.7MB

  • MD5

    aa52d2b35d0a5669a54193a76d9fe9e1

  • SHA1

    0ba13b228b47c078f172bcac4355aa72a43a80e5

  • SHA256

    f00978e8456694b3548f25dde8b524ce6e4b0975494849cc35b88ada3f461111

  • SHA512

    ec8f8f98dd34605c5a9bfa1ba6413531fa7d21f9136da1687581adfd8c839ae12dd077867efde4e5d89ab8687eeca345ad72701567fc9f79a1daca9ff920cc80

  • SSDEEP

    49152:IdYddVDK5hUOMQKk1Er1E8dYdQTEdYdknvKZvB4VJZreDVJZre2:NVDQgFOPnvip4VzAVzx

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa52d2b35d0a5669a54193a76d9fe9e1.exe
    "C:\Users\Admin\AppData\Local\Temp\aa52d2b35d0a5669a54193a76d9fe9e1.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Windows\WinInet.exe
      "C:\Windows\WinInet.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4256
      • C:\Windows\WinInet.exe
        C:\Windows\WinInet.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2180
        • C:\Program Files (x86)\Common Files\System\msn_kilo.exe
          "C:\Program Files (x86)\Common Files\System\msn_kilo.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Drops file in Program Files directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1968
    • C:\Windows\em.exe
      "C:\Windows\em.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:944
    • C:\Windows\emo.exe
      "C:\Windows\emo.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4488
    • C:\Windows\l33t.exe
      "C:\Windows\l33t.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4484
      • C:\Users\Admin\AppData\Local\Temp\explorer.exe
        "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
        3⤵
        • Executes dropped EXE
        PID:1388
    • C:\Windows\gf.exe
      "C:\Windows\gf.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3452
      • C:\Users\Admin\AppData\Local\Temp\explorer.exe
        "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
        3⤵
        • Executes dropped EXE
        PID:2664
  • C:\Program Files (x86)\Common Files\System\msn_kilo.exe
    "C:\Program Files (x86)\Common Files\System\msn_kilo.exe"
    1⤵
    • Modifies firewall policy service
    • Executes dropped EXE
    • Adds Run key to start application
    • Drops file in Program Files directory
    PID:4572
  • C:\Windows\em.exe
    C:\Windows\em.exe
    1⤵
    • Executes dropped EXE
    PID:4640
  • C:\Windows\emo.exe
    C:\Windows\emo.exe
    1⤵
    • Executes dropped EXE
    PID:2012

Network

  • flag-us
    DNS
    59.128.231.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    59.128.231.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    17.53.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    17.53.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    189.178.17.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    189.178.17.96.in-addr.arpa
    IN PTR
    Response
    189.178.17.96.in-addr.arpa
    IN PTR
    a96-17-178-189deploystaticakamaitechnologiescom
  • flag-us
    DNS
    189.178.17.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    189.178.17.96.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    241.154.82.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    241.154.82.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    86.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    86.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    41.110.16.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    41.110.16.96.in-addr.arpa
    IN PTR
    Response
    41.110.16.96.in-addr.arpa
    IN PTR
    a96-16-110-41deploystaticakamaitechnologiescom
  • flag-us
    DNS
    18.31.95.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    18.31.95.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    9.228.82.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    9.228.82.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    140.71.91.104.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    140.71.91.104.in-addr.arpa
    IN PTR
    Response
    140.71.91.104.in-addr.arpa
    IN PTR
    a104-91-71-140deploystaticakamaitechnologiescom
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    100.5.17.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    100.5.17.2.in-addr.arpa
    IN PTR
    Response
    100.5.17.2.in-addr.arpa
    IN PTR
    a2-17-5-100deploystaticakamaitechnologiescom
  • flag-us
    DNS
    100.5.17.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    100.5.17.2.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    119.110.54.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    119.110.54.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    119.110.54.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    119.110.54.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    199.178.17.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    199.178.17.96.in-addr.arpa
    IN PTR
    Response
    199.178.17.96.in-addr.arpa
    IN PTR
    a96-17-178-199deploystaticakamaitechnologiescom
  • flag-us
    DNS
    199.178.17.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    199.178.17.96.in-addr.arpa
    IN PTR
    Response
    199.178.17.96.in-addr.arpa
    IN PTR
    a96-17-178-199deploystaticakamaitechnologiescom
  • flag-us
    DNS
    134.71.91.104.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    134.71.91.104.in-addr.arpa
    IN PTR
    Response
    134.71.91.104.in-addr.arpa
    IN PTR
    a104-91-71-134deploystaticakamaitechnologiescom
  • flag-us
    DNS
    134.71.91.104.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    134.71.91.104.in-addr.arpa
    IN PTR
    Response
    134.71.91.104.in-addr.arpa
    IN PTR
    a104-91-71-134deploystaticakamaitechnologiescom
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    54.179.17.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    54.179.17.96.in-addr.arpa
    IN PTR
    Response
    54.179.17.96.in-addr.arpa
    IN PTR
    a96-17-179-54deploystaticakamaitechnologiescom
  • flag-us
    DNS
    54.179.17.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    54.179.17.96.in-addr.arpa
    IN PTR
    Response
    54.179.17.96.in-addr.arpa
    IN PTR
    a96-17-179-54deploystaticakamaitechnologiescom
  • flag-us
    DNS
    177.178.17.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    177.178.17.96.in-addr.arpa
    IN PTR
    Response
    177.178.17.96.in-addr.arpa
    IN PTR
    a96-17-178-177deploystaticakamaitechnologiescom
  • flag-us
    DNS
    177.178.17.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    177.178.17.96.in-addr.arpa
    IN PTR
    Response
    177.178.17.96.in-addr.arpa
    IN PTR
    a96-17-178-177deploystaticakamaitechnologiescom
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    57.169.31.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    57.169.31.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    57.169.31.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    57.169.31.20.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    57.169.31.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    57.169.31.20.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    14.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    14.227.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    14.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    14.227.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    tse1.mm.bing.net
    Remote address:
    8.8.8.8:53
    Request
    tse1.mm.bing.net
    IN A
    Response
    tse1.mm.bing.net
    IN CNAME
    mm-mm.bing.net.trafficmanager.net
    mm-mm.bing.net.trafficmanager.net
    IN CNAME
    dual-a-0001.a-msedge.net
    dual-a-0001.a-msedge.net
    IN A
    204.79.197.200
    dual-a-0001.a-msedge.net
    IN A
    13.107.21.200
  • flag-us
    DNS
    tse1.mm.bing.net
    Remote address:
    8.8.8.8:53
    Request
    tse1.mm.bing.net
    IN A
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301195_10TKS815IX0MOD3NX&pid=21.2&w=1920&h=1080&c=4
    Remote address:
    204.79.197.200:443
    Request
    GET /th?id=OADD2.10239317301195_10TKS815IX0MOD3NX&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 162579
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: C265AA929F0244EFB31BB4A92AC56926 Ref B: LON04EDGE0619 Ref C: 2024-01-07T19:16:18Z
    date: Sun, 07 Jan 2024 19:16:18 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301604_1H6WK0590WT095LZX&pid=21.2&w=1080&h=1920&c=4
    Remote address:
    204.79.197.200:443
    Request
    GET /th?id=OADD2.10239317301604_1H6WK0590WT095LZX&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 150156
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: F3558A1641174869807BC80D820BB3E8 Ref B: LON04EDGE0619 Ref C: 2024-01-07T19:16:19Z
    date: Sun, 07 Jan 2024 19:16:18 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301567_1E1JC2NVSTDWA0SVH&pid=21.2&w=1080&h=1920&c=4
    Remote address:
    204.79.197.200:443
    Request
    GET /th?id=OADD2.10239317301567_1E1JC2NVSTDWA0SVH&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 344990
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: D28EB455090C4BF382E1ADA9354B3722 Ref B: LON04EDGE0619 Ref C: 2024-01-07T19:16:21Z
    date: Sun, 07 Jan 2024 19:16:20 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301586_18O1A0ED10HUC74L1&pid=21.2&w=1080&h=1920&c=4
    Remote address:
    204.79.197.200:443
    Request
    GET /th?id=OADD2.10239317301586_18O1A0ED10HUC74L1&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 390420
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: FD03E1CEDB6E4E268412684AEF07E35B Ref B: LON04EDGE0619 Ref C: 2024-01-07T19:16:21Z
    date: Sun, 07 Jan 2024 19:16:20 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301158_1FQ7QMDIC6MPGAP86&pid=21.2&w=1920&h=1080&c=4
    Remote address:
    204.79.197.200:443
    Request
    GET /th?id=OADD2.10239317301158_1FQ7QMDIC6MPGAP86&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 382310
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 13AF30B20C3944629DACBFAE71E8A73D Ref B: LON04EDGE0619 Ref C: 2024-01-07T19:16:21Z
    date: Sun, 07 Jan 2024 19:16:20 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301177_16YAE1SE4HL4IACWN&pid=21.2&w=1920&h=1080&c=4
    Remote address:
    204.79.197.200:443
    Request
    GET /th?id=OADD2.10239317301177_16YAE1SE4HL4IACWN&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 396695
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: B2488C67E65A4914ADF86BA7077C2E7E Ref B: LON04EDGE0619 Ref C: 2024-01-07T19:16:21Z
    date: Sun, 07 Jan 2024 19:16:20 GMT
  • flag-us
    DNS
    200.197.79.204.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    200.197.79.204.in-addr.arpa
    IN PTR
    Response
    200.197.79.204.in-addr.arpa
    IN PTR
    a-0001a-msedgenet
  • flag-us
    DNS
    200.197.79.204.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    200.197.79.204.in-addr.arpa
    IN PTR
    Response
    200.197.79.204.in-addr.arpa
    IN PTR
    a-0001a-msedgenet
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
    Response
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • flag-us
    DNS
    hacku.shadow-mods.net
    msn_kilo.exe
    Remote address:
    8.8.8.8:53
    Request
    hacku.shadow-mods.net
    IN A
  • 204.79.197.200:443
    tse1.mm.bing.net
    tls, http2
    1.5kB
    8.3kB
    18
    14
  • 204.79.197.200:443
    tse1.mm.bing.net
    tls, http2
    1.5kB
    8.3kB
    18
    14
  • 204.79.197.200:443
    tse1.mm.bing.net
    tls, http2
    1.4kB
    8.2kB
    16
    12
  • 204.79.197.200:443
    tse1.mm.bing.net
    tls, http2
    1.5kB
    8.3kB
    18
    14
  • 204.79.197.200:443
    https://tse1.mm.bing.net/th?id=OADD2.10239317301177_16YAE1SE4HL4IACWN&pid=21.2&w=1920&h=1080&c=4
    tls, http2
    68.8kB
    1.9MB
    1398
    1392

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301195_10TKS815IX0MOD3NX&pid=21.2&w=1920&h=1080&c=4

    HTTP Response

    200

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301604_1H6WK0590WT095LZX&pid=21.2&w=1080&h=1920&c=4

    HTTP Response

    200

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301567_1E1JC2NVSTDWA0SVH&pid=21.2&w=1080&h=1920&c=4

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301586_18O1A0ED10HUC74L1&pid=21.2&w=1080&h=1920&c=4

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301158_1FQ7QMDIC6MPGAP86&pid=21.2&w=1920&h=1080&c=4

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301177_16YAE1SE4HL4IACWN&pid=21.2&w=1920&h=1080&c=4

    HTTP Response

    200

    HTTP Response

    200

    HTTP Response

    200

    HTTP Response

    200
  • 8.8.8.8:53
    59.128.231.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    59.128.231.4.in-addr.arpa

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    67 B
    134 B
    1
    1

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    17.53.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    17.53.126.40.in-addr.arpa

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    67 B
    134 B
    1
    1

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    146 B
    144 B
    2
    1

    DNS Request

    95.221.229.192.in-addr.arpa

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    268 B
    134 B
    4
    1

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    189.178.17.96.in-addr.arpa
    dns
    144 B
    137 B
    2
    1

    DNS Request

    189.178.17.96.in-addr.arpa

    DNS Request

    189.178.17.96.in-addr.arpa

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    134 B
    134 B
    2
    1

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    241.154.82.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    241.154.82.20.in-addr.arpa

  • 8.8.8.8:53
    86.23.85.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    86.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    335 B
    134 B
    5
    1

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    41.110.16.96.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    41.110.16.96.in-addr.arpa

  • 8.8.8.8:53
    18.31.95.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    18.31.95.13.in-addr.arpa

  • 8.8.8.8:53
    9.228.82.20.in-addr.arpa
    dns
    70 B
    156 B
    1
    1

    DNS Request

    9.228.82.20.in-addr.arpa

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    67 B
    134 B
    1
    1

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    140.71.91.104.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    140.71.91.104.in-addr.arpa

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    201 B
    134 B
    3
    1

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    100.5.17.2.in-addr.arpa
    dns
    138 B
    131 B
    2
    1

    DNS Request

    100.5.17.2.in-addr.arpa

    DNS Request

    100.5.17.2.in-addr.arpa

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    134 B
    134 B
    2
    1

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    119.110.54.20.in-addr.arpa
    dns
    144 B
    316 B
    2
    2

    DNS Request

    119.110.54.20.in-addr.arpa

    DNS Request

    119.110.54.20.in-addr.arpa

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    134 B
    134 B
    2
    1

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    134.71.91.104.in-addr.arpa
    dns
    144 B
    274 B
    2
    2

    DNS Request

    134.71.91.104.in-addr.arpa

    DNS Request

    134.71.91.104.in-addr.arpa

  • 8.8.8.8:53
    199.178.17.96.in-addr.arpa
    dns
    144 B
    274 B
    2
    2

    DNS Request

    199.178.17.96.in-addr.arpa

    DNS Request

    199.178.17.96.in-addr.arpa

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    134 B
    268 B
    2
    2

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    134 B
    268 B
    2
    2

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    54.179.17.96.in-addr.arpa
    dns
    142 B
    270 B
    2
    2

    DNS Request

    54.179.17.96.in-addr.arpa

    DNS Request

    54.179.17.96.in-addr.arpa

  • 8.8.8.8:53
    177.178.17.96.in-addr.arpa
    dns
    144 B
    274 B
    2
    2

    DNS Request

    177.178.17.96.in-addr.arpa

    DNS Request

    177.178.17.96.in-addr.arpa

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    134 B
    134 B
    2
    1

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    201 B
    134 B
    3
    1

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    57.169.31.20.in-addr.arpa
    dns
    213 B
    157 B
    3
    1

    DNS Request

    57.169.31.20.in-addr.arpa

    DNS Request

    57.169.31.20.in-addr.arpa

    DNS Request

    57.169.31.20.in-addr.arpa

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    134 B
    134 B
    2
    1

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    14.227.111.52.in-addr.arpa
    dns
    144 B
    316 B
    2
    2

    DNS Request

    14.227.111.52.in-addr.arpa

    DNS Request

    14.227.111.52.in-addr.arpa

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    134 B
    134 B
    2
    1

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    134 B
    268 B
    2
    2

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    201 B
    134 B
    3
    1

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    134 B
    134 B
    2
    1

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    134 B
    268 B
    2
    2

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    tse1.mm.bing.net
    dns
    124 B
    173 B
    2
    1

    DNS Request

    tse1.mm.bing.net

    DNS Request

    tse1.mm.bing.net

    DNS Response

    204.79.197.200
    13.107.21.200

  • 8.8.8.8:53
    200.197.79.204.in-addr.arpa
    dns
    146 B
    212 B
    2
    2

    DNS Request

    200.197.79.204.in-addr.arpa

    DNS Request

    200.197.79.204.in-addr.arpa

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    268 B
    134 B
    4
    1

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    134 B
    268 B
    2
    2

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    134 B
    134 B
    2
    1

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    134 B
    268 B
    2
    2

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    134 B
    134 B
    2
    1

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

  • 8.8.8.8:53
    hacku.shadow-mods.net
    dns
    msn_kilo.exe
    268 B
    134 B
    4
    1

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

    DNS Request

    hacku.shadow-mods.net

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\System\msn_kilo.exe

    Filesize

    324KB

    MD5

    b8db720333fb7fd07852c2da19612c90

    SHA1

    15c79abaf400ea0a3edee1518c6bab28b7be444b

    SHA256

    e45c5797d8a466ed1c85e9828593a2c872fd90eab1af7d1a98898e3fba856f5b

    SHA512

    3caa33ca14115674e31d4d5f805bbf251bb956006e4399209a139d10e9df2bb7d82513c5bb33387be1e69ab9adfd02cbde9e834ee50bc0a61f586ddcffe176b7

  • C:\Program Files (x86)\Common Files\System\msn_kilo.exe

    Filesize

    407KB

    MD5

    93eca1fefc79e187c8e93c7d0b02e08a

    SHA1

    fa306584b76fb4ec2e36f47fc9d596a23e4b5e8f

    SHA256

    c0121177bb8e342f6d11ff759d4279212f060b459b45685ee269bc4c4fd31249

    SHA512

    4e4916cb74fccfe90ef95e97f7ca301d2392d4c7fa479a937dee213992ac91d531b2f5023e3bf4830ed8489dea5d7bde5783ab42700f5622fbb89b9472bc588e

  • C:\Program Files (x86)\Common Files\System\msn_kilo.exe

    Filesize

    312KB

    MD5

    ada87a5742b3c72b758d2badad1a423c

    SHA1

    834a8d8ca2b36ee7a1f9de46045b7ea7d06b7be7

    SHA256

    25f09dcbd4c627d66289af56553903bd24e3872354e9711949fd3829c8fe8902

    SHA512

    9b8dc2c6f6174b3f79ce17fdc738e919110a8bf855215e9dcf283739376719a5908ca7c9f15d43bdf6754a68561935604386c4b1f868b462b7f0422e18d2b253

  • C:\Users\Admin\AppData\Local\Temp\explorer.exe

    Filesize

    74KB

    MD5

    8b07e4eb224a264790f2f51513d4810a

    SHA1

    2109ed97528af5c069a42ca42c0ccf1c3b4ffde7

    SHA256

    274273225883f642a2fca3c10b2df968c4c407569a08ec9c6d36519db5beedee

    SHA512

    bd76efebc5724d5b9ffdb919da73795de05818005c7e31b66c2d7a3e846704d3366d78762f9c8b67d10acd192a55c501314b819360dc56ac3f2202d10133ff84

  • C:\Users\Admin\AppData\Local\Temp\explorer.exe

    Filesize

    68KB

    MD5

    d250fc7cba7d55e768d3b4aa8fcbd4c9

    SHA1

    0df322eb79eb65c40b6736340a3f1138bf9bd7f5

    SHA256

    6678ab447170a6e259709561655a6524aa5abae2624ac938c82208d233e5b89d

    SHA512

    717379bb3a33b06febb758025b7c4e3f7d88a361fd3b27e0953a08edbc746a727949ccdd07f097ad70638374896b705051bc3477e7f445414fd3e1ad63e9180f

  • C:\Users\Admin\AppData\Local\Temp\explorer.exe

    Filesize

    1KB

    MD5

    3a56875c1aeadcc4ca93ebbda44683e2

    SHA1

    3ba0808daf2deb24da67d501697f906c442fa7a3

    SHA256

    a87f222692576700ee5b2d129e86406601e18f59c0603ea1ae7f23187d1b9d43

    SHA512

    cb725657977c340200b4c1142e3b353bd8218c4e0a32483e8a12e110dd20b8c0e666a06b503e6484fb6adda2e7924d28d15a405857ec97df21c80ae31765b727

  • C:\Windows\SysWOW64\kernel23.DLL

    Filesize

    387KB

    MD5

    7427717783a03a9f2c10fe5fb09c972f

    SHA1

    2a74b66d462dd193ce16abdfddc9f3c44eb28632

    SHA256

    3ff1e6238191f49a3f3f5584471daaf8aed3707b4bd56b0a44ad48ebfde6051d

    SHA512

    a271dbb9c25657e967c1a26a58ad20ebd1bda5414d311d88a5cd35a44b7bc879c6ee185533e0fdac8c5682ebef09336aa970c6b904957acefcb26685ee57ee73

  • C:\Windows\SysWOW64\kernel23.dll

    Filesize

    312KB

    MD5

    9e81a4c2271f4091910887bba37765e4

    SHA1

    56ebc6675ac5278e17532c2487d2bcb8d7cfa6d8

    SHA256

    b307f990145e4e368027f209758bc47ca1599012ddf522df9feccb3aae80f1b8

    SHA512

    0d3b3ee131797e5a888c4207abeb4a655eee58f2e4c14aee73b127af5dadb9656efe774912e075c2941ce5bae1e3f8b9c92d3be98c1d2e578c160fc2d6e50912

  • C:\Windows\SysWOW64\kernel23.dll

    Filesize

    258KB

    MD5

    c1ba36f83b57b9b67e4c038d8b55db66

    SHA1

    819d986d87a18a042d658194f9c8116ad0e6e389

    SHA256

    2954f6802ce14b1c410d450c7238f350cf15d442b22ee98be67b18db7fba3fe0

    SHA512

    b3bde40c459963126bf7b2103607b27bad3aab8a1d0fcde6f4133294ed52d9527fe14646e61953bd3542bb2357eea5a497e2ab183354d6a3cc7a2fac72a572e6

  • C:\Windows\SysWOW64\kernel23.dll

    Filesize

    208KB

    MD5

    0d658bcf764b202d691007fd72c05521

    SHA1

    36bc4c0dba4dc12e22fee044c37e92e1ec8392ad

    SHA256

    de91a42c76b4b9098e0b4f2dee23b42d4fce7c75d80903c577e0f774c5689ae8

    SHA512

    52f98136c0e9b51a8677480a7369b266aeee9e6d3da67fb97e488a698585ae698359867547cdac735615882d254e0a6d8f380a73561c23dcb25011e708b9bea7

  • C:\Windows\SysWOW64\kernel23.dll

    Filesize

    131KB

    MD5

    a3d2a53f9344ba0e76e8b3ce7ee08e31

    SHA1

    ba734cf8edc573da900fb05c80df52c6e518a427

    SHA256

    78a6294679b7bc9134377fe431f9cb6412ecc3b572256021f82754dfc165aaac

    SHA512

    534b1527f1efe5d8f812b40d7d68da09f7434d2129e756e5c723e9b4389928759f19d121254bb0cf94ac3858b5646e6c266c7ba596973f9e2c5b4dff0e1f29f4

  • C:\Windows\WinInet.exe

    Filesize

    332KB

    MD5

    d39a0269887eecdddeefe9eab1bd3c22

    SHA1

    f97f15b5d7b776d08ef419c7e0d6a9812650a9b1

    SHA256

    0e86e6275625693fb2f21ca252b79cb1b300cc3aa30e1b895ae54f57b3414330

    SHA512

    de5d95b7f11af4d6f45b1986d2cb368a6a6816799123f4fca6a5d82f2cc008559601106de9901e2c5c5137450693bd4eebd8075a6d0fe3701b3563f6a82bb734

  • C:\Windows\WinInet.exe

    Filesize

    394KB

    MD5

    d37385669dcf8ef3703010fb4401cd08

    SHA1

    e1c289d43d8219a2a19830f98b38ecd6d6a98d38

    SHA256

    5b8c4bebc539b32342720dbc388815a854c0029ba069f1042a63a4d89e37a8c9

    SHA512

    1058998a2adf53bb84ac882d07f0d27f41db484ab6bb7de0bd1306831ceef5b96d3ab6c0dcbcd04bb8bb1901a3619d9d7dda6c399ee347dbc7066a73acee3d7b

  • C:\Windows\WinInet.exe

    Filesize

    318KB

    MD5

    23cfcea98274180b95ac15f295505ca2

    SHA1

    7c8e4bcb4e3b05365122874adbf469e66e4b960a

    SHA256

    47609a8e3dcae8f5c559e58677c07473b2c3a0ab701c557862f92c1da8edc601

    SHA512

    4588022517644b96fe69925156ec8958e67b2c1e472b91be1ed2c8bc7ffad1bfa8147dcd04afae5d825c14c86a4bdadaf126ba717a1b9f4b1243c17af0c2e189

  • C:\Windows\WinInet.exe

    Filesize

    711KB

    MD5

    26bfa7affd98f30665ee1f40a3dfb1c8

    SHA1

    7ad71a62989a45c3bd31daa4561fa1280b85ca12

    SHA256

    13e702af9f89c03357ec3b51a553d48a7b428703a629a82c123b1c0f620861a6

    SHA512

    8e54677d026f025fa514010ee65faa7ec0f7e1d4306c75d2b66a752720e1a6d0f03b981289d599479f8d0c82f535808eafba31e537b25e16dff54a5753395ae9

  • C:\Windows\em.exe

    Filesize

    185KB

    MD5

    aaff4eff1db9b53232319a1d59e50ad8

    SHA1

    fe139d84265927460c99a3c85b5aa1307e96522e

    SHA256

    2b29b3be908a0e588e2c3d79806dc92ef29c0b3f6a81393a6b202786bde0317d

    SHA512

    38a1a800af6e43a99eea829e91ce95dc73062f2655cf8dccb7e358f198d5fcf89c8993209375491e4c422e09ae0679b1322864483e70bc9f095111478944c2dc

  • C:\Windows\em.exe

    Filesize

    14KB

    MD5

    d46b29f1852d06377c9aea63b78d166e

    SHA1

    690ea5cbfb3146dd7ef9b9dde704d80f7533a3b6

    SHA256

    23c4fabb0ebbe0c9894b3503d160ef151734cabfecf5d5634df846d6b663a821

    SHA512

    84f1f6f0d2648bae3d341be27e1f980198e2f15532006399c8b5b5aecab9b5f543fdf05011fb8c814bb94160ed9c81919bc7da98834a9f877bc9223411b6f6ce

  • C:\Windows\em.exe

    Filesize

    7KB

    MD5

    90aa103f31d4dac6e99fff72debeb0a7

    SHA1

    113ccc060aa84c5d42c3e23c6ffdbc46b23abe2a

    SHA256

    d11e3e2c4db0d29a3b05961eef9923de86fd1a63b7652775a2cd2e1853cf3b0c

    SHA512

    01edd80e5288b5b301af7d4497a6ca6a0684dd6a4af3d95957c298d307a5d6b6e52578a5778895c6303bec6ea7cae452f682c8817a2acd6abb696a9cedfad00f

  • C:\Windows\emo.exe

    Filesize

    144KB

    MD5

    e5bc6a3f37c2bc581380e3fe6e667417

    SHA1

    8b42f6a2ade1dcd48f77f7e47135967f1f83248e

    SHA256

    5dcd8204465591fe4d62c5c57b6362c8c2fa319f045cc509b2fa60036bf6405b

    SHA512

    cac610da3306e1668eeaa2f33c02cd5780fab70b612c152e9aae3dde74579814103faa0be60eac63266f96f98bb563d3a9c3da8221e637189adf07f3935e85f1

  • C:\Windows\emo.exe

    Filesize

    110KB

    MD5

    ea0bfb6be9e0f89fe4b78fe59627c4e7

    SHA1

    8fbfc851173a93613381af6a657d77dadeea6eca

    SHA256

    3f7527c8f75a0a207c054c1b00659f1b5a19e752fe8de29f7a126cb563b99d55

    SHA512

    46dfe297e2adc742318ccdf39f1b52300ceab5a6a87aee2d7bae8c82aae349094ae02859bfb1c5bf44124fe56c37350f34efabb30702d3d8c0e6ec8288267388

  • C:\Windows\emo.exe

    Filesize

    80KB

    MD5

    31bf74d26f9987c625f6ab630f207538

    SHA1

    f7f3ed068fcd2d9d89073dfa3d00429e9f6384f5

    SHA256

    634801bc622679d81ca64ddfa2329e273c7aa850344be6564772eef442f08bb8

    SHA512

    184b55440ccc0d4b6474ee317956f5689406b02c3f7632d4b81604d7d65e937f221118442d5b187366e4d3c47e1b2300f3a3adf48464ce889428f0990a9f33db

  • C:\Windows\emo.exe

    Filesize

    85KB

    MD5

    abb1c9f34d769c45f3edecd8872afef4

    SHA1

    f80e0ca643302800b0147510baa8569318a77dc9

    SHA256

    4e821f18b85bce113af544331598b07453124a707638bb083b9b5e83c513ce6c

    SHA512

    4df456ba1bfd9408b37a4fb96ebc8641ca3ffd9daaeb8d2af3ebc5f89942cfb9c0180e2ef8b85f050aa8ab7eb06908b77f5363b0a4919a6d367b81a412c18c49

  • C:\Windows\gf.exe

    Filesize

    46KB

    MD5

    d8db8b8d015a041c73428dffe09932cc

    SHA1

    c1013a58309a20fd2769572ad075da058628b0be

    SHA256

    0f2f6a952b7d69d92f9cd6695838b5232f0ff6c7c94081bb16dc21564d58dc3b

    SHA512

    3994379b788ed0e4059040a08fbf27d5632849aa3a0b764c4f71ef8d41c65ffabc55b63cf33ade1a585d426f715a6b1c06b4fb4df4c00ffcd33f4546ff52d5d5

  • C:\Windows\gf.exe

    Filesize

    106KB

    MD5

    dc9f8dadc618e64a6afff97aed95a441

    SHA1

    257284743663756ad7feb811475fb0ac70b9848e

    SHA256

    f8789e77915359588e3a4bfe480ab03a804495ce2344f085e51b97584d4d678e

    SHA512

    877a41bfeeba1f505fc732ed0d56648b30bf9c603a21dd0c21214d18852ac7bc6b7f89004d1b62e81cb325ffee771d4321fdb835729aeaa050dc4933557ae1f1

  • C:\Windows\gf.exe

    Filesize

    137KB

    MD5

    96ea702a7728ad0390f8d35230e04ef0

    SHA1

    02ec193a083cd3b9d7e376b7c23c0eb12abb35a8

    SHA256

    85ed8d79ee60c4a1f9bf89825c6c432fc575cd54ff414e5f32cb4d3bdc94d1a8

    SHA512

    fe303e830f5cbbff6bbef5f1a2b964b5e4de28ef0bf03c8b01fabacef9e9011638318b7ad657eeb20dbb86aaa2243e7b901f37d8df55a50b823c6f77341e3f39

  • C:\Windows\l33t.exe

    Filesize

    126KB

    MD5

    332fef24a1a45a7ea97e1b12c4e7f2c9

    SHA1

    c67f823fb0ff983bf5ee16a8429fb26559ff40ea

    SHA256

    3a67c659e3709d983e4a0b5851c8e66a6d987d12ae55be63930737ccf3862ec4

    SHA512

    b3337a43bb1e496f163c9b6380cc77b387b59940bd19bae99e4c04e3738e95bdb5933c8c43c5bd7b9c620c74719a541372b8afa48dcb1318cf39cda54f518f28

  • memory/2012-95-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2012-90-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2012-89-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2012-92-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2012-91-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2180-22-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2180-21-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2180-24-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2180-51-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2180-23-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2180-30-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2180-28-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/3452-143-0x00007FFED9FB0000-0x00007FFEDA951000-memory.dmp

    Filesize

    9.6MB

  • memory/3452-140-0x0000000000E80000-0x0000000000E90000-memory.dmp

    Filesize

    64KB

  • memory/3452-137-0x00007FFED9FB0000-0x00007FFEDA951000-memory.dmp

    Filesize

    9.6MB

  • memory/3452-139-0x00007FFED9FB0000-0x00007FFEDA951000-memory.dmp

    Filesize

    9.6MB

  • memory/3452-138-0x0000000000E80000-0x0000000000E90000-memory.dmp

    Filesize

    64KB

  • memory/4484-111-0x00007FFED9FB0000-0x00007FFEDA951000-memory.dmp

    Filesize

    9.6MB

  • memory/4484-112-0x000000001BA00000-0x000000001BECE000-memory.dmp

    Filesize

    4.8MB

  • memory/4484-116-0x0000000000CF0000-0x0000000000D00000-memory.dmp

    Filesize

    64KB

  • memory/4484-110-0x0000000000CF0000-0x0000000000D00000-memory.dmp

    Filesize

    64KB

  • memory/4484-114-0x000000001B400000-0x000000001B408000-memory.dmp

    Filesize

    32KB

  • memory/4484-126-0x00007FFED9FB0000-0x00007FFEDA951000-memory.dmp

    Filesize

    9.6MB

  • memory/4484-115-0x000000001C130000-0x000000001C17C000-memory.dmp

    Filesize

    304KB

  • memory/4484-108-0x000000001B480000-0x000000001B526000-memory.dmp

    Filesize

    664KB

  • memory/4484-113-0x000000001BFD0000-0x000000001C06C000-memory.dmp

    Filesize

    624KB

  • memory/4484-109-0x00007FFED9FB0000-0x00007FFEDA951000-memory.dmp

    Filesize

    9.6MB

  • memory/4572-144-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/4640-67-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/4640-73-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/4640-70-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/4640-69-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/4640-68-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.