Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    207s
  • max time network
    204s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/02/2024, 20:00 UTC

General

  • Target

    https://media.discordapp.net/attachments/1152058724123422741/1212485299599573084/Trimming_PUBES_And_TESTICLES_-_A_Visual_Guide.mp4?ex=65f201ee&is=65df8cee&hm=e46eef82df37ebbe9559103c0a996b2383e607cdc34cdf0de1f0c3b7adcf2004&

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 28 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://media.discordapp.net/attachments/1152058724123422741/1212485299599573084/Trimming_PUBES_And_TESTICLES_-_A_Visual_Guide.mp4?ex=65f201ee&is=65df8cee&hm=e46eef82df37ebbe9559103c0a996b2383e607cdc34cdf0de1f0c3b7adcf2004&
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd3ba746f8,0x7ffd3ba74708,0x7ffd3ba74718
      2⤵
        PID:4892
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:3
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:3216
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:2
        2⤵
          PID:3888
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:8
          2⤵
            PID:4732
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
            2⤵
              PID:4996
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
              2⤵
                PID:4856
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:8
                2⤵
                  PID:4636
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1820
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:1
                  2⤵
                    PID:4264
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5124 /prefetch:8
                    2⤵
                      PID:3792
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4716
                    • C:\Program Files\VideoLAN\VLC\vlc.exe
                      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\Trimming_PUBES_And_TESTICLES_-_A_Visual_Guide.mp4"
                      2⤵
                      • Suspicious behavior: AddClipboardFormatListener
                      • Suspicious behavior: GetForegroundWindowSpam
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of SetWindowsHookEx
                      PID:712
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:1
                      2⤵
                        PID:432
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6248 /prefetch:1
                        2⤵
                          PID:1252
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6548 /prefetch:1
                          2⤵
                            PID:2588
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6444 /prefetch:1
                            2⤵
                              PID:4864
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:4176
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4976
                              • C:\Windows\system32\AUDIODG.EXE
                                C:\Windows\system32\AUDIODG.EXE 0x38c 0x33c
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:888

                              Network

                              • flag-us
                                DNS
                                media.discordapp.net
                                msedge.exe
                                Remote address:
                                8.8.8.8:53
                                Request
                                media.discordapp.net
                                IN A
                                Response
                                media.discordapp.net
                                IN A
                                162.159.129.232
                                media.discordapp.net
                                IN A
                                162.159.128.232
                                media.discordapp.net
                                IN A
                                162.159.134.232
                                media.discordapp.net
                                IN A
                                162.159.130.232
                                media.discordapp.net
                                IN A
                                162.159.133.232
                              • flag-us
                                DNS
                                133.32.126.40.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                133.32.126.40.in-addr.arpa
                                IN PTR
                                Response
                              • flag-us
                                DNS
                                173.178.17.96.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                173.178.17.96.in-addr.arpa
                                IN PTR
                                Response
                                173.178.17.96.in-addr.arpa
                                IN PTR
                                a96-17-178-173deploystaticakamaitechnologiescom
                              • flag-us
                                GET
                                https://media.discordapp.net/attachments/1152058724123422741/1212485299599573084/Trimming_PUBES_And_TESTICLES_-_A_Visual_Guide.mp4?ex=65f201ee&is=65df8cee&hm=e46eef82df37ebbe9559103c0a996b2383e607cdc34cdf0de1f0c3b7adcf2004&
                                msedge.exe
                                Remote address:
                                162.159.129.232:443
                                Request
                                GET /attachments/1152058724123422741/1212485299599573084/Trimming_PUBES_And_TESTICLES_-_A_Visual_Guide.mp4?ex=65f201ee&is=65df8cee&hm=e46eef82df37ebbe9559103c0a996b2383e607cdc34cdf0de1f0c3b7adcf2004& HTTP/2.0
                                host: media.discordapp.net
                                sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
                                sec-ch-ua-mobile: ?0
                                dnt: 1
                                upgrade-insecure-requests: 1
                                user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
                                accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
                                sec-fetch-site: none
                                sec-fetch-mode: navigate
                                sec-fetch-user: ?1
                                sec-fetch-dest: document
                                accept-encoding: gzip, deflate, br
                                accept-language: en-US,en;q=0.9
                                Response
                                HTTP/2.0 200
                                date: Wed, 28 Feb 2024 20:00:33 GMT
                                content-type: video/mp4
                                content-length: 24995318
                                cf-ray: 85cb411feba324d1-LHR
                                cf-cache-status: HIT
                                accept-ranges: bytes, bytes
                                access-control-allow-origin: *
                                cache-control: public, max-age=31536000
                                content-disposition: attachment
                                expires: Thu, 27 Feb 2025 20:00:33 GMT
                                last-modified: Wed, 28 Feb 2024 19:43:42 GMT
                                vary: Accept-Encoding
                                report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=zGKtmW1wUoh6IXyEJjeNyoWvCm7LnXENLeA7op9%2FMdejqNf1xh2Cm5B5QAeE0vT%2FYTKQNrGu55izQor4vBKjTxyY2tdIaA%2BdCTJOpE466kJ6H%2Bgx46389fPLZ7OR5OsFd5uwauZ9"}],"group":"cf-nel","max_age":604800}
                                nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                set-cookie: __cfruid=ec4fb1df9e9b9bed7cd9f8e030643fc5cdd1a618-1709150433; path=/; domain=.discordapp.net; HttpOnly; Secure; SameSite=None
                                x-robots-tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                                server: cloudflare
                              • flag-us
                                DNS
                                232.129.159.162.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                232.129.159.162.in-addr.arpa
                                IN PTR
                                Response
                              • flag-us
                                DNS
                                9.228.82.20.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                9.228.82.20.in-addr.arpa
                                IN PTR
                                Response
                              • flag-us
                                DNS
                                g.bing.com
                                Remote address:
                                8.8.8.8:53
                                Request
                                g.bing.com
                                IN A
                                Response
                                g.bing.com
                                IN CNAME
                                g-bing-com.a-0001.a-msedge.net
                                g-bing-com.a-0001.a-msedge.net
                                IN CNAME
                                dual-a-0001.a-msedge.net
                                dual-a-0001.a-msedge.net
                                IN A
                                204.79.197.200
                                dual-a-0001.a-msedge.net
                                IN A
                                13.107.21.200
                              • flag-us
                                DNS
                                g.bing.com
                                Remote address:
                                8.8.8.8:53
                                Request
                                g.bing.com
                                IN A
                              • flag-us
                                GET
                                https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=47a7e954e5f64ab1b31b91f137f86613&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=
                                Remote address:
                                204.79.197.200:443
                                Request
                                GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=47a7e954e5f64ab1b31b91f137f86613&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid= HTTP/2.0
                                host: g.bing.com
                                accept-encoding: gzip, deflate
                                user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                                Response
                                HTTP/2.0 204
                                cache-control: no-cache, must-revalidate
                                pragma: no-cache
                                expires: Fri, 01 Jan 1990 00:00:00 GMT
                                set-cookie: MUID=01BB2E5C83DC6B6928223A6F82FB6AC2; domain=.bing.com; expires=Mon, 24-Mar-2025 20:00:36 GMT; path=/; SameSite=None; Secure; Priority=High;
                                strict-transport-security: max-age=31536000; includeSubDomains; preload
                                access-control-allow-origin: *
                                x-cache: CONFIG_NOCACHE
                                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                x-msedge-ref: Ref A: 83D928079AE24B618175ADC5CED7F784 Ref B: LON04EDGE0715 Ref C: 2024-02-28T20:00:36Z
                                date: Wed, 28 Feb 2024 20:00:35 GMT
                              • flag-us
                                GET
                                https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=47a7e954e5f64ab1b31b91f137f86613&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=
                                Remote address:
                                204.79.197.200:443
                                Request
                                GET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=47a7e954e5f64ab1b31b91f137f86613&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid= HTTP/2.0
                                host: g.bing.com
                                accept-encoding: gzip, deflate
                                user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                                cookie: MUID=01BB2E5C83DC6B6928223A6F82FB6AC2
                                Response
                                HTTP/2.0 204
                                cache-control: no-cache, must-revalidate
                                pragma: no-cache
                                expires: Fri, 01 Jan 1990 00:00:00 GMT
                                set-cookie: MSPTC=FOCMYnTufVrM32kQSPeCfchKeGNUGeA1MIJdvU-UXf0; domain=.bing.com; expires=Mon, 24-Mar-2025 20:00:36 GMT; path=/; Partitioned; secure; SameSite=None
                                strict-transport-security: max-age=31536000; includeSubDomains; preload
                                access-control-allow-origin: *
                                x-cache: CONFIG_NOCACHE
                                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                x-msedge-ref: Ref A: A7ED15274CE9402DB1BE3ACD09DAD02E Ref B: LON04EDGE0715 Ref C: 2024-02-28T20:00:36Z
                                date: Wed, 28 Feb 2024 20:00:36 GMT
                              • flag-us
                                GET
                                https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=47a7e954e5f64ab1b31b91f137f86613&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=
                                Remote address:
                                204.79.197.200:443
                                Request
                                GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=47a7e954e5f64ab1b31b91f137f86613&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid= HTTP/2.0
                                host: g.bing.com
                                accept-encoding: gzip, deflate
                                user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                                cookie: MUID=01BB2E5C83DC6B6928223A6F82FB6AC2; MSPTC=FOCMYnTufVrM32kQSPeCfchKeGNUGeA1MIJdvU-UXf0
                                Response
                                HTTP/2.0 204
                                cache-control: no-cache, must-revalidate
                                pragma: no-cache
                                expires: Fri, 01 Jan 1990 00:00:00 GMT
                                strict-transport-security: max-age=31536000; includeSubDomains; preload
                                access-control-allow-origin: *
                                x-cache: CONFIG_NOCACHE
                                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                x-msedge-ref: Ref A: 970BC8BFABB648D59EE9DA22A5809E20 Ref B: LON04EDGE0715 Ref C: 2024-02-28T20:00:36Z
                                date: Wed, 28 Feb 2024 20:00:36 GMT
                              • flag-us
                                DNS
                                200.197.79.204.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                200.197.79.204.in-addr.arpa
                                IN PTR
                                Response
                                200.197.79.204.in-addr.arpa
                                IN PTR
                                a-0001a-msedgenet
                              • flag-us
                                DNS
                                41.110.16.96.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                41.110.16.96.in-addr.arpa
                                IN PTR
                                Response
                                41.110.16.96.in-addr.arpa
                                IN PTR
                                a96-16-110-41deploystaticakamaitechnologiescom
                              • flag-us
                                DNS
                                86.23.85.13.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                86.23.85.13.in-addr.arpa
                                IN PTR
                                Response
                              • flag-us
                                DNS
                                198.187.3.20.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                198.187.3.20.in-addr.arpa
                                IN PTR
                                Response
                              • flag-us
                                DNS
                                28.160.77.104.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                28.160.77.104.in-addr.arpa
                                IN PTR
                                Response
                                28.160.77.104.in-addr.arpa
                                IN PTR
                                a104-77-160-28deploystaticakamaitechnologiescom
                              • flag-us
                                DNS
                                0.205.248.87.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                0.205.248.87.in-addr.arpa
                                IN PTR
                                Response
                                0.205.248.87.in-addr.arpa
                                IN PTR
                                https-87-248-205-0lgwllnwnet
                              • flag-us
                                DNS
                                23.236.111.52.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                23.236.111.52.in-addr.arpa
                                IN PTR
                                Response
                              • 162.159.129.232:443
                                https://media.discordapp.net/attachments/1152058724123422741/1212485299599573084/Trimming_PUBES_And_TESTICLES_-_A_Visual_Guide.mp4?ex=65f201ee&is=65df8cee&hm=e46eef82df37ebbe9559103c0a996b2383e607cdc34cdf0de1f0c3b7adcf2004&
                                tls, http2
                                msedge.exe
                                1.0MB
                                25.9MB
                                16527
                                18651

                                HTTP Request

                                GET https://media.discordapp.net/attachments/1152058724123422741/1212485299599573084/Trimming_PUBES_And_TESTICLES_-_A_Visual_Guide.mp4?ex=65f201ee&is=65df8cee&hm=e46eef82df37ebbe9559103c0a996b2383e607cdc34cdf0de1f0c3b7adcf2004&

                                HTTP Response

                                200
                              • 204.79.197.200:443
                                https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=47a7e954e5f64ab1b31b91f137f86613&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=
                                tls, http2
                                2.0kB
                                9.2kB
                                21
                                18

                                HTTP Request

                                GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=47a7e954e5f64ab1b31b91f137f86613&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=

                                HTTP Response

                                204

                                HTTP Request

                                GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=47a7e954e5f64ab1b31b91f137f86613&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=

                                HTTP Response

                                204

                                HTTP Request

                                GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=47a7e954e5f64ab1b31b91f137f86613&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=

                                HTTP Response

                                204
                              • 8.8.8.8:53
                                media.discordapp.net
                                dns
                                msedge.exe
                                66 B
                                146 B
                                1
                                1

                                DNS Request

                                media.discordapp.net

                                DNS Response

                                162.159.129.232
                                162.159.128.232
                                162.159.134.232
                                162.159.130.232
                                162.159.133.232

                              • 8.8.8.8:53
                                133.32.126.40.in-addr.arpa
                                dns
                                72 B
                                158 B
                                1
                                1

                                DNS Request

                                133.32.126.40.in-addr.arpa

                              • 8.8.8.8:53
                                173.178.17.96.in-addr.arpa
                                dns
                                72 B
                                137 B
                                1
                                1

                                DNS Request

                                173.178.17.96.in-addr.arpa

                              • 224.0.0.251:5353
                                394 B
                                6
                              • 8.8.8.8:53
                                232.129.159.162.in-addr.arpa
                                dns
                                74 B
                                136 B
                                1
                                1

                                DNS Request

                                232.129.159.162.in-addr.arpa

                              • 8.8.8.8:53
                                9.228.82.20.in-addr.arpa
                                dns
                                70 B
                                156 B
                                1
                                1

                                DNS Request

                                9.228.82.20.in-addr.arpa

                              • 8.8.8.8:53
                                g.bing.com
                                dns
                                112 B
                                158 B
                                2
                                1

                                DNS Request

                                g.bing.com

                                DNS Request

                                g.bing.com

                                DNS Response

                                204.79.197.200
                                13.107.21.200

                              • 8.8.8.8:53
                                200.197.79.204.in-addr.arpa
                                dns
                                73 B
                                106 B
                                1
                                1

                                DNS Request

                                200.197.79.204.in-addr.arpa

                              • 8.8.8.8:53
                                41.110.16.96.in-addr.arpa
                                dns
                                71 B
                                135 B
                                1
                                1

                                DNS Request

                                41.110.16.96.in-addr.arpa

                              • 8.8.8.8:53
                                86.23.85.13.in-addr.arpa
                                dns
                                70 B
                                144 B
                                1
                                1

                                DNS Request

                                86.23.85.13.in-addr.arpa

                              • 8.8.8.8:53
                                198.187.3.20.in-addr.arpa
                                dns
                                71 B
                                157 B
                                1
                                1

                                DNS Request

                                198.187.3.20.in-addr.arpa

                              • 8.8.8.8:53
                                28.160.77.104.in-addr.arpa
                                dns
                                72 B
                                137 B
                                1
                                1

                                DNS Request

                                28.160.77.104.in-addr.arpa

                              • 8.8.8.8:53
                                0.205.248.87.in-addr.arpa
                                dns
                                71 B
                                116 B
                                1
                                1

                                DNS Request

                                0.205.248.87.in-addr.arpa

                              • 8.8.8.8:53
                                23.236.111.52.in-addr.arpa
                                dns
                                72 B
                                158 B
                                1
                                1

                                DNS Request

                                23.236.111.52.in-addr.arpa

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                f35bb0615bb9816f562b83304e456294

                                SHA1

                                1049e2bd3e1bbb4cea572467d7c4a96648659cb4

                                SHA256

                                05e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71

                                SHA512

                                db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                1eb86108cb8f5a956fdf48efbd5d06fe

                                SHA1

                                7b2b299f753798e4891df2d9cbf30f94b39ef924

                                SHA256

                                1b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40

                                SHA512

                                e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                Filesize

                                188B

                                MD5

                                2ea2a137ab8c47d20337451e220ee9e2

                                SHA1

                                be65afcbb079d07ad4431f833ddf3fc5dadbe77f

                                SHA256

                                e56c5843fc2abc37cb8023a951b5b8151e973458d78b79d20ac02f7c98cd9718

                                SHA512

                                90802d3473fe6ca799318e88e9a1a13838ab5b8fd4add7ef1e52b4e9fe9aca3886eeb0bd82d0dfc108a156178bec952b2e3dc924195ad1012a33eff5d9470b59

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                af380fffe933778e59c1169edcad1d4d

                                SHA1

                                2b1a074181415210e4074276ea1e872744825bd1

                                SHA256

                                9b3fd0bf05240dd95ae9b32d79933df5f9c64bde9094b17b1ae2f571586cca55

                                SHA512

                                455fd9439c6c15acac128488b7edd2ad0c71a00e1a0d1509a33efb2ae966bb2537e0fbedf323ea47ccaf5fe707758607b5da106452312ae7718d098e6db5965b

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                6a1947cb62731fd5b8e85441832f6ccc

                                SHA1

                                62e48dfb4c2fa3a88bea492ed810e91835540c1f

                                SHA256

                                dffa7ca4d521f45e0cbb0c8b5d8572efa34c93998c2a4fd30bed22c16ce6d7e2

                                SHA512

                                2d707a8620fcb4af944ad6718a56e57798f0b941852e36acc3474976f05b5de212989dd30162a312c3f8e640c0517370ba95cd4e417c0fd805003812482fd9b1

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                0755f6c59f491f29c5ffb12a3db43f46

                                SHA1

                                bb48a8d318e4e79838efa7a7366d1b426e227fdd

                                SHA256

                                c64ca3b5a405a5ad34534c502b5c0e074ea68d81383e98ca0d2425eb052f9d25

                                SHA512

                                1aa91296c80ecfc6b0e2b47726c13d80b097821c5ea8d266bba7bf08f100bfee53c52860421dd4a04fd317f8f3b04decaa99389e6cd5990a1ba235a59347bc47

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                13291d9f1dd93f04f193df735c4a219f

                                SHA1

                                e04164abbf365e304629a3ae2433badf89dabd57

                                SHA256

                                8ee295e86247d2f4374a42178c5313ea58e45d1da2e345cc6360a5c06c099157

                                SHA512

                                dafc35f402d54901ab39fe99a8e1489ecb8a473214e35c30deaecea4135deb6880c34904bf4299eb8925dbe6a69f02bfbcada2943063703bd2155f99ce35cc71

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                37a0755a72cdaa642b32112b5a9c11d5

                                SHA1

                                46209bbcb4d4763eb725df3480284d0918ca1708

                                SHA256

                                05643d5fc7a8c98df7d59e542e5a8b0fccefcdca075691ab0e00f215d2e992a2

                                SHA512

                                8ca3cf6c12abc08e18f98fbe94e7a1822c1e5921cdd41009211bbba3e33db25d7cef791f9086c7cc80def0e03fdabe767ea67454cc01cd7d6d9cc5b09986f71e

                              • C:\Users\Admin\Downloads\Trimming_PUBES_And_TESTICLES_-_A_Visual_Guide.mp4

                                Filesize

                                23.8MB

                                MD5

                                6d243d097ae4c9eed88d468cd16449f4

                                SHA1

                                6598cc164351beb7e6c51e50ec7612bec5aec546

                                SHA256

                                19c1abef651f6e6cf0d6e78e76f286f3bd9032fd06e6d82728c4cd040a2958a7

                                SHA512

                                11b9e184802d14e841ea306fbfa5018c9373ba9d6c8bad00ed036b8f3f8bb317b14b33f6945d17262f8da1d74cc6a0304c84b281c5d8f2fd05f1750b06f5f03f

                              • memory/712-95-0x00007FFD28290000-0x00007FFD282E7000-memory.dmp

                                Filesize

                                348KB

                              • memory/712-82-0x00007FFD2C8D0000-0x00007FFD2C8E8000-memory.dmp

                                Filesize

                                96KB

                              • memory/712-68-0x00007FFD40090000-0x00007FFD400A7000-memory.dmp

                                Filesize

                                92KB

                              • memory/712-67-0x00007FFD400B0000-0x00007FFD400C1000-memory.dmp

                                Filesize

                                68KB

                              • memory/712-70-0x00007FFD37590000-0x00007FFD375AD000-memory.dmp

                                Filesize

                                116KB

                              • memory/712-71-0x00007FFD32880000-0x00007FFD32891000-memory.dmp

                                Filesize

                                68KB

                              • memory/712-69-0x00007FFD3B7F0000-0x00007FFD3B801000-memory.dmp

                                Filesize

                                68KB

                              • memory/712-73-0x00007FFD32840000-0x00007FFD3287F000-memory.dmp

                                Filesize

                                252KB

                              • memory/712-72-0x00007FFD2C970000-0x00007FFD2CB70000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/712-66-0x00007FFD400D0000-0x00007FFD400E7000-memory.dmp

                                Filesize

                                92KB

                              • memory/712-65-0x00007FFD400F0000-0x00007FFD40108000-memory.dmp

                                Filesize

                                96KB

                              • memory/712-74-0x00007FFD28670000-0x00007FFD2971B000-memory.dmp

                                Filesize

                                16.7MB

                              • memory/712-75-0x00007FFD322B0000-0x00007FFD322D1000-memory.dmp

                                Filesize

                                132KB

                              • memory/712-76-0x00007FFD32290000-0x00007FFD322A8000-memory.dmp

                                Filesize

                                96KB

                              • memory/712-77-0x00007FFD32270000-0x00007FFD32281000-memory.dmp

                                Filesize

                                68KB

                              • memory/712-78-0x00007FFD2C950000-0x00007FFD2C961000-memory.dmp

                                Filesize

                                68KB

                              • memory/712-81-0x00007FFD2C8F0000-0x00007FFD2C901000-memory.dmp

                                Filesize

                                68KB

                              • memory/712-83-0x00007FFD2C8A0000-0x00007FFD2C8D0000-memory.dmp

                                Filesize

                                192KB

                              • memory/712-84-0x00007FFD2C830000-0x00007FFD2C897000-memory.dmp

                                Filesize

                                412KB

                              • memory/712-87-0x00007FFD2AAD0000-0x00007FFD2AB26000-memory.dmp

                                Filesize

                                344KB

                              • memory/712-88-0x00007FFD2A950000-0x00007FFD2AAC8000-memory.dmp

                                Filesize

                                1.5MB

                              • memory/712-86-0x00007FFD2C810000-0x00007FFD2C821000-memory.dmp

                                Filesize

                                68KB

                              • memory/712-90-0x00007FFD28500000-0x00007FFD28670000-memory.dmp

                                Filesize

                                1.4MB

                              • memory/712-92-0x00007FFD284B0000-0x00007FFD284F2000-memory.dmp

                                Filesize

                                264KB

                              • memory/712-94-0x00007FFD282F0000-0x00007FFD2845B000-memory.dmp

                                Filesize

                                1.4MB

                              • memory/712-64-0x00007FFD29720000-0x00007FFD299D4000-memory.dmp

                                Filesize

                                2.7MB

                              • memory/712-93-0x00007FFD28460000-0x00007FFD284AC000-memory.dmp

                                Filesize

                                304KB

                              • memory/712-91-0x00007FFD374F0000-0x00007FFD37502000-memory.dmp

                                Filesize

                                72KB

                              • memory/712-96-0x00007FFD28040000-0x00007FFD2828B000-memory.dmp

                                Filesize

                                2.3MB

                              • memory/712-89-0x00007FFD2C7F0000-0x00007FFD2C807000-memory.dmp

                                Filesize

                                92KB

                              • memory/712-85-0x00007FFD2AB30000-0x00007FFD2AB9F000-memory.dmp

                                Filesize

                                444KB

                              • memory/712-63-0x00007FFD34B40000-0x00007FFD34B74000-memory.dmp

                                Filesize

                                208KB

                              • memory/712-80-0x00007FFD2C910000-0x00007FFD2C92B000-memory.dmp

                                Filesize

                                108KB

                              • memory/712-79-0x00007FFD2C930000-0x00007FFD2C941000-memory.dmp

                                Filesize

                                68KB

                              • memory/712-97-0x00000249CFA10000-0x00000249D11C0000-memory.dmp

                                Filesize

                                23.7MB

                              • memory/712-98-0x00007FFD43260000-0x00007FFD43270000-memory.dmp

                                Filesize

                                64KB

                              • memory/712-99-0x00007FFD26860000-0x00007FFD2688F000-memory.dmp

                                Filesize

                                188KB

                              • memory/712-100-0x00007FFD374D0000-0x00007FFD374E1000-memory.dmp

                                Filesize

                                68KB

                              • memory/712-101-0x00007FFD26840000-0x00007FFD26856000-memory.dmp

                                Filesize

                                88KB

                              • memory/712-103-0x00007FFD266F0000-0x00007FFD26765000-memory.dmp

                                Filesize

                                468KB

                              • memory/712-104-0x00007FFD26680000-0x00007FFD266E2000-memory.dmp

                                Filesize

                                392KB

                              • memory/712-105-0x00007FFD26610000-0x00007FFD2667D000-memory.dmp

                                Filesize

                                436KB

                              • memory/712-102-0x00007FFD26770000-0x00007FFD26835000-memory.dmp

                                Filesize

                                788KB

                              • memory/712-106-0x00007FFD265F0000-0x00007FFD26603000-memory.dmp

                                Filesize

                                76KB

                              • memory/712-107-0x00007FFD265D0000-0x00007FFD265E4000-memory.dmp

                                Filesize

                                80KB

                              • memory/712-108-0x00007FFD26580000-0x00007FFD265D0000-memory.dmp

                                Filesize

                                320KB

                              • memory/712-109-0x00007FFD26560000-0x00007FFD26575000-memory.dmp

                                Filesize

                                84KB

                              • memory/712-111-0x00007FFD25D50000-0x00007FFD25D65000-memory.dmp

                                Filesize

                                84KB

                              • memory/712-115-0x00007FFD25BD0000-0x00007FFD25BFA000-memory.dmp

                                Filesize

                                168KB

                              • memory/712-117-0x00007FFD25B90000-0x00007FFD25BAB000-memory.dmp

                                Filesize

                                108KB

                              • memory/712-118-0x00007FFD25B70000-0x00007FFD25B81000-memory.dmp

                                Filesize

                                68KB

                              • memory/712-116-0x00007FFD25BB0000-0x00007FFD25BC3000-memory.dmp

                                Filesize

                                76KB

                              • memory/712-122-0x00007FFD25AF0000-0x00007FFD25B03000-memory.dmp

                                Filesize

                                76KB

                              • memory/712-121-0x00007FFD25B10000-0x00007FFD25B25000-memory.dmp

                                Filesize

                                84KB

                              • memory/712-120-0x00007FFD25B30000-0x00007FFD25B42000-memory.dmp

                                Filesize

                                72KB

                              • memory/712-123-0x00007FFD25970000-0x00007FFD25AEA000-memory.dmp

                                Filesize

                                1.5MB

                              • memory/712-119-0x00007FFD25B50000-0x00007FFD25B62000-memory.dmp

                                Filesize

                                72KB

                              • memory/712-125-0x00007FFD25930000-0x00007FFD25942000-memory.dmp

                                Filesize

                                72KB

                              • memory/712-124-0x00007FFD25950000-0x00007FFD25964000-memory.dmp

                                Filesize

                                80KB

                              • memory/712-113-0x00007FFD25D00000-0x00007FFD25D13000-memory.dmp

                                Filesize

                                76KB

                              • memory/712-112-0x00007FFD25D20000-0x00007FFD25D43000-memory.dmp

                                Filesize

                                140KB

                              • memory/712-62-0x00007FF6FE080000-0x00007FF6FE178000-memory.dmp

                                Filesize

                                992KB

                              • memory/712-114-0x00007FFD25C00000-0x00007FFD25CF4000-memory.dmp

                                Filesize

                                976KB

                              • memory/712-110-0x00007FFD26340000-0x00007FFD2655D000-memory.dmp

                                Filesize

                                2.1MB

                              We care about your privacy.

                              This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.