Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
207s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 20:00 UTC
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://media.discordapp.net/attachments/1152058724123422741/1212485299599573084/Trimming_PUBES_And_TESTICLES_-_A_Visual_Guide.mp4?ex=65f201ee&is=65df8cee&hm=e46eef82df37ebbe9559103c0a996b2383e607cdc34cdf0de1f0c3b7adcf2004&
Resource
win10v2004-20240226-en
General
-
Target
https://media.discordapp.net/attachments/1152058724123422741/1212485299599573084/Trimming_PUBES_And_TESTICLES_-_A_Visual_Guide.mp4?ex=65f201ee&is=65df8cee&hm=e46eef82df37ebbe9559103c0a996b2383e607cdc34cdf0de1f0c3b7adcf2004&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 712 vlc.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3216 msedge.exe 3216 msedge.exe 900 msedge.exe 900 msedge.exe 1820 identity_helper.exe 1820 identity_helper.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 712 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 888 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 888 AUDIODG.EXE Token: 33 712 vlc.exe Token: SeIncBasePriorityPrivilege 712 vlc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 900 msedge.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 712 vlc.exe 712 vlc.exe 712 vlc.exe 712 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 900 wrote to memory of 4892 900 msedge.exe 91 PID 900 wrote to memory of 4892 900 msedge.exe 91 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3888 900 msedge.exe 93 PID 900 wrote to memory of 3216 900 msedge.exe 92 PID 900 wrote to memory of 3216 900 msedge.exe 92 PID 900 wrote to memory of 4732 900 msedge.exe 94 PID 900 wrote to memory of 4732 900 msedge.exe 94 PID 900 wrote to memory of 4732 900 msedge.exe 94 PID 900 wrote to memory of 4732 900 msedge.exe 94 PID 900 wrote to memory of 4732 900 msedge.exe 94 PID 900 wrote to memory of 4732 900 msedge.exe 94 PID 900 wrote to memory of 4732 900 msedge.exe 94 PID 900 wrote to memory of 4732 900 msedge.exe 94 PID 900 wrote to memory of 4732 900 msedge.exe 94 PID 900 wrote to memory of 4732 900 msedge.exe 94 PID 900 wrote to memory of 4732 900 msedge.exe 94 PID 900 wrote to memory of 4732 900 msedge.exe 94 PID 900 wrote to memory of 4732 900 msedge.exe 94 PID 900 wrote to memory of 4732 900 msedge.exe 94 PID 900 wrote to memory of 4732 900 msedge.exe 94 PID 900 wrote to memory of 4732 900 msedge.exe 94 PID 900 wrote to memory of 4732 900 msedge.exe 94 PID 900 wrote to memory of 4732 900 msedge.exe 94 PID 900 wrote to memory of 4732 900 msedge.exe 94 PID 900 wrote to memory of 4732 900 msedge.exe 94
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://media.discordapp.net/attachments/1152058724123422741/1212485299599573084/Trimming_PUBES_And_TESTICLES_-_A_Visual_Guide.mp4?ex=65f201ee&is=65df8cee&hm=e46eef82df37ebbe9559103c0a996b2383e607cdc34cdf0de1f0c3b7adcf2004&1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd3ba746f8,0x7ffd3ba74708,0x7ffd3ba747182⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5124 /prefetch:82⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4716
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\Trimming_PUBES_And_TESTICLES_-_A_Visual_Guide.mp4"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6248 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6548 /prefetch:12⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6444 /prefetch:12⤵PID:4864
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4176
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4976
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x38c 0x33c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:888
Network
-
Remote address:8.8.8.8:53Requestmedia.discordapp.netIN AResponsemedia.discordapp.netIN A162.159.129.232media.discordapp.netIN A162.159.128.232media.discordapp.netIN A162.159.134.232media.discordapp.netIN A162.159.130.232media.discordapp.netIN A162.159.133.232
-
Remote address:8.8.8.8:53Request133.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request173.178.17.96.in-addr.arpaIN PTRResponse173.178.17.96.in-addr.arpaIN PTRa96-17-178-173deploystaticakamaitechnologiescom
-
GEThttps://media.discordapp.net/attachments/1152058724123422741/1212485299599573084/Trimming_PUBES_And_TESTICLES_-_A_Visual_Guide.mp4?ex=65f201ee&is=65df8cee&hm=e46eef82df37ebbe9559103c0a996b2383e607cdc34cdf0de1f0c3b7adcf2004&msedge.exeRemote address:162.159.129.232:443RequestGET /attachments/1152058724123422741/1212485299599573084/Trimming_PUBES_And_TESTICLES_-_A_Visual_Guide.mp4?ex=65f201ee&is=65df8cee&hm=e46eef82df37ebbe9559103c0a996b2383e607cdc34cdf0de1f0c3b7adcf2004& HTTP/2.0
host: media.discordapp.net
sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
sec-ch-ua-mobile: ?0
dnt: 1
upgrade-insecure-requests: 1
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site: none
sec-fetch-mode: navigate
sec-fetch-user: ?1
sec-fetch-dest: document
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 200
content-type: video/mp4
content-length: 24995318
cf-ray: 85cb411feba324d1-LHR
cf-cache-status: HIT
accept-ranges: bytes, bytes
access-control-allow-origin: *
cache-control: public, max-age=31536000
content-disposition: attachment
expires: Thu, 27 Feb 2025 20:00:33 GMT
last-modified: Wed, 28 Feb 2024 19:43:42 GMT
vary: Accept-Encoding
report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=zGKtmW1wUoh6IXyEJjeNyoWvCm7LnXENLeA7op9%2FMdejqNf1xh2Cm5B5QAeE0vT%2FYTKQNrGu55izQor4vBKjTxyY2tdIaA%2BdCTJOpE466kJ6H%2Bgx46389fPLZ7OR5OsFd5uwauZ9"}],"group":"cf-nel","max_age":604800}
nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
set-cookie: __cfruid=ec4fb1df9e9b9bed7cd9f8e030643fc5cdd1a618-1709150433; path=/; domain=.discordapp.net; HttpOnly; Secure; SameSite=None
x-robots-tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
server: cloudflare
-
Remote address:8.8.8.8:53Request232.129.159.162.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.a-0001.a-msedge.netg-bing-com.a-0001.a-msedge.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
Remote address:8.8.8.8:53Requestg.bing.comIN A
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=47a7e954e5f64ab1b31b91f137f86613&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=47a7e954e5f64ab1b31b91f137f86613&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=01BB2E5C83DC6B6928223A6F82FB6AC2; domain=.bing.com; expires=Mon, 24-Mar-2025 20:00:36 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 83D928079AE24B618175ADC5CED7F784 Ref B: LON04EDGE0715 Ref C: 2024-02-28T20:00:36Z
date: Wed, 28 Feb 2024 20:00:35 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=47a7e954e5f64ab1b31b91f137f86613&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=47a7e954e5f64ab1b31b91f137f86613&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=01BB2E5C83DC6B6928223A6F82FB6AC2
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=FOCMYnTufVrM32kQSPeCfchKeGNUGeA1MIJdvU-UXf0; domain=.bing.com; expires=Mon, 24-Mar-2025 20:00:36 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: A7ED15274CE9402DB1BE3ACD09DAD02E Ref B: LON04EDGE0715 Ref C: 2024-02-28T20:00:36Z
date: Wed, 28 Feb 2024 20:00:36 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=47a7e954e5f64ab1b31b91f137f86613&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=47a7e954e5f64ab1b31b91f137f86613&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=01BB2E5C83DC6B6928223A6F82FB6AC2; MSPTC=FOCMYnTufVrM32kQSPeCfchKeGNUGeA1MIJdvU-UXf0
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 970BC8BFABB648D59EE9DA22A5809E20 Ref B: LON04EDGE0715 Ref C: 2024-02-28T20:00:36Z
date: Wed, 28 Feb 2024 20:00:36 GMT
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request86.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request28.160.77.104.in-addr.arpaIN PTRResponse28.160.77.104.in-addr.arpaIN PTRa104-77-160-28deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request0.205.248.87.in-addr.arpaIN PTRResponse0.205.248.87.in-addr.arpaIN PTRhttps-87-248-205-0lgwllnwnet
-
Remote address:8.8.8.8:53Request23.236.111.52.in-addr.arpaIN PTRResponse
-
162.159.129.232:443https://media.discordapp.net/attachments/1152058724123422741/1212485299599573084/Trimming_PUBES_And_TESTICLES_-_A_Visual_Guide.mp4?ex=65f201ee&is=65df8cee&hm=e46eef82df37ebbe9559103c0a996b2383e607cdc34cdf0de1f0c3b7adcf2004&tls, http2msedge.exe1.0MB 25.9MB 16527 18651
HTTP Request
GET https://media.discordapp.net/attachments/1152058724123422741/1212485299599573084/Trimming_PUBES_And_TESTICLES_-_A_Visual_Guide.mp4?ex=65f201ee&is=65df8cee&hm=e46eef82df37ebbe9559103c0a996b2383e607cdc34cdf0de1f0c3b7adcf2004&HTTP Response
200 -
204.79.197.200:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=47a7e954e5f64ab1b31b91f137f86613&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=tls, http22.0kB 9.2kB 21 18
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=47a7e954e5f64ab1b31b91f137f86613&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=47a7e954e5f64ab1b31b91f137f86613&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=47a7e954e5f64ab1b31b91f137f86613&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=HTTP Response
204
-
66 B 146 B 1 1
DNS Request
media.discordapp.net
DNS Response
162.159.129.232162.159.128.232162.159.134.232162.159.130.232162.159.133.232
-
72 B 158 B 1 1
DNS Request
133.32.126.40.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
173.178.17.96.in-addr.arpa
-
394 B 6
-
74 B 136 B 1 1
DNS Request
232.129.159.162.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
112 B 158 B 2 1
DNS Request
g.bing.com
DNS Request
g.bing.com
DNS Response
204.79.197.20013.107.21.200
-
73 B 106 B 1 1
DNS Request
200.197.79.204.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
86.23.85.13.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
28.160.77.104.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
0.205.248.87.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
23.236.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
188B
MD52ea2a137ab8c47d20337451e220ee9e2
SHA1be65afcbb079d07ad4431f833ddf3fc5dadbe77f
SHA256e56c5843fc2abc37cb8023a951b5b8151e973458d78b79d20ac02f7c98cd9718
SHA51290802d3473fe6ca799318e88e9a1a13838ab5b8fd4add7ef1e52b4e9fe9aca3886eeb0bd82d0dfc108a156178bec952b2e3dc924195ad1012a33eff5d9470b59
-
Filesize
6KB
MD5af380fffe933778e59c1169edcad1d4d
SHA12b1a074181415210e4074276ea1e872744825bd1
SHA2569b3fd0bf05240dd95ae9b32d79933df5f9c64bde9094b17b1ae2f571586cca55
SHA512455fd9439c6c15acac128488b7edd2ad0c71a00e1a0d1509a33efb2ae966bb2537e0fbedf323ea47ccaf5fe707758607b5da106452312ae7718d098e6db5965b
-
Filesize
6KB
MD56a1947cb62731fd5b8e85441832f6ccc
SHA162e48dfb4c2fa3a88bea492ed810e91835540c1f
SHA256dffa7ca4d521f45e0cbb0c8b5d8572efa34c93998c2a4fd30bed22c16ce6d7e2
SHA5122d707a8620fcb4af944ad6718a56e57798f0b941852e36acc3474976f05b5de212989dd30162a312c3f8e640c0517370ba95cd4e417c0fd805003812482fd9b1
-
Filesize
6KB
MD50755f6c59f491f29c5ffb12a3db43f46
SHA1bb48a8d318e4e79838efa7a7366d1b426e227fdd
SHA256c64ca3b5a405a5ad34534c502b5c0e074ea68d81383e98ca0d2425eb052f9d25
SHA5121aa91296c80ecfc6b0e2b47726c13d80b097821c5ea8d266bba7bf08f100bfee53c52860421dd4a04fd317f8f3b04decaa99389e6cd5990a1ba235a59347bc47
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD513291d9f1dd93f04f193df735c4a219f
SHA1e04164abbf365e304629a3ae2433badf89dabd57
SHA2568ee295e86247d2f4374a42178c5313ea58e45d1da2e345cc6360a5c06c099157
SHA512dafc35f402d54901ab39fe99a8e1489ecb8a473214e35c30deaecea4135deb6880c34904bf4299eb8925dbe6a69f02bfbcada2943063703bd2155f99ce35cc71
-
Filesize
11KB
MD537a0755a72cdaa642b32112b5a9c11d5
SHA146209bbcb4d4763eb725df3480284d0918ca1708
SHA25605643d5fc7a8c98df7d59e542e5a8b0fccefcdca075691ab0e00f215d2e992a2
SHA5128ca3cf6c12abc08e18f98fbe94e7a1822c1e5921cdd41009211bbba3e33db25d7cef791f9086c7cc80def0e03fdabe767ea67454cc01cd7d6d9cc5b09986f71e
-
Filesize
23.8MB
MD56d243d097ae4c9eed88d468cd16449f4
SHA16598cc164351beb7e6c51e50ec7612bec5aec546
SHA25619c1abef651f6e6cf0d6e78e76f286f3bd9032fd06e6d82728c4cd040a2958a7
SHA51211b9e184802d14e841ea306fbfa5018c9373ba9d6c8bad00ed036b8f3f8bb317b14b33f6945d17262f8da1d74cc6a0304c84b281c5d8f2fd05f1750b06f5f03f