Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
142s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/03/2024, 15:09 UTC
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://server1.aserdefa.ru/deploy.xml
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
http://server1.aserdefa.ru/deploy.xml
Resource
win11-20240221-en
General
-
Target
http://server1.aserdefa.ru/deploy.xml
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1436 msedge.exe 1436 msedge.exe 4344 msedge.exe 4344 msedge.exe 1912 msedge.exe 1912 msedge.exe 492 identity_helper.exe 492 identity_helper.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4344 wrote to memory of 724 4344 msedge.exe 80 PID 4344 wrote to memory of 724 4344 msedge.exe 80 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 3912 4344 msedge.exe 81 PID 4344 wrote to memory of 1436 4344 msedge.exe 82 PID 4344 wrote to memory of 1436 4344 msedge.exe 82 PID 4344 wrote to memory of 2888 4344 msedge.exe 83 PID 4344 wrote to memory of 2888 4344 msedge.exe 83 PID 4344 wrote to memory of 2888 4344 msedge.exe 83 PID 4344 wrote to memory of 2888 4344 msedge.exe 83 PID 4344 wrote to memory of 2888 4344 msedge.exe 83 PID 4344 wrote to memory of 2888 4344 msedge.exe 83 PID 4344 wrote to memory of 2888 4344 msedge.exe 83 PID 4344 wrote to memory of 2888 4344 msedge.exe 83 PID 4344 wrote to memory of 2888 4344 msedge.exe 83 PID 4344 wrote to memory of 2888 4344 msedge.exe 83 PID 4344 wrote to memory of 2888 4344 msedge.exe 83 PID 4344 wrote to memory of 2888 4344 msedge.exe 83 PID 4344 wrote to memory of 2888 4344 msedge.exe 83 PID 4344 wrote to memory of 2888 4344 msedge.exe 83 PID 4344 wrote to memory of 2888 4344 msedge.exe 83 PID 4344 wrote to memory of 2888 4344 msedge.exe 83 PID 4344 wrote to memory of 2888 4344 msedge.exe 83 PID 4344 wrote to memory of 2888 4344 msedge.exe 83 PID 4344 wrote to memory of 2888 4344 msedge.exe 83 PID 4344 wrote to memory of 2888 4344 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://server1.aserdefa.ru/deploy.xml1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff918263cb8,0x7ff918263cc8,0x7ff918263cd82⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1820,3221146533083604647,16865309957224398611,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1820,3221146533083604647,16865309957224398611,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1820,3221146533083604647,16865309957224398611,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2592 /prefetch:82⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,3221146533083604647,16865309957224398611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,3221146533083604647,16865309957224398611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,3221146533083604647,16865309957224398611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,3221146533083604647,16865309957224398611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1820,3221146533083604647,16865309957224398611,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,3221146533083604647,16865309957224398611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,3221146533083604647,16865309957224398611,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4560 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,3221146533083604647,16865309957224398611,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,3221146533083604647,16865309957224398611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1820,3221146533083604647,16865309957224398611,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1820,3221146533083604647,16865309957224398611,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5612 /prefetch:82⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1820,3221146533083604647,16865309957224398611,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3628 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1592
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3960
Network
-
Remote address:8.8.8.8:53Requestserver1.aserdefa.ruIN AResponse
-
Remote address:8.8.8.8:53Requestserver1.aserdefa.ruIN A
-
Remote address:8.8.8.8:53Requestgoogle.comIN AResponsegoogle.comIN A216.58.201.110
-
Remote address:8.8.8.8:53Requestgoogle.comIN AResponsegoogle.comIN A216.58.201.110
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418541_1R6VGP5QQCA6F4RQL&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239340418541_1R6VGP5QQCA6F4RQL&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.22000
ResponseHTTP/2.0 200
content-length: 332738
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 82329672E3DD4299A6CA86021849B92B Ref B: LON04EDGE1110 Ref C: 2024-03-15T15:10:01Z
date: Fri, 15 Mar 2024 15:10:00 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301192_1O6NEWTZHCNXAKIDN&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301192_1O6NEWTZHCNXAKIDN&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.22000
ResponseHTTP/2.0 200
content-length: 182865
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: F1002B69471C48128BCF9231177DF49D Ref B: LON04EDGE1110 Ref C: 2024-03-15T15:10:01Z
date: Fri, 15 Mar 2024 15:10:00 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301601_1XLI7BR2VR1H1YJXB&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301601_1XLI7BR2VR1H1YJXB&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.22000
ResponseHTTP/2.0 200
content-length: 169683
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 266B3FFF18A64E38A7B23A378B106FD0 Ref B: LON04EDGE1110 Ref C: 2024-03-15T15:10:02Z
date: Fri, 15 Mar 2024 15:10:01 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418542_1M27CNBNVY6AXHL84&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239340418542_1M27CNBNVY6AXHL84&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.22000
ResponseHTTP/2.0 200
content-length: 325071
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 25C66B19A3F8440695DBEB6A5261B490 Ref B: LON04EDGE1110 Ref C: 2024-03-15T15:10:02Z
date: Fri, 15 Mar 2024 15:10:01 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301653_1VKC04F354IQVXJN4&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301653_1VKC04F354IQVXJN4&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.22000
ResponseHTTP/2.0 200
content-length: 97422
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 01A2ED38CB524168B5D75F783AE5A26E Ref B: LON04EDGE1110 Ref C: 2024-03-15T15:10:05Z
date: Fri, 15 Mar 2024 15:10:04 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301244_17N91ZKZSGROIQHSO&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301244_17N91ZKZSGROIQHSO&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.22000
ResponseHTTP/2.0 200
content-length: 91993
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 7DDEB072D9904914B04E4FD48ABBF733 Ref B: LON04EDGE1110 Ref C: 2024-03-15T15:10:05Z
date: Fri, 15 Mar 2024 15:10:04 GMT
-
GEThttps://www.bing.com/qbox?query=&language=en-US&pt=EdgBox&cvid=c859313d9567458a905e19c6d5d8938f&oit=0msedge.exeRemote address:92.123.128.195:443RequestGET /qbox?query=&language=en-US&pt=EdgBox&cvid=c859313d9567458a905e19c6d5d8938f&oit=0 HTTP/2.0
host: www.bing.com
sec-fetch-site: none
sec-fetch-mode: no-cors
sec-fetch-dest: empty
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Edg/90.0.818.66
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 200
content-type: application/json; charset=utf-8
cache-control: public, max-age=300
content-encoding: br
vary: Accept-Encoding
x-eventid: 65f464df9c114d7aac8a414c0999c501
useragentreductionoptout: A7kgTC5xdZ2WIVGZEfb1hUoNuvjzOZX3VIV/BA6C18kQOOF50Q0D3oWoAm49k3BQImkujKILc7JmPysWk3CSjwUAAACMeyJvcmlnaW4iOiJodHRwczovL3d3dy5iaW5nLmNvbTo0NDMiLCJmZWF0dXJlIjoiU2VuZEZ1bGxVc2VyQWdlbnRBZnRlclJlZHVjdGlvbiIsImV4cGlyeSI6MTY4NDg4NjM5OSwiaXNTdWJkb21haW4iOnRydWUsImlzVGhpcmRQYXJ0eSI6dHJ1ZX0=
content-security-policy-report-only: script-src https: 'strict-dynamic' 'report-sample' 'nonce-cJuZ1NpqQQV07RzASCTz3h+g24jXGSQDaG8eQHNOkCE='; base-uri 'self';report-to csp-endpoint
report-to: {"group":"csp-endpoint","max_age":86400,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingcsp"}]}
p3p: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND"
date: Fri, 15 Mar 2024 15:10:23 GMT
set-cookie: MUID=204D45F42A0F6E0B2A1C51B72B546F6C; domain=.bing.com; expires=Wed, 09-Apr-2025 15:10:23 GMT; path=/; secure; SameSite=None
set-cookie: MUIDB=204D45F42A0F6E0B2A1C51B72B546F6C; expires=Wed, 09-Apr-2025 15:10:23 GMT; path=/; HttpOnly
set-cookie: _EDGE_S=F=1&SID=303C711E43F764A9164D655D42AC6524; domain=.bing.com; path=/; HttpOnly
set-cookie: _EDGE_V=1; domain=.bing.com; expires=Wed, 09-Apr-2025 15:10:23 GMT; path=/; HttpOnly
set-cookie: USRLOC=HS=1; domain=.bing.com; expires=Wed, 09-Apr-2025 15:10:23 GMT; path=/; secure; HttpOnly; SameSite=None
set-cookie: SRCHD=AF=NOFORM; domain=.bing.com; expires=Wed, 09-Apr-2025 15:10:23 GMT; path=/; secure; SameSite=None
set-cookie: SRCHUID=V=2&GUID=1A6977E01144474684BDF9F8AE9BFBAD&dmnchg=1; domain=.bing.com; expires=Wed, 09-Apr-2025 15:10:23 GMT; path=/; secure; SameSite=None
set-cookie: SRCHUSR=DOB=20240315; domain=.bing.com; expires=Wed, 09-Apr-2025 15:10:23 GMT; path=/; secure; SameSite=None
set-cookie: SRCHHPGUSR=SRCHLANG=en; domain=.bing.com; expires=Wed, 09-Apr-2025 15:10:23 GMT; path=/; secure; SameSite=None
set-cookie: _SS=SID=303C711E43F764A9164D655D42AC6524; domain=.bing.com; path=/; secure; SameSite=None
alt-svc: h3=":443"; ma=93600
x-cdn-traceid: 0.c3777b5c.1710515422.28d3c13d
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestctldl.windowsupdate.comIN AResponsectldl.windowsupdate.comIN CNAMEwu-bg-shim.trafficmanager.netwu-bg-shim.trafficmanager.netIN CNAMEdownload.windowsupdate.com.edgesuite.netdownload.windowsupdate.com.edgesuite.netIN CNAMEa767.dspw65.akamai.neta767.dspw65.akamai.netIN A96.17.178.211a767.dspw65.akamai.netIN A96.17.178.175a767.dspw65.akamai.netIN A96.17.178.210a767.dspw65.akamai.netIN A96.17.178.176a767.dspw65.akamai.netIN A96.17.178.173a767.dspw65.akamai.netIN A96.17.178.197a767.dspw65.akamai.netIN A96.17.178.174a767.dspw65.akamai.netIN A96.17.178.204a767.dspw65.akamai.netIN A96.17.178.200
-
Remote address:8.8.8.8:53Request211.178.17.96.in-addr.arpaIN PTRResponse211.178.17.96.in-addr.arpaIN PTRa96-17-178-211deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestnexusrules.officeapps.live.comIN AResponsenexusrules.officeapps.live.comIN CNAMEprod.nexusrules.live.com.akadns.netprod.nexusrules.live.com.akadns.netIN A52.111.236.23
-
Remote address:8.8.8.8:53Requestnexusrules.officeapps.live.comIN A
-
Remote address:8.8.8.8:53Request23.236.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestarc.msn.comIN AResponsearc.msn.comIN CNAMEarc.trafficmanager.netarc.trafficmanager.netIN CNAMEiris-de-prod-azsc-v2-neu-b.northeurope.cloudapp.azure.comiris-de-prod-azsc-v2-neu-b.northeurope.cloudapp.azure.comIN A20.223.36.55
-
Remote address:8.8.8.8:53Requestarc.msn.comIN A
-
Remote address:8.8.8.8:53Request55.36.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request55.36.223.20.in-addr.arpaIN PTR
-
1.6kB 8.1kB 17 13
-
204.79.197.200:443https://tse1.mm.bing.net/th?id=OADD2.10239317301244_17N91ZKZSGROIQHSO&pid=21.2&w=1920&h=1080&c=4tls, http246.0kB 1.3MB 931 928
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418541_1R6VGP5QQCA6F4RQL&pid=21.2&w=1080&h=1920&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301192_1O6NEWTZHCNXAKIDN&pid=21.2&w=1920&h=1080&c=4HTTP Response
200HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301601_1XLI7BR2VR1H1YJXB&pid=21.2&w=1080&h=1920&c=4HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418542_1M27CNBNVY6AXHL84&pid=21.2&w=1920&h=1080&c=4HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301653_1VKC04F354IQVXJN4&pid=21.2&w=1080&h=1920&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301244_17N91ZKZSGROIQHSO&pid=21.2&w=1920&h=1080&c=4HTTP Response
200HTTP Response
200 -
2.1kB 8.1kB 18 14
-
1.8kB 641 B 13 9
-
1.2kB 589 B 11 8
-
41.5kB 142.8kB 156 132
-
4.5kB 7.7kB 24 17
-
1.2kB 5.3kB 16 13
-
66.8kB 1.4MB 1099 1053
-
1.3kB 5.4kB 18 14
-
1.2kB 5.3kB 16 13
-
1.2kB 5.3kB 16 13
-
1.3kB 5.4kB 18 14
-
1.3kB 5.4kB 18 14
-
1.2kB 5.3kB 16 13
-
1.2kB 5.8kB 16 12
-
1.3kB 5.4kB 18 14
-
92.123.128.195:443https://www.bing.com/qbox?query=&language=en-US&pt=EdgBox&cvid=c859313d9567458a905e19c6d5d8938f&oit=0tls, http2msedge.exe1.6kB 7.2kB 14 14
HTTP Request
GET https://www.bing.com/qbox?query=&language=en-US&pt=EdgBox&cvid=c859313d9567458a905e19c6d5d8938f&oit=0HTTP Response
200
-
130 B 125 B 2 1
DNS Request
server1.aserdefa.ru
DNS Request
server1.aserdefa.ru
-
56 B 72 B 1 1
DNS Request
google.com
DNS Response
216.58.201.110
-
56 B 72 B 1 1
DNS Request
google.com
DNS Response
216.58.201.110
-
395 B 6
-
364 B 775 B 5 4
DNS Request
26.35.223.20.in-addr.arpa
DNS Request
ctldl.windowsupdate.com
DNS Response
96.17.178.21196.17.178.17596.17.178.21096.17.178.17696.17.178.17396.17.178.19796.17.178.17496.17.178.20496.17.178.200
DNS Request
211.178.17.96.in-addr.arpa
DNS Request
nexusrules.officeapps.live.com
DNS Request
nexusrules.officeapps.live.com
DNS Response
52.111.236.23
-
186 B 335 B 3 2
DNS Request
23.236.111.52.in-addr.arpa
DNS Request
arc.msn.com
DNS Request
arc.msn.com
DNS Response
20.223.36.55
-
142 B 157 B 2 1
DNS Request
55.36.223.20.in-addr.arpa
DNS Request
55.36.223.20.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD596899614360333c9904499393c6e3d75
SHA1bbfa17cf8df01c266323965735f00f0e9e04cd34
SHA256486e4b4bb11f664c91c675e73cfeabe53b5009ae719459813be17814cd97e43c
SHA512974735b40a9f92b40a37a698f7f333590f32ff45633c6e619500e74ec274bc20bf7dbc830b1685777b714d37a3ca103d741ee056f4ff45ef08c07b38a7895df7
-
Filesize
152B
MD519a8bcb40a17253313345edd2a0da1e7
SHA186fac74b5bbc59e910248caebd1176a48a46d72e
SHA256b8024fbed11683ef4b53f5afac0ff691025b7eecca0f6a95737da1585558227e
SHA5129f8780f49d30aad01b28189804329aeca6ad2b7ffb6be505d40bb1af7802bb62622f518cb1c43a5815bbbb46638f6c52aead3d68f14fa957d18157edb42e95c0
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
5KB
MD5fccf6d09485b013f037180868efcaf48
SHA1bdb2604438eecec1e6eb63b5f41b715c9aa4d9c1
SHA25678b25da0f9842880f7cd9f27735d2ddef9550ee43946cbc6e5fafdfa34916d22
SHA51264a32432e684f8cc7ccc57ef931de4f4d3460d91133cff28e86b9152e7fe2150fd54a51b1a023d2554bd292ca7ffe221ba7db0fbbfe11f12ead3859617b10c71
-
Filesize
6KB
MD5d53592fc5f0a2e0092832c28422ba2d9
SHA144dcdd77ca77cf4410eac9006e46f35072e3d718
SHA256824dd66ddd1e92e4efc39853d96debf63abf38c959ae1140ec78bcca928659bc
SHA512c29e990b8cec55742751228c59683ca58eda745fbccaee7a5621d4e05b04eac250dc3a5760e1dfea1ad0beab9019494fe70e463433cc94e86084df68c776ba32
-
Filesize
6KB
MD52affdc243505cc2b38695f43dd10e1a0
SHA1b66c06340456b6b331520b872489309d5db9199b
SHA2562bb85d2d0f45777926d4cb19f435bf479007169cdbe48c1ce22345df03d9047e
SHA5122834eebd4aed9a808014ac12b7f3a85c44e4623064b8d0373b387da8c7f20dab91a68960d89a17e5832e4daaf3a076931f295f68bc59cc35a23b7ec2508c811b
-
Filesize
5KB
MD502774320a7669dbca90251357e9ca0b4
SHA13c0cad7a7fcb1a415134092e555fdfd244a24167
SHA2565273a762a305f2f8424ca4930f9d888d417d5c54ab107e97a41ceede61d8f578
SHA5129aad804e0047324a715bbcfceda392892d5d66dea61bf01d7a04808ab1e4925786cb6986fd161963ba878777883dbe1656c2014ec86cdf2ce0cd2282f2cf705f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD588b4f4a87ccfd8a0a60741ba3dc9bb12
SHA19b62a62e099b78f60d5384644beda22a99c4e49c
SHA2566fec7849920ac97fffe6f050336c52c3f1b90ce15cf565b95ab96cfd90fd4fec
SHA5129fafc3efceb6ecb04ed636422193be360348c4b07be9e9789de5013fafb9b81b3e3f05be672a1c51b159bfc0d0dcba2c61bc120f8664ee4ce1a3c4e36c14dee0
-
Filesize
11KB
MD554c69eff48867bdb2a6d28509e064c6f
SHA1a57f28f0cd60a03eaad677989a48d5f295b05197
SHA2567bf4e00556ae33d89e584395693313bff25f229c22938681418d5dfbda2d7e43
SHA512901e6a80c28a66c36824c0e81ea2a26c55406eaa05afd597d39484372d0d1179acb57a03f9dd24a26fdf5ba139505c858fa5da77ff8def2839fa5e14e629d00f