Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3渣渣网�...x.html
windows7-x64
1渣渣网�...x.html
windows10-2004-x64
1渣渣网�...ex.htm
windows7-x64
1渣渣网�...ex.htm
windows10-2004-x64
1渣渣网�...enu.js
windows7-x64
3渣渣网�...enu.js
windows10-2004-x64
3渣渣网�...dar.js
windows7-x64
3渣渣网�...dar.js
windows10-2004-x64
3渣渣网�...x.html
windows7-x64
1渣渣网�...x.html
windows10-2004-x64
1渣渣网�...-br.js
windows7-x64
3渣渣网�...-br.js
windows10-2004-x64
3渣渣网�...-ca.js
windows7-x64
3渣渣网�...-ca.js
windows10-2004-x64
3渣渣网�...win.js
windows7-x64
3渣渣网�...win.js
windows10-2004-x64
3渣渣网�...-da.js
windows7-x64
3渣渣网�...-da.js
windows10-2004-x64
3渣渣网�...-du.js
windows7-x64
3渣渣网�...-du.js
windows10-2004-x64
3渣渣网�...-el.js
windows7-x64
3渣渣网�...-el.js
windows10-2004-x64
3渣渣网�...-en.js
windows7-x64
3渣渣网�...-en.js
windows10-2004-x64
3渣渣网�...-es.js
windows7-x64
3渣渣网�...-es.js
windows10-2004-x64
3渣渣网�...-fr.js
windows7-x64
3渣渣网�...-fr.js
windows10-2004-x64
3渣渣网�...-it.js
windows7-x64
3渣渣网�...-it.js
windows10-2004-x64
3渣渣网�...-nl.js
windows7-x64
3渣渣网�...-nl.js
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 22:50 UTC
Static task
static1
Behavioral task
behavioral1
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/images/ThemeOffice/index.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/images/ThemeOffice/index.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/index.htm
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/index.htm
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/JSCookMenu.js
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/JSCookMenu.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/calendar.js
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/calendar.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/index.html
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/index.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/lang/calendar-br.js
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/lang/calendar-br.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/lang/calendar-ca.js
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/lang/calendar-ca.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/lang/calendar-cs-win.js
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/lang/calendar-cs-win.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/lang/calendar-da.js
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/lang/calendar-da.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/lang/calendar-du.js
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/lang/calendar-du.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/lang/calendar-el.js
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/lang/calendar-el.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/lang/calendar-en.js
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/lang/calendar-en.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral25
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/lang/calendar-es.js
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/lang/calendar-es.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral27
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/lang/calendar-fr.js
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/lang/calendar-fr.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral29
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/lang/calendar-it.js
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/lang/calendar-it.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/lang/calendar-nl.js
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/lang/calendar-nl.js
Resource
win10v2004-20240704-en
General
-
Target
渣渣网络商店系统(ZZShop) v1.0/admins/js/calendar/index.html
-
Size
47B
-
MD5
dd5d02cc750d2855cf6f6c5bf5bea587
-
SHA1
48f9dc79b3d531c23d71e77ceffeca774fd4955e
-
SHA256
5b6576ad5f7079ed401d054ef98f21a53c9a333f1bf88ce558779ead30b6c84a
-
SHA512
ba4eb3b6c30b6bc3fdb40763c877039115af3991e53e591bbe848112cf22310b744b044038cc349e76a8566cd0de9d3baa5376fe346a41cab1cea7115bcf38c3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2496 msedge.exe 2496 msedge.exe 1104 msedge.exe 1104 msedge.exe 2884 identity_helper.exe 2884 identity_helper.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1104 wrote to memory of 3176 1104 msedge.exe 83 PID 1104 wrote to memory of 3176 1104 msedge.exe 83 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 3892 1104 msedge.exe 84 PID 1104 wrote to memory of 2496 1104 msedge.exe 85 PID 1104 wrote to memory of 2496 1104 msedge.exe 85 PID 1104 wrote to memory of 2672 1104 msedge.exe 86 PID 1104 wrote to memory of 2672 1104 msedge.exe 86 PID 1104 wrote to memory of 2672 1104 msedge.exe 86 PID 1104 wrote to memory of 2672 1104 msedge.exe 86 PID 1104 wrote to memory of 2672 1104 msedge.exe 86 PID 1104 wrote to memory of 2672 1104 msedge.exe 86 PID 1104 wrote to memory of 2672 1104 msedge.exe 86 PID 1104 wrote to memory of 2672 1104 msedge.exe 86 PID 1104 wrote to memory of 2672 1104 msedge.exe 86 PID 1104 wrote to memory of 2672 1104 msedge.exe 86 PID 1104 wrote to memory of 2672 1104 msedge.exe 86 PID 1104 wrote to memory of 2672 1104 msedge.exe 86 PID 1104 wrote to memory of 2672 1104 msedge.exe 86 PID 1104 wrote to memory of 2672 1104 msedge.exe 86 PID 1104 wrote to memory of 2672 1104 msedge.exe 86 PID 1104 wrote to memory of 2672 1104 msedge.exe 86 PID 1104 wrote to memory of 2672 1104 msedge.exe 86 PID 1104 wrote to memory of 2672 1104 msedge.exe 86 PID 1104 wrote to memory of 2672 1104 msedge.exe 86 PID 1104 wrote to memory of 2672 1104 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\渣渣网络商店系统(ZZShop) v1.0\admins\js\calendar\index.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84f5e46f8,0x7ff84f5e4708,0x7ff84f5e47182⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,2634023564638794511,10379046795386641881,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1992,2634023564638794511,10379046795386641881,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2528 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1992,2634023564638794511,10379046795386641881,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,2634023564638794511,10379046795386641881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,2634023564638794511,10379046795386641881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,2634023564638794511,10379046795386641881,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,2634023564638794511,10379046795386641881,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,2634023564638794511,10379046795386641881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,2634023564638794511,10379046795386641881,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,2634023564638794511,10379046795386641881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,2634023564638794511,10379046795386641881,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,2634023564638794511,10379046795386641881,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1564 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2772
Network
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.dual-a-0034.a-msedge.netg-bing-com.dual-a-0034.a-msedge.netIN CNAMEdual-a-0034.a-msedge.netdual-a-0034.a-msedge.netIN A13.107.21.237dual-a-0034.a-msedge.netIN A204.79.197.237
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=dd1244b84f3549748c4b1594888dd97f&localId=w:BA92A146-83EA-3704-B8DF-12231551E870&deviceId=6966568097803362&anid=Remote address:13.107.21.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=dd1244b84f3549748c4b1594888dd97f&localId=w:BA92A146-83EA-3704-B8DF-12231551E870&deviceId=6966568097803362&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=1162BC547BD164990A03A8E17A6A6557; domain=.bing.com; expires=Fri, 01-Aug-2025 03:49:55 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: ED483DE43B12434C9F633CE70A4DBADA Ref B: LON04EDGE0917 Ref C: 2024-07-07T03:49:55Z
date: Sun, 07 Jul 2024 03:49:54 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=dd1244b84f3549748c4b1594888dd97f&localId=w:BA92A146-83EA-3704-B8DF-12231551E870&deviceId=6966568097803362&anid=Remote address:13.107.21.237:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=dd1244b84f3549748c4b1594888dd97f&localId=w:BA92A146-83EA-3704-B8DF-12231551E870&deviceId=6966568097803362&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=1162BC547BD164990A03A8E17A6A6557
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=SHLaTNaLXDZx25PcvjYzdjT2lSX4s4peXQpn2qlfS4I; domain=.bing.com; expires=Fri, 01-Aug-2025 03:49:55 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 4442208E2C54468E9B418AC3BC95DD0E Ref B: LON04EDGE0917 Ref C: 2024-07-07T03:49:55Z
date: Sun, 07 Jul 2024 03:49:54 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=dd1244b84f3549748c4b1594888dd97f&localId=w:BA92A146-83EA-3704-B8DF-12231551E870&deviceId=6966568097803362&anid=Remote address:13.107.21.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=dd1244b84f3549748c4b1594888dd97f&localId=w:BA92A146-83EA-3704-B8DF-12231551E870&deviceId=6966568097803362&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=1162BC547BD164990A03A8E17A6A6557; MSPTC=SHLaTNaLXDZx25PcvjYzdjT2lSX4s4peXQpn2qlfS4I
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: E6D4315B788848D9BB512131EF57040D Ref B: LON04EDGE0917 Ref C: 2024-07-07T03:49:55Z
date: Sun, 07 Jul 2024 03:49:55 GMT
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request73.144.22.2.in-addr.arpaIN PTRResponse73.144.22.2.in-addr.arpaIN PTRa2-22-144-73deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request4.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request237.21.107.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request55.36.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request103.169.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request81.144.22.2.in-addr.arpaIN PTRResponse81.144.22.2.in-addr.arpaIN PTRa2-22-144-81deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.173.189.20.in-addr.arpaIN PTRResponse
-
13.107.21.237:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=dd1244b84f3549748c4b1594888dd97f&localId=w:BA92A146-83EA-3704-B8DF-12231551E870&deviceId=6966568097803362&anid=tls, http22.0kB 9.3kB 22 19
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=dd1244b84f3549748c4b1594888dd97f&localId=w:BA92A146-83EA-3704-B8DF-12231551E870&deviceId=6966568097803362&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=dd1244b84f3549748c4b1594888dd97f&localId=w:BA92A146-83EA-3704-B8DF-12231551E870&deviceId=6966568097803362&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=dd1244b84f3549748c4b1594888dd97f&localId=w:BA92A146-83EA-3704-B8DF-12231551E870&deviceId=6966568097803362&anid=HTTP Response
204
-
56 B 151 B 1 1
DNS Request
g.bing.com
DNS Response
13.107.21.237204.79.197.237
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
73.144.22.2.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
4.159.190.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
237.21.107.13.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
55.36.223.20.in-addr.arpa
-
580 B 9
-
73 B 147 B 1 1
DNS Request
103.169.127.40.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
81.144.22.2.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
13.227.111.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
15.173.189.20.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53c78617ec8f88da19254f9ff03312175
SHA1344e9fed9434d924d1c9f05351259cbc21e434d3
SHA2563cb47fcdca33bb3c8f4acc98424140987235ad79815da4f0e7593e4591ae90ed
SHA5125b58675088b0fc2b2d705cb648ea89385b80c7cf908b0f4f95a9acdbd350b50754e1b586202db6a918eef70029fafb210947f3c43c570ecf7657e08939fd7e9c
-
Filesize
152B
MD509c7ae658385f6de986103443217840b
SHA1298d880503edce4413337c09d3525f27a2edcd28
SHA25691e04ec38abdb0204458543592c4621b7bc0306407884f764aa9596a52454cd7
SHA5124e1272b209487d1e9e7d8502be49ebce91c76718410e817b3ac7faf47d9b699210aab1b941fbb5ddafc192ddf4b2ba151afd47fab753ec62bc0bca36039c55c3
-
Filesize
6KB
MD5041833bc38623d79d6da99dec2e36e32
SHA185f5d8d8b36ab14c9e826e146d50576631402236
SHA2561ffb4dd025bcf5ed27db4834b8c5b84291be7b1b8a4e9d1ab0fdfe05a80dfd0e
SHA5125684f3ea7408fb8fc6b9ade909b245acc1f0f18dea97d1dbcb8a1768bbd9be72815294139cde022515ec2bc5e247ae95c28d8aacca821ec67788d379c95d7dbb
-
Filesize
6KB
MD531306febfb087b878a3a40ff42032eee
SHA184a10a0b58ecb96d455e6d9ee6616b9ffc39f51f
SHA256489e19205d1c0ece6211e1a2391c1297bb0894f93af7cc2ccba0dc42cc046164
SHA5123e16c9379f8e1eea445c71685010bea06188b87141b9a6c02bd8a8f4a19d137a7291d9c70f345f39ea802715d05a46ecbf62649efbe7a29369cdbe7e6080d7de
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5278fff6b1e21e4a9f4091a459659a98d
SHA1b76688193ac726ccc46a20e26cc6f4d39e5e9f68
SHA2564efb1022ffce4d86f25de060592993bf0f3d174a3ecd48d25e8ca88414a9acfb
SHA51273d139a7a86a081ba3eb259862d86f64d1c90367964f41ea949919df4e4ade288748aeed70afdd7535f75370cbf07465346d7342aad8f70d236a06e2391d615d