Overview
overview
3Static
static
3FeatherRelease.rar
windows7-x64
3FeatherRelease.rar
windows10-2004-x64
3Microsoft....re.dll
windows7-x64
1Microsoft....re.dll
windows10-2004-x64
1Microsoft....ms.dll
windows7-x64
1Microsoft....ms.dll
windows10-2004-x64
1Microsoft....pf.dll
windows7-x64
1Microsoft....pf.dll
windows10-2004-x64
1bin/API.dll
windows7-x64
1bin/API.dll
windows10-2004-x64
1bin/Ace/ace.html
windows7-x64
3bin/Ace/ace.html
windows10-2004-x64
3bin/Ace/ace/ace.js
windows7-x64
3bin/Ace/ace/ace.js
windows10-2004-x64
3bin/Ace/ac...ify.js
windows7-x64
3bin/Ace/ac...ify.js
windows10-2004-x64
3bin/Ace/ac...ens.js
windows7-x64
3bin/Ace/ac...ens.js
windows10-2004-x64
3bin/Ace/ac...ite.js
windows7-x64
3bin/Ace/ac...ite.js
windows10-2004-x64
3bin/Ace/ac...met.js
windows7-x64
3bin/Ace/ac...met.js
windows10-2004-x64
3bin/Ace/ac...ker.js
windows7-x64
3bin/Ace/ac...ker.js
windows10-2004-x64
3bin/Ace/ac...enu.js
windows7-x64
3bin/Ace/ac...enu.js
windows10-2004-x64
3bin/Ace/ac...ols.js
windows7-x64
3bin/Ace/ac...ols.js
windows10-2004-x64
3bin/Ace/ac...ing.js
windows7-x64
3bin/Ace/ac...ing.js
windows10-2004-x64
3bin/Ace/ac...ist.js
windows7-x64
3bin/Ace/ac...ist.js
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 14:26 UTC
Static task
static1
Behavioral task
behavioral1
Sample
FeatherRelease.rar
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
FeatherRelease.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Microsoft.Web.WebView2.Core.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Microsoft.Web.WebView2.WinForms.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Microsoft.Web.WebView2.Wpf.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
bin/API.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
bin/API.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
bin/Ace/ace.html
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
bin/Ace/ace.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
bin/Ace/ace/ace.js
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
bin/Ace/ace/ace.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
bin/Ace/ace/ext-beautify.js
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
bin/Ace/ace/ext-beautify.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
bin/Ace/ace/ext-code_lens.js
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
bin/Ace/ace/ext-code_lens.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
bin/Ace/ace/ext-elastic_tabstops_lite.js
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
bin/Ace/ace/ext-elastic_tabstops_lite.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
bin/Ace/ace/ext-emmet.js
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
bin/Ace/ace/ext-emmet.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
bin/Ace/ace/ext-error_marker.js
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
bin/Ace/ace/ext-error_marker.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
bin/Ace/ace/ext-keybinding_menu.js
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
bin/Ace/ace/ext-keybinding_menu.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
bin/Ace/ace/ext-language_tools.js
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
bin/Ace/ace/ext-language_tools.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
bin/Ace/ace/ext-linking.js
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
bin/Ace/ace/ext-linking.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
bin/Ace/ace/ext-modelist.js
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
bin/Ace/ace/ext-modelist.js
Resource
win10v2004-20240802-en
General
-
Target
bin/Ace/ace.html
-
Size
2KB
-
MD5
9ea3feaaed24c94916fc81753150e654
-
SHA1
40c05dc617784b9e05a51fc63febc9bf684b650f
-
SHA256
d9fa6f0596b11057cff5d08d0df2e83ba6e3b0a4d83ba1bc73235f6b4b9d8b86
-
SHA512
3424a19da7f40874f80ea357dcb553189568409b587ae2b60c4a2cabed2feded92b9dfaef751e0b4705bb15593522fd6c60e97b6438a0f75e33ee91d0849a3df
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 180 msedge.exe 180 msedge.exe 4536 msedge.exe 4536 msedge.exe 4516 identity_helper.exe 4516 identity_helper.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4536 wrote to memory of 1188 4536 msedge.exe 84 PID 4536 wrote to memory of 1188 4536 msedge.exe 84 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 3700 4536 msedge.exe 85 PID 4536 wrote to memory of 180 4536 msedge.exe 86 PID 4536 wrote to memory of 180 4536 msedge.exe 86 PID 4536 wrote to memory of 3424 4536 msedge.exe 87 PID 4536 wrote to memory of 3424 4536 msedge.exe 87 PID 4536 wrote to memory of 3424 4536 msedge.exe 87 PID 4536 wrote to memory of 3424 4536 msedge.exe 87 PID 4536 wrote to memory of 3424 4536 msedge.exe 87 PID 4536 wrote to memory of 3424 4536 msedge.exe 87 PID 4536 wrote to memory of 3424 4536 msedge.exe 87 PID 4536 wrote to memory of 3424 4536 msedge.exe 87 PID 4536 wrote to memory of 3424 4536 msedge.exe 87 PID 4536 wrote to memory of 3424 4536 msedge.exe 87 PID 4536 wrote to memory of 3424 4536 msedge.exe 87 PID 4536 wrote to memory of 3424 4536 msedge.exe 87 PID 4536 wrote to memory of 3424 4536 msedge.exe 87 PID 4536 wrote to memory of 3424 4536 msedge.exe 87 PID 4536 wrote to memory of 3424 4536 msedge.exe 87 PID 4536 wrote to memory of 3424 4536 msedge.exe 87 PID 4536 wrote to memory of 3424 4536 msedge.exe 87 PID 4536 wrote to memory of 3424 4536 msedge.exe 87 PID 4536 wrote to memory of 3424 4536 msedge.exe 87 PID 4536 wrote to memory of 3424 4536 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bin\Ace\ace.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe899d46f8,0x7ffe899d4708,0x7ffe899d47182⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,13754436631266139493,10448403932790946562,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,13754436631266139493,10448403932790946562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,13754436631266139493,10448403932790946562,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,13754436631266139493,10448403932790946562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,13754436631266139493,10448403932790946562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,13754436631266139493,10448403932790946562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 /prefetch:82⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,13754436631266139493,10448403932790946562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,13754436631266139493,10448403932790946562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,13754436631266139493,10448403932790946562,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,13754436631266139493,10448403932790946562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,13754436631266139493,10448403932790946562,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,13754436631266139493,10448403932790946562,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3492
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2472
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request23.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.dual-a-0034.a-msedge.netg-bing-com.dual-a-0034.a-msedge.netIN CNAMEdual-a-0034.a-msedge.netdual-a-0034.a-msedge.netIN A204.79.197.237dual-a-0034.a-msedge.netIN A13.107.21.237
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7bed584163bd4919908577b8d0ae3cc0&localId=w:F595C12A-38F0-79CD-7666-DE379BE74C7C&deviceId=6966569430194623&anid=Remote address:204.79.197.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7bed584163bd4919908577b8d0ae3cc0&localId=w:F595C12A-38F0-79CD-7666-DE379BE74C7C&deviceId=6966569430194623&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=0310070D05246A2F329213DE04C46B4A; domain=.bing.com; expires=Sun, 31-Aug-2025 14:27:14 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: A2C98A9B8F0549C38F4A9216B3921AF7 Ref B: LON04EDGE1006 Ref C: 2024-08-06T14:27:14Z
date: Tue, 06 Aug 2024 14:27:13 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=7bed584163bd4919908577b8d0ae3cc0&localId=w:F595C12A-38F0-79CD-7666-DE379BE74C7C&deviceId=6966569430194623&anid=Remote address:204.79.197.237:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=7bed584163bd4919908577b8d0ae3cc0&localId=w:F595C12A-38F0-79CD-7666-DE379BE74C7C&deviceId=6966569430194623&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=0310070D05246A2F329213DE04C46B4A
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=9yQEoGOffufJt1blTK7ItUUtaQ6Br0KI66OfsU8l2D8; domain=.bing.com; expires=Sun, 31-Aug-2025 14:27:14 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 1BA133E148C2474DADE42EC1AD154008 Ref B: LON04EDGE1006 Ref C: 2024-08-06T14:27:14Z
date: Tue, 06 Aug 2024 14:27:13 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7bed584163bd4919908577b8d0ae3cc0&localId=w:F595C12A-38F0-79CD-7666-DE379BE74C7C&deviceId=6966569430194623&anid=Remote address:204.79.197.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7bed584163bd4919908577b8d0ae3cc0&localId=w:F595C12A-38F0-79CD-7666-DE379BE74C7C&deviceId=6966569430194623&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=0310070D05246A2F329213DE04C46B4A; MSPTC=9yQEoGOffufJt1blTK7ItUUtaQ6Br0KI66OfsU8l2D8
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: D7479F478AEB4424A03F201FDA134410 Ref B: LON04EDGE1006 Ref C: 2024-08-06T14:27:14Z
date: Tue, 06 Aug 2024 14:27:13 GMT
-
Remote address:8.8.8.8:53Request237.197.79.204.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request43.58.199.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.190.18.2.in-addr.arpaIN PTRResponse73.190.18.2.in-addr.arpaIN PTRa2-18-190-73deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request79.190.18.2.in-addr.arpaIN PTRResponse79.190.18.2.in-addr.arpaIN PTRa2-18-190-79deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request13.227.111.52.in-addr.arpaIN PTRResponse
-
204.79.197.237:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7bed584163bd4919908577b8d0ae3cc0&localId=w:F595C12A-38F0-79CD-7666-DE379BE74C7C&deviceId=6966569430194623&anid=tls, http22.0kB 9.3kB 21 19
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7bed584163bd4919908577b8d0ae3cc0&localId=w:F595C12A-38F0-79CD-7666-DE379BE74C7C&deviceId=6966569430194623&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=7bed584163bd4919908577b8d0ae3cc0&localId=w:F595C12A-38F0-79CD-7666-DE379BE74C7C&deviceId=6966569430194623&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7bed584163bd4919908577b8d0ae3cc0&localId=w:F595C12A-38F0-79CD-7666-DE379BE74C7C&deviceId=6966569430194623&anid=HTTP Response
204
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
23.159.190.20.in-addr.arpa
-
56 B 151 B 1 1
DNS Request
g.bing.com
DNS Response
204.79.197.23713.107.21.237
-
73 B 143 B 1 1
DNS Request
237.197.79.204.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
43.58.199.20.in-addr.arpa
-
523 B 8
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
73.190.18.2.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
79.190.18.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
13.227.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
6KB
MD5d6ed6ff0a6a57cb30e3f873061d5bcb1
SHA1b25d5bce4e853f81d8922dbac44a119dc233d43f
SHA256b225a09945e86a3295fe911bd21411c3742066e9f8fd74f49b9ef3b3db18406d
SHA51240e795434bc07621e1fdcf2b44354b7cd2c33dcaab514b2de22a6f1147f9bf42b39c5ab4e89472fb03f4fc1b2d29bf198f78951f764e99ad0b3cb9005d3bf170
-
Filesize
6KB
MD5b5bc44d435a00d59719cdb5c96153437
SHA177a3c713b8476c869b315729a8b31538fde2f047
SHA256df1bd49e8b4aba4045d4c6f20428f9239c34e9051ddbbc2374a546a2f5ba337f
SHA512d78e1c545d91c83a2648add20d2d2ab0896055cf350a90f429b6a50f515bfe6d2a4fb67817b0a433e20ea4abec267ce884029c2d989047740cc6bd474ac07169
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5f9abcc9baa78dd79de926f6fd3e8d0cd
SHA190ca1948a6f36b9f181f62e1ead928542d0b35e1
SHA2568bea5e89c90930231e6fb9a0327f7a458a71090c69a34a34045e2d0e9d02b669
SHA5127df248100eee01d5b90417f3c3999a13f505ee2812b2bda5629a4ac70c32f500b885ca0bbf26d481c3c7e21adce44360b8bbbb9ebfb68371fcc2f829a57a7c26