Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 01:41 UTC

General

  • Target

    2024-08-10_6f427dc92b46c6e9a6f1c06e2474a96b_goldeneye.exe

  • Size

    197KB

  • MD5

    6f427dc92b46c6e9a6f1c06e2474a96b

  • SHA1

    b9a42ee1f7a3228fb794383cf6e8b82968271a58

  • SHA256

    0175cdcf69c3c0e922683edd59d2db3b09d79e3c774a366f8c93c23ec10f61d2

  • SHA512

    81316010b98f72660eaff1ee9de930f5d93c970c5f91bca6c232ab0302da983a4608ef1dd659ee5784a61fbf5b8ab9794e9525e0dd24354285649f1b40bad41c

  • SSDEEP

    3072:jEGh0oQl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGGlEeKcAEca

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 25 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-10_6f427dc92b46c6e9a6f1c06e2474a96b_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-10_6f427dc92b46c6e9a6f1c06e2474a96b_goldeneye.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Windows\{D4D434F2-753B-429b-BF10-EDEC2F6C8D71}.exe
      C:\Windows\{D4D434F2-753B-429b-BF10-EDEC2F6C8D71}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2072
      • C:\Windows\{84E610D7-4403-40df-9B61-8309494EC9C4}.exe
        C:\Windows\{84E610D7-4403-40df-9B61-8309494EC9C4}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2064
        • C:\Windows\{801CF440-F8E7-47bd-97EC-9E39F1058F6E}.exe
          C:\Windows\{801CF440-F8E7-47bd-97EC-9E39F1058F6E}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3148
          • C:\Windows\{3455EA52-F233-4dd4-9A27-8B145A122633}.exe
            C:\Windows\{3455EA52-F233-4dd4-9A27-8B145A122633}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3960
            • C:\Windows\{E9C49CCE-BA6B-46d2-BBC1-DEFF1CE8B06E}.exe
              C:\Windows\{E9C49CCE-BA6B-46d2-BBC1-DEFF1CE8B06E}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1404
              • C:\Windows\{495A3927-5BEE-4f24-9E62-A2F25094FA2E}.exe
                C:\Windows\{495A3927-5BEE-4f24-9E62-A2F25094FA2E}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:4888
                • C:\Windows\{E502FD09-C4FC-4926-B64D-5F8F0A0EE300}.exe
                  C:\Windows\{E502FD09-C4FC-4926-B64D-5F8F0A0EE300}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2664
                  • C:\Windows\{AAB6D3CB-68C5-4708-9AA8-C33C62782C08}.exe
                    C:\Windows\{AAB6D3CB-68C5-4708-9AA8-C33C62782C08}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4764
                    • C:\Windows\{861889D2-E70E-4517-8B7E-974F29D7EBBD}.exe
                      C:\Windows\{861889D2-E70E-4517-8B7E-974F29D7EBBD}.exe
                      10⤵
                      • Boot or Logon Autostart Execution: Active Setup
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3092
                      • C:\Windows\{86930B9C-4384-477c-AFA3-6FB41DB47023}.exe
                        C:\Windows\{86930B9C-4384-477c-AFA3-6FB41DB47023}.exe
                        11⤵
                        • Boot or Logon Autostart Execution: Active Setup
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2736
                        • C:\Windows\{A6F68B4D-1DBA-477d-A0F8-242F1106478A}.exe
                          C:\Windows\{A6F68B4D-1DBA-477d-A0F8-242F1106478A}.exe
                          12⤵
                          • Boot or Logon Autostart Execution: Active Setup
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:3992
                          • C:\Windows\{C7D12558-5E17-4ea3-A0BF-0584ABA314DF}.exe
                            C:\Windows\{C7D12558-5E17-4ea3-A0BF-0584ABA314DF}.exe
                            13⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:4408
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{A6F68~1.EXE > nul
                            13⤵
                            • System Location Discovery: System Language Discovery
                            PID:4272
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{86930~1.EXE > nul
                          12⤵
                          • System Location Discovery: System Language Discovery
                          PID:4840
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{86188~1.EXE > nul
                        11⤵
                        • System Location Discovery: System Language Discovery
                        PID:2652
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{AAB6D~1.EXE > nul
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:5072
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{E502F~1.EXE > nul
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:3152
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{495A3~1.EXE > nul
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:5104
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{E9C49~1.EXE > nul
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4292
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{3455E~1.EXE > nul
              6⤵
              • System Location Discovery: System Language Discovery
              PID:412
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{801CF~1.EXE > nul
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4832
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{84E61~1.EXE > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1844
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{D4D43~1.EXE > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4200
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1660

Network

  • flag-us
    DNS
    218.110.86.104.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    218.110.86.104.in-addr.arpa
    IN PTR
    Response
    218.110.86.104.in-addr.arpa
    IN PTR
    a104-86-110-218deploystaticakamaitechnologiescom
  • flag-us
    DNS
    97.17.167.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    97.17.167.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    68.159.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    68.159.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    26.35.223.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    26.35.223.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    228.249.119.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    228.249.119.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    157.123.68.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    157.123.68.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    18.31.95.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    18.31.95.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    24.66.18.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    24.66.18.2.in-addr.arpa
    IN PTR
    Response
    24.66.18.2.in-addr.arpa
    IN PTR
    a2-18-66-24deploystaticakamaitechnologiescom
  • flag-us
    DNS
    81.144.22.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    81.144.22.2.in-addr.arpa
    IN PTR
    Response
    81.144.22.2.in-addr.arpa
    IN PTR
    a2-22-144-81deploystaticakamaitechnologiescom
  • flag-us
    DNS
    31.243.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    31.243.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    tse1.mm.bing.net
    Remote address:
    8.8.8.8:53
    Request
    tse1.mm.bing.net
    IN A
    Response
    tse1.mm.bing.net
    IN CNAME
    mm-mm.bing.net.trafficmanager.net
    mm-mm.bing.net.trafficmanager.net
    IN CNAME
    ax-0001.ax-msedge.net
    ax-0001.ax-msedge.net
    IN A
    150.171.27.10
    ax-0001.ax-msedge.net
    IN A
    150.171.28.10
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239360265013_1UVY69FM05I7V26BP&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
    Remote address:
    150.171.27.10:443
    Request
    GET /th?id=OADD2.10239360265013_1UVY69FM05I7V26BP&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 193575
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 7E5ED36238CC42DFA61D367064DEA58E Ref B: LON04EDGE0619 Ref C: 2024-08-10T01:43:07Z
    date: Sat, 10 Aug 2024 01:43:07 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301683_1HSDAIPF7ZNRJKYTI&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
    Remote address:
    150.171.27.10:443
    Request
    GET /th?id=OADD2.10239317301683_1HSDAIPF7ZNRJKYTI&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 519962
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: D5B68C9EC9F34FC7A445E20006349AE4 Ref B: LON04EDGE0619 Ref C: 2024-08-10T01:43:07Z
    date: Sat, 10 Aug 2024 01:43:07 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317300911_1B8OV3E40VLMAHOY2&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
    Remote address:
    150.171.27.10:443
    Request
    GET /th?id=OADD2.10239317300911_1B8OV3E40VLMAHOY2&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 592206
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 7DB0662C4E7C4673BD853800D024A633 Ref B: LON04EDGE0619 Ref C: 2024-08-10T01:43:07Z
    date: Sat, 10 Aug 2024 01:43:07 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301344_1GOP24OENRO4Y0GB9&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
    Remote address:
    150.171.27.10:443
    Request
    GET /th?id=OADD2.10239317301344_1GOP24OENRO4Y0GB9&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 576031
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: A5054C0578CD4A079F51CE107EC8B4D4 Ref B: LON04EDGE0619 Ref C: 2024-08-10T01:43:07Z
    date: Sat, 10 Aug 2024 01:43:07 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301274_1PA1BJMKSSMY4Z5BP&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
    Remote address:
    150.171.27.10:443
    Request
    GET /th?id=OADD2.10239317301274_1PA1BJMKSSMY4Z5BP&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 608336
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: A1160E5E735C430981FD3D16D06D3D56 Ref B: LON04EDGE0619 Ref C: 2024-08-10T01:43:07Z
    date: Sat, 10 Aug 2024 01:43:07 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239360265014_1I9L6MC65FHDFQ9Z7&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
    Remote address:
    150.171.27.10:443
    Request
    GET /th?id=OADD2.10239360265014_1I9L6MC65FHDFQ9Z7&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
  • 150.171.27.10:443
    tse1.mm.bing.net
    tls, http2
    1.2kB
    6.9kB
    15
    13
  • 150.171.27.10:443
    https://tse1.mm.bing.net/th?id=OADD2.10239360265014_1I9L6MC65FHDFQ9Z7&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
    tls, http2
    121.7kB
    2.9MB
    2102
    2096

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239360265013_1UVY69FM05I7V26BP&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301683_1HSDAIPF7ZNRJKYTI&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317300911_1B8OV3E40VLMAHOY2&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301344_1GOP24OENRO4Y0GB9&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301274_1PA1BJMKSSMY4Z5BP&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

    HTTP Response

    200

    HTTP Response

    200

    HTTP Response

    200

    HTTP Response

    200

    HTTP Response

    200

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239360265014_1I9L6MC65FHDFQ9Z7&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
  • 150.171.27.10:443
    tse1.mm.bing.net
    tls, http2
    1.2kB
    6.9kB
    15
    13
  • 150.171.27.10:443
    tse1.mm.bing.net
    tls, http2
    1.2kB
    6.9kB
    15
    13
  • 150.171.27.10:443
    tse1.mm.bing.net
    tls, http2
    1.2kB
    6.9kB
    16
    13
  • 8.8.8.8:53
    218.110.86.104.in-addr.arpa
    dns
    73 B
    139 B
    1
    1

    DNS Request

    218.110.86.104.in-addr.arpa

  • 8.8.8.8:53
    97.17.167.52.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    97.17.167.52.in-addr.arpa

  • 8.8.8.8:53
    68.159.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    68.159.190.20.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    26.35.223.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    26.35.223.20.in-addr.arpa

  • 8.8.8.8:53
    228.249.119.40.in-addr.arpa
    dns
    73 B
    159 B
    1
    1

    DNS Request

    228.249.119.40.in-addr.arpa

  • 8.8.8.8:53
    157.123.68.40.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    157.123.68.40.in-addr.arpa

  • 8.8.8.8:53
    18.31.95.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    18.31.95.13.in-addr.arpa

  • 8.8.8.8:53
    24.66.18.2.in-addr.arpa
    dns
    69 B
    131 B
    1
    1

    DNS Request

    24.66.18.2.in-addr.arpa

  • 8.8.8.8:53
    81.144.22.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    81.144.22.2.in-addr.arpa

  • 8.8.8.8:53
    31.243.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    31.243.111.52.in-addr.arpa

  • 8.8.8.8:53
    tse1.mm.bing.net
    dns
    62 B
    170 B
    1
    1

    DNS Request

    tse1.mm.bing.net

    DNS Response

    150.171.27.10
    150.171.28.10

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\{3455EA52-F233-4dd4-9A27-8B145A122633}.exe

    Filesize

    197KB

    MD5

    25e5fe8a9a1c04384f962afaaa0a92a5

    SHA1

    e21b91dbd5053f8ae7cecba9a360013b0be9dfe1

    SHA256

    3c7b1089f97d9e07fa2883db2bad797557032ed830de34cb8e9bd272eb953107

    SHA512

    752122a2120b7c8f69c12a9a7fabc984c14831af842a7edee56165af64dc062b1102081bdc8124c6543a9c7e6a43ba3e312951b3866b0fdcfcb55f808990793e

  • C:\Windows\{495A3927-5BEE-4f24-9E62-A2F25094FA2E}.exe

    Filesize

    197KB

    MD5

    ed929fcb8a5b128314c4273a8c18fc32

    SHA1

    c4a67815181716db54db10315e9812fb80a6f626

    SHA256

    90de956fe42dbbfad54aad4ec2af4673586c56daa2aeb143a54becc608c28389

    SHA512

    3b50473db1874c96d47967575e8eba4e55f277416929000800d6be990f659e0753c0366ff6ef0461c6afcc648dacd1daf9931ef10a47bb56916b23889d0f4a89

  • C:\Windows\{801CF440-F8E7-47bd-97EC-9E39F1058F6E}.exe

    Filesize

    197KB

    MD5

    fecaa9e66b7657b86d6f97223dcbf2ea

    SHA1

    cbe96f5f9442f629013c0ffcf08b95397ae29d08

    SHA256

    cfb622fb12dcf7f592358ef1274498147ea8d2c9dc5269d67510ab27737a47a6

    SHA512

    69d76005a381820f0bc243746e012f6f4a7ce6f267e1041238bee3f3259e973e5b5506130d41bce42603418676935ee99114274cc98d88e629afc11a87751fe6

  • C:\Windows\{84E610D7-4403-40df-9B61-8309494EC9C4}.exe

    Filesize

    197KB

    MD5

    98228ba9eb8f4feb313598bb9a57f221

    SHA1

    5832638e181a7cbfdb0a018358936d9d714e9b0b

    SHA256

    3d4c6dd9a6c004590eb9067e1c2a73f077a4da99f0eb5bd3c4ac1e08fbad005d

    SHA512

    f485aceb4d24d8e18cf4b65da8778a7a316e7c21788a7f9d91384ef2ed696008e45ceedfc190fed013b212e8b92804fca77b91e2e296a695c095b4ed4a7af436

  • C:\Windows\{861889D2-E70E-4517-8B7E-974F29D7EBBD}.exe

    Filesize

    197KB

    MD5

    b052cdb028c1c249746f9926b77ed2f9

    SHA1

    cf1a12717dc84c01a5c137c7e51c8afb162174e4

    SHA256

    4db6475304c30bfd07ef9b89e23d5d70187c57b967f982bc44686beb6d0d74ae

    SHA512

    64420558340b1ad2075769d2f2286b86866813d8d17442b0911d2223d703fc193a31331f107733789e80ecdd04255bbea2992e49557dd9434943874fcd24d9b3

  • C:\Windows\{86930B9C-4384-477c-AFA3-6FB41DB47023}.exe

    Filesize

    197KB

    MD5

    754d05917a2057bf2381692d3fd9eb76

    SHA1

    24b980604a13bdf682fcfad4a3a894610020b66a

    SHA256

    bd3a77a7001acac138c1593fe8a0a7443618bc94431f500e23e5e736256207db

    SHA512

    76bddb890fe6a57584a0989b37e21969b25cfc9cadc08d68e5f04d1babeb0a6d8919784a13a0f79cdb02559266a24a8a10609f33f13f8d1cbb385403d085af45

  • C:\Windows\{A6F68B4D-1DBA-477d-A0F8-242F1106478A}.exe

    Filesize

    197KB

    MD5

    712843af8f8b1c10c3dc1fa8323baf22

    SHA1

    e1ec9b5f4a3d618d2a3ffd0d6a9f0aa3d30d5813

    SHA256

    aaaa091ffd5efdab02ca725d840e0dc55c26a4a252c62269018d7e354d4c1ff6

    SHA512

    7abf20236f775e3f78ca6cb122d21bdc4536f7dd36a81b064e7c54f9c1890f19a1da689956ae0bd61c05c5dc5326c619849d1545ce67f85db4b835e04c7e7122

  • C:\Windows\{AAB6D3CB-68C5-4708-9AA8-C33C62782C08}.exe

    Filesize

    197KB

    MD5

    bd2f9a3c55be7e931d0598868b05df44

    SHA1

    4206d563327e7df497f7b2fe41246cb0b1d6575d

    SHA256

    9b244de2f19a54274dde813ae9d62200b9f3b802db93d7a3d19a2ac0529a7f39

    SHA512

    b7a1f707c2765d2301ac6db0ce5cfd9f07afd1329199f38ddadb33ba73f3ae4bbf772d73a9ed7e2c1344b048e4659bd227d88e6c8d9e9eab342d7b125a26fd80

  • C:\Windows\{C7D12558-5E17-4ea3-A0BF-0584ABA314DF}.exe

    Filesize

    197KB

    MD5

    2f31f8eb6d1ec93fef2c0a7340249d16

    SHA1

    262cf57a0fedefd4f7e653cd865775c6604acb2e

    SHA256

    0dbb8faccdb73b78bdfb3806daf799284156d3e2785145b300528c173bf8d9ad

    SHA512

    3f8d5fdf32306ac17b243b9510fc047b9f5255a1060577398b3b59e748b641be0c78e8e376f2619ae5c3b05a853840470201b33dd9560178a6c97562766f7b3a

  • C:\Windows\{D4D434F2-753B-429b-BF10-EDEC2F6C8D71}.exe

    Filesize

    197KB

    MD5

    65fd1727e6b83dec7ce1ac76f6b2adfa

    SHA1

    2a1792269aab0c59a3f52baac9726a979c968fe6

    SHA256

    de06fc4921a9169f01cdf5d8d7513368b8715cbe4b2c5a7c18830c9fb3c18e41

    SHA512

    b55a85ab7617e31a8c9e83dc56cf2db1bf33fe9d3797418eb7753e3709680742d01367db6bf49a39863bc69813e6b4d4d15b38be5fee97ba05080ca9b1a31a0a

  • C:\Windows\{E9C49CCE-BA6B-46d2-BBC1-DEFF1CE8B06E}.exe

    Filesize

    197KB

    MD5

    af90312e749334b3a613e2e329dfc066

    SHA1

    aaf4fb6ef8a3f23b3682ab9d9c2a57d29e6b4be3

    SHA256

    5f372727223293e2bd4742aa6ff5d8bbb0fe7edeea7034b153befc80bf6dd3ca

    SHA512

    644aeb4c57039cbbf924c20bc954d6a2c6844ad88ac9ff12ec2b281986f756281e5b955687668570a28a26e67673c5af6ffa37050a187801d2785243a4e0ce98

  • memory/4888-23-0x0000000003980000-0x0000000003A5B000-memory.dmp

    Filesize

    876KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.