Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
24s -
max time network
18s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 17:20 UTC
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://trk.pxmktampl.net/t/12147/52001765
Resource
win10v2004-20240802-en
General
-
Target
http://trk.pxmktampl.net/t/12147/52001765
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133681296603112094" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1664 chrome.exe 1664 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1664 chrome.exe 1664 chrome.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1664 wrote to memory of 3620 1664 chrome.exe 93 PID 1664 wrote to memory of 3620 1664 chrome.exe 93 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2884 1664 chrome.exe 94 PID 1664 wrote to memory of 2184 1664 chrome.exe 95 PID 1664 wrote to memory of 2184 1664 chrome.exe 95 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96 PID 1664 wrote to memory of 3188 1664 chrome.exe 96
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://trk.pxmktampl.net/t/12147/520017651⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa356dcc40,0x7ffa356dcc4c,0x7ffa356dcc582⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1852,i,3120090603162210423,2849555660296201561,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1844 /prefetch:22⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2112,i,3120090603162210423,2849555660296201561,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2160 /prefetch:32⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2208,i,3120090603162210423,2849555660296201561,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2216 /prefetch:82⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3032,i,3120090603162210423,2849555660296201561,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3068 /prefetch:12⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3040,i,3120090603162210423,2849555660296201561,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3780,i,3120090603162210423,2849555660296201561,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4612 /prefetch:82⤵PID:1116
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2840
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4804
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4216,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=4076 /prefetch:81⤵PID:832
Network
-
Remote address:8.8.8.8:53Requesttrk.pxmktampl.netIN AResponsetrk.pxmktampl.netIN CNAMEt.amplmkt.comt.amplmkt.comIN A35.190.73.131
-
Remote address:35.190.73.131:80RequestGET /t/12147/52001765 HTTP/1.1
Host: trk.pxmktampl.net
Connection: keep-alive
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Content-Type: image/gif
Content-Length: 43
x-frame-options: SAMEORIGIN
x-xss-protection: 0
x-content-type-options: nosniff
x-download-options: noopen
x-permitted-cross-domain-policies: none
referrer-policy: strict-origin-when-cross-origin
content-disposition: inline
content-transfer-encoding: binary
etag: W/"548f2d6f4d0d820c6c5ffbeffcbd7f0e"
cache-control: max-age=0, private, must-revalidate
x-request-id: f44bce476b059257f0d30044b960b34c
x-runtime: 0.002618
strict-transport-security: max-age=31536000; includeSubDomains
Via: 1.1 google
-
Remote address:35.190.73.131:80RequestGET /favicon.ico HTTP/1.1
Host: trk.pxmktampl.net
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer: http://trk.pxmktampl.net/t/12147/52001765
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 308 Permanent Redirect
Content-Type: text/html
Content-Length: 164
Location: https://app.amplemarket.com/favicon.ico
Strict-Transport-Security: max-age=31536000; includeSubDomains
Via: 1.1 google
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request149.220.183.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestapp.amplemarket.comIN AResponseapp.amplemarket.comIN A34.49.54.164
-
Remote address:34.49.54.164:443RequestGET /favicon.ico HTTP/2.0
host: app.amplemarket.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: image
referer: http://trk.pxmktampl.net/
accept-encoding: gzip, deflate, br, zstd
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 404
content-type: text/html; charset=UTF-8
content-length: 1567
x-request-id: 2d868dcb570f740324005c259b0fbbc4
x-runtime: 0.003361
strict-transport-security: max-age=31536000; includeSubDomains
-
Remote address:8.8.8.8:53Request131.73.190.35.in-addr.arpaIN PTRResponse131.73.190.35.in-addr.arpaIN PTR1317319035bcgoogleusercontentcom
-
Remote address:8.8.8.8:53Request74.213.58.216.in-addr.arpaIN PTRResponse74.213.58.216.in-addr.arpaIN PTRlhr25s01-in-f741e100net74.213.58.216.in-addr.arpaIN PTRpar21s18-in-f10�H74.213.58.216.in-addr.arpaIN PTRlhr25s01-in-f10�H
-
Remote address:8.8.8.8:53Request164.54.49.34.in-addr.arpaIN PTRResponse164.54.49.34.in-addr.arpaIN PTR164544934bcgoogleusercontentcom
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.dual-a-0034.a-msedge.netg-bing-com.dual-a-0034.a-msedge.netIN CNAMEdual-a-0034.a-msedge.netdual-a-0034.a-msedge.netIN A13.107.21.237dual-a-0034.a-msedge.netIN A204.79.197.237
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=9d2b9d75faa5473f81ede2023e2bf311&localId=w:C1C7FDA1-57D8-3617-175E-F6F87939E990&deviceId=6755468654767491&anid=Remote address:13.107.21.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=9d2b9d75faa5473f81ede2023e2bf311&localId=w:C1C7FDA1-57D8-3617-175E-F6F87939E990&deviceId=6755468654767491&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=16F16CF1F5786E6B289A782AF45F6F00; domain=.bing.com; expires=Mon, 08-Sep-2025 17:21:01 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: C4A13A6331294351927BC137449A6B94 Ref B: LON04EDGE0714 Ref C: 2024-08-14T17:21:01Z
date: Wed, 14 Aug 2024 17:21:01 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=9d2b9d75faa5473f81ede2023e2bf311&localId=w:C1C7FDA1-57D8-3617-175E-F6F87939E990&deviceId=6755468654767491&anid=Remote address:13.107.21.237:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=9d2b9d75faa5473f81ede2023e2bf311&localId=w:C1C7FDA1-57D8-3617-175E-F6F87939E990&deviceId=6755468654767491&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=16F16CF1F5786E6B289A782AF45F6F00
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=Bdf6rMTQ147R6Pre99J-Cd27b8lJJXrby08ihFrY7VE; domain=.bing.com; expires=Mon, 08-Sep-2025 17:21:01 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 132E2D9C1DAD47F787F048B59CC7B644 Ref B: LON04EDGE0714 Ref C: 2024-08-14T17:21:01Z
date: Wed, 14 Aug 2024 17:21:01 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=9d2b9d75faa5473f81ede2023e2bf311&localId=w:C1C7FDA1-57D8-3617-175E-F6F87939E990&deviceId=6755468654767491&anid=Remote address:13.107.21.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=9d2b9d75faa5473f81ede2023e2bf311&localId=w:C1C7FDA1-57D8-3617-175E-F6F87939E990&deviceId=6755468654767491&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=16F16CF1F5786E6B289A782AF45F6F00; MSPTC=Bdf6rMTQ147R6Pre99J-Cd27b8lJJXrby08ihFrY7VE
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 050FFEDA11FC40CAA14016698BB5162E Ref B: LON04EDGE0714 Ref C: 2024-08-14T17:21:01Z
date: Wed, 14 Aug 2024 17:21:01 GMT
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request237.21.107.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTRResponse
-
1.1kB 1.3kB 6 6
HTTP Request
GET http://trk.pxmktampl.net/t/12147/52001765HTTP Response
200HTTP Request
GET http://trk.pxmktampl.net/favicon.icoHTTP Response
308 -
98 B 52 B 2 1
-
675 B 132 B 3 3
-
753 B 132 B 4 3
-
1.6kB 5.8kB 12 14
HTTP Request
GET https://app.amplemarket.com/favicon.icoHTTP Response
404 -
13.107.21.237:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=9d2b9d75faa5473f81ede2023e2bf311&localId=w:C1C7FDA1-57D8-3617-175E-F6F87939E990&deviceId=6755468654767491&anid=tls, http22.0kB 9.3kB 21 19
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=9d2b9d75faa5473f81ede2023e2bf311&localId=w:C1C7FDA1-57D8-3617-175E-F6F87939E990&deviceId=6755468654767491&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=9d2b9d75faa5473f81ede2023e2bf311&localId=w:C1C7FDA1-57D8-3617-175E-F6F87939E990&deviceId=6755468654767491&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=9d2b9d75faa5473f81ede2023e2bf311&localId=w:C1C7FDA1-57D8-3617-175E-F6F87939E990&deviceId=6755468654767491&anid=HTTP Response
204
-
63 B 106 B 1 1
DNS Request
trk.pxmktampl.net
DNS Response
35.190.73.131
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
149.220.183.52.in-addr.arpa
-
65 B 81 B 1 1
DNS Request
app.amplemarket.com
DNS Response
34.49.54.164
-
72 B 124 B 1 1
DNS Request
131.73.190.35.in-addr.arpa
-
72 B 171 B 1 1
DNS Request
74.213.58.216.in-addr.arpa
-
71 B 122 B 1 1
DNS Request
164.54.49.34.in-addr.arpa
-
56 B 151 B 1 1
DNS Request
g.bing.com
DNS Response
13.107.21.237204.79.197.237
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
237.21.107.13.in-addr.arpa
-
204 B 3
-
73 B 147 B 1 1
DNS Request
196.249.167.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5fd05085daf21ef4007e9a2f6924f567d
SHA1528f8bbcb84e6681640abee9b6c9854b2a6cded9
SHA2566789f5c5ead29f10a43f4c5938c6968415dca5b5f2838b1f730f340b017e3e4a
SHA51204115287eb8d0a20db2433a31653857557b7618b5f66e5f8c3eab51f22127ad941c32afe8b3c13278bc4fc4a287cf82bdd7821abcb6136de37622564bfcf6550
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD5503e5bc4bf9def3ba958a0e50397998c
SHA1e6dac0063759f93fcb468ddff3f8a5b14e8dbd05
SHA256f5dcfca6ff81676193d469250c280f1f424d7531a62a26eb8e58eb389a492f82
SHA512816505dc2718a7f11ad8974928e778752d9ea4db979df1c96872a6536a60b6c8c2d5a8429b9abca5091a07e729c0ecc3bec1e6a95d402a05c070f184b5aae582
-
Filesize
9KB
MD5bc69c1b4565393e69ba7d17387e61eaa
SHA140c25452cd9e4a164b35e84d2930b8a177afc5b6
SHA2562a0fe29ecdfcbcc9db20c330348e8b32ad678315e5712b24bdd1ab622c415dd4
SHA5123b58de7cbfa9668c486b6ca6b124b1481b483d2f12a87be2fe2a64ba03caf8648e2f1764de85ffdb2f00645af8ef4a7c811519c6a04420262cf1f1a326de9ecd
-
Filesize
99KB
MD53cd7699c2e06fa6f90df759db4a50eaa
SHA1c0a053ee8c28fe22929486174c226e1a2f7316cb
SHA256d013b47e2d12c81896cf5655bbc37c7145fd0d14515b667ebc1de3db664c2fc9
SHA5125998a9606f560097b2b0068b42a36d6aaf863a7e48e2a3f787877a6a78827457dfe62ba726f322fd6225ae3ed12b33b4e00bab9377b54d7b6dd010427c6d4141