Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 00:18 UTC

General

  • Target

    a3b988601ff177c9e4249033afe554d0N.exe

  • Size

    824KB

  • MD5

    a3b988601ff177c9e4249033afe554d0

  • SHA1

    5bfa70d73d1ce57fbdc4813b3da3888c27b355c1

  • SHA256

    3b57166a2a67752c4f1f3adeea25470915cefbbb19cc515bcf7b0a5f6b48ed19

  • SHA512

    142333f75a47b1f57143c100cece090a726aef06e643c7c5332e91898defbe5df3b74de611dbdae4c866d44325d60343884b37ccbd256729b12e4d1ffae96640

  • SSDEEP

    6144:z4sZBOZdjEYTPXMhaMP/kFTA7OA6BOZdjEYTPXMhaMP/a:znANL8oq/kFTsO6NL8oq/a

Malware Config

Signatures

  • Drops file in Drivers directory 5 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 18 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3b988601ff177c9e4249033afe554d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\a3b988601ff177c9e4249033afe554d0N.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\windows\system\dmnko.exe
      "C:\windows\system\dmnko.exe" "C:\Users\Admin\AppData\Local\Temp\a3b988601ff177c9e4249033afe554d0N.exe"
      2⤵
      • Drops file in Drivers directory
      • Checks computer location settings
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:8
      • C:\windows\SysWOW64\ozfjw.exe
        "C:\windows\system32\ozfjw.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1492
      • C:\windows\SysWOW64\ozfjw.exe
        "C:\windows\system32\ozfjw.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2160
      • C:\windows\SysWOW64\ozfjw.exe
        "C:\windows\system32\ozfjw.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1616
      • C:\windows\SysWOW64\ozfjw.exe
        "C:\windows\system32\ozfjw.exe"
        3⤵
        • Executes dropped EXE
        PID:3404
      • C:\windows\SysWOW64\ozfjw.exe
        "C:\windows\system32\ozfjw.exe"
        3⤵
        • Executes dropped EXE
        PID:3128
      • C:\windows\SysWOW64\ozfjw.exe
        "C:\windows\system32\ozfjw.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4536
      • C:\windows\SysWOW64\ozfjw.exe
        "C:\windows\system32\ozfjw.exe"
        3⤵
        • Executes dropped EXE
        PID:3612
      • C:\windows\SysWOW64\ozfjw.exe
        "C:\windows\system32\ozfjw.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1308
      • C:\windows\SysWOW64\ozfjw.exe
        "C:\windows\system32\ozfjw.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4956
      • C:\windows\SysWOW64\ozfjw.exe
        "C:\windows\system32\ozfjw.exe"
        3⤵
        • Executes dropped EXE
        PID:4288
      • C:\windows\SysWOW64\ozfjw.exe
        "C:\windows\system32\ozfjw.exe"
        3⤵
        • Executes dropped EXE
        PID:3932
      • C:\windows\SysWOW64\ozfjw.exe
        "C:\windows\system32\ozfjw.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4188
      • C:\windows\SysWOW64\ozfjw.exe
        "C:\windows\system32\ozfjw.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2928
      • C:\windows\SysWOW64\ozfjw.exe
        "C:\windows\system32\ozfjw.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4592
      • C:\windows\SysWOW64\ozfjw.exe
        "C:\windows\system32\ozfjw.exe"
        3⤵
        • Executes dropped EXE
        PID:3776
      • C:\windows\SysWOW64\ozfjw.exe
        "C:\windows\system32\ozfjw.exe"
        3⤵
        • Executes dropped EXE
        PID:676
      • C:\windows\SysWOW64\ozfjw.exe
        "C:\windows\system32\ozfjw.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1528
      • C:\windows\SysWOW64\ozfjw.exe
        "C:\windows\system32\ozfjw.exe"
        3⤵
        • Executes dropped EXE
        PID:1940
      • C:\windows\SysWOW64\ozfjw.exe
        "C:\windows\system32\ozfjw.exe"
        3⤵
        • Executes dropped EXE
        PID:2412
      • C:\windows\SysWOW64\ozfjw.exe
        "C:\windows\system32\ozfjw.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4504
      • C:\windows\SysWOW64\ozfjw.exe
        "C:\windows\system32\ozfjw.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1032
      • C:\windows\SysWOW64\ozfjw.exe
        "C:\windows\system32\ozfjw.exe"
        3⤵
          PID:2732
        • C:\windows\SysWOW64\ozfjw.exe
          "C:\windows\system32\ozfjw.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4036
        • C:\windows\SysWOW64\ozfjw.exe
          "C:\windows\system32\ozfjw.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:776
        • C:\windows\SysWOW64\ozfjw.exe
          "C:\windows\system32\ozfjw.exe"
          3⤵
            PID:2728
          • C:\windows\SysWOW64\ozfjw.exe
            "C:\windows\system32\ozfjw.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:2932
          • C:\windows\SysWOW64\ozfjw.exe
            "C:\windows\system32\ozfjw.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:2264
          • C:\windows\SysWOW64\ozfjw.exe
            "C:\windows\system32\ozfjw.exe"
            3⤵
              PID:3104
            • C:\windows\SysWOW64\ozfjw.exe
              "C:\windows\system32\ozfjw.exe"
              3⤵
              • System Location Discovery: System Language Discovery
              PID:4868
            • C:\windows\SysWOW64\ozfjw.exe
              "C:\windows\system32\ozfjw.exe"
              3⤵
                PID:5080
              • C:\windows\SysWOW64\ozfjw.exe
                "C:\windows\system32\ozfjw.exe"
                3⤵
                • System Location Discovery: System Language Discovery
                PID:5084
              • C:\windows\SysWOW64\ozfjw.exe
                "C:\windows\system32\ozfjw.exe"
                3⤵
                  PID:1336
                • C:\windows\SysWOW64\ozfjw.exe
                  "C:\windows\system32\ozfjw.exe"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:2276
                • C:\windows\SysWOW64\ozfjw.exe
                  "C:\windows\system32\ozfjw.exe" "C:\windows\system\dmnko.exe"
                  3⤵
                    PID:1128
                • C:\windows\SysWOW64\ozfjw.exe
                  "C:\windows\system32\ozfjw.exe" "C:\Users\Admin\AppData\Local\Temp\a3b988601ff177c9e4249033afe554d0N.exe"
                  2⤵
                  • Drops file in Drivers directory
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Drops file in System32 directory
                  • Drops file in Windows directory
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:1480
                  • C:\windows\SysWOW64\ozfjw.exe
                    "C:\windows\system32\ozfjw.exe"
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:2476
                  • C:\windows\SysWOW64\ozfjw.exe
                    "C:\windows\system32\ozfjw.exe"
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:2928
                  • C:\windows\SysWOW64\ozfjw.exe
                    "C:\windows\system32\ozfjw.exe"
                    3⤵
                    • Executes dropped EXE
                    PID:4560
                  • C:\windows\SysWOW64\ozfjw.exe
                    "C:\windows\system32\ozfjw.exe"
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:3044
                  • C:\windows\SysWOW64\ozfjw.exe
                    "C:\windows\system32\ozfjw.exe"
                    3⤵
                    • Executes dropped EXE
                    PID:4108
                  • C:\windows\SysWOW64\ozfjw.exe
                    "C:\windows\system32\ozfjw.exe"
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:1820
                  • C:\windows\SysWOW64\ozfjw.exe
                    "C:\windows\system32\ozfjw.exe"
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:4032
                  • C:\windows\SysWOW64\ozfjw.exe
                    "C:\windows\system32\ozfjw.exe"
                    3⤵
                    • Executes dropped EXE
                    PID:1688
                  • C:\windows\SysWOW64\ozfjw.exe
                    "C:\windows\system32\ozfjw.exe"
                    3⤵
                    • Executes dropped EXE
                    PID:2592
                  • C:\windows\SysWOW64\ozfjw.exe
                    "C:\windows\system32\ozfjw.exe"
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:1044
                  • C:\windows\SysWOW64\ozfjw.exe
                    "C:\windows\system32\ozfjw.exe"
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:3444
                  • C:\windows\SysWOW64\ozfjw.exe
                    "C:\windows\system32\ozfjw.exe"
                    3⤵
                    • Executes dropped EXE
                    PID:1592
                  • C:\windows\SysWOW64\ozfjw.exe
                    "C:\windows\system32\ozfjw.exe"
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:1204
                  • C:\windows\SysWOW64\ozfjw.exe
                    "C:\windows\system32\ozfjw.exe"
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:5104
                  • C:\windows\SysWOW64\ozfjw.exe
                    "C:\windows\system32\ozfjw.exe"
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:3536
                  • C:\windows\SysWOW64\ozfjw.exe
                    "C:\windows\system32\ozfjw.exe"
                    3⤵
                    • Executes dropped EXE
                    PID:4836
                  • C:\windows\SysWOW64\ozfjw.exe
                    "C:\windows\system32\ozfjw.exe"
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:4108
                  • C:\windows\SysWOW64\ozfjw.exe
                    "C:\windows\system32\ozfjw.exe"
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:1820
                  • C:\windows\SysWOW64\ozfjw.exe
                    "C:\windows\system32\ozfjw.exe"
                    3⤵
                    • Executes dropped EXE
                    PID:2036
                  • C:\windows\SysWOW64\ozfjw.exe
                    "C:\windows\system32\ozfjw.exe"
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:3860
                  • C:\windows\SysWOW64\ozfjw.exe
                    "C:\windows\system32\ozfjw.exe"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:3980
                  • C:\windows\SysWOW64\ozfjw.exe
                    "C:\windows\system32\ozfjw.exe"
                    3⤵
                      PID:1536
                    • C:\windows\SysWOW64\ozfjw.exe
                      "C:\windows\system32\ozfjw.exe"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:4216
                    • C:\windows\SysWOW64\ozfjw.exe
                      "C:\windows\system32\ozfjw.exe"
                      3⤵
                        PID:5016
                      • C:\windows\SysWOW64\ozfjw.exe
                        "C:\windows\system32\ozfjw.exe"
                        3⤵
                          PID:1568
                        • C:\windows\SysWOW64\ozfjw.exe
                          "C:\windows\system32\ozfjw.exe"
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:1496
                        • C:\windows\SysWOW64\ozfjw.exe
                          "C:\windows\system32\ozfjw.exe"
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:4976
                        • C:\windows\SysWOW64\ozfjw.exe
                          "C:\windows\system32\ozfjw.exe"
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:3100
                        • C:\windows\SysWOW64\ozfjw.exe
                          "C:\windows\system32\ozfjw.exe"
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:4020
                        • C:\windows\SysWOW64\ozfjw.exe
                          "C:\windows\system32\ozfjw.exe"
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:4600
                        • C:\windows\SysWOW64\ozfjw.exe
                          "C:\windows\system32\ozfjw.exe"
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:1760
                        • C:\windows\system\pqneghsj.exe
                          "C:\windows\system\pqneghsj.exe"
                          3⤵
                          • Drops file in Drivers directory
                          • Checks computer location settings
                          • Adds Run key to start application
                          • Drops file in System32 directory
                          • Drops file in Windows directory
                          • Modifies registry class
                          PID:4188
                          • C:\windows\SysWOW64\ozfjw.exe
                            "C:\windows\system32\ozfjw.exe"
                            4⤵
                              PID:4416
                            • C:\windows\SysWOW64\ozfjw.exe
                              "C:\windows\system32\ozfjw.exe"
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:5104
                            • C:\windows\SysWOW64\ozfjw.exe
                              "C:\windows\system32\ozfjw.exe"
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:5084
                            • C:\windows\SysWOW64\ozfjw.exe
                              "C:\windows\system32\ozfjw.exe"
                              4⤵
                                PID:2604
                            • C:\windows\SysWOW64\ozfjw.exe
                              "C:\windows\system32\ozfjw.exe"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:4944
                            • C:\windows\SysWOW64\ozfjw.exe
                              "C:\windows\system32\ozfjw.exe"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:5080
                            • C:\windows\SysWOW64\ozfjw.exe
                              "C:\windows\system32\ozfjw.exe"
                              3⤵
                                PID:4020
                              • C:\windows\SysWOW64\ozfjw.exe
                                "C:\windows\system32\ozfjw.exe"
                                3⤵
                                  PID:2684
                                • C:\windows\SysWOW64\ozfjw.exe
                                  "C:\windows\system32\ozfjw.exe"
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4136
                              • C:\windows\jcorgtn.exe
                                "C:\windows\jcorgtn.exe" "C:\Users\Admin\AppData\Local\Temp\a3b988601ff177c9e4249033afe554d0N.exe"
                                2⤵
                                • Drops file in Drivers directory
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Adds Run key to start application
                                • Drops file in System32 directory
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                • Modifies registry class
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of WriteProcessMemory
                                PID:732
                                • C:\windows\SysWOW64\ozfjw.exe
                                  "C:\windows\system32\ozfjw.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:1440
                                • C:\windows\SysWOW64\ozfjw.exe
                                  "C:\windows\system32\ozfjw.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  PID:3012
                                • C:\windows\SysWOW64\ozfjw.exe
                                  "C:\windows\system32\ozfjw.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:4400
                                • C:\windows\SysWOW64\ozfjw.exe
                                  "C:\windows\system32\ozfjw.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:3888
                                • C:\windows\SysWOW64\ozfjw.exe
                                  "C:\windows\system32\ozfjw.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:1444
                                • C:\windows\SysWOW64\ozfjw.exe
                                  "C:\windows\system32\ozfjw.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:4508
                                • C:\windows\SysWOW64\ozfjw.exe
                                  "C:\windows\system32\ozfjw.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  PID:2196
                                • C:\windows\SysWOW64\ozfjw.exe
                                  "C:\windows\system32\ozfjw.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:3944
                                • C:\windows\SysWOW64\ozfjw.exe
                                  "C:\windows\system32\ozfjw.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:1864
                                • C:\windows\SysWOW64\ozfjw.exe
                                  "C:\windows\system32\ozfjw.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  PID:1536
                                • C:\windows\SysWOW64\ozfjw.exe
                                  "C:\windows\system32\ozfjw.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  PID:1492
                                • C:\windows\SysWOW64\ozfjw.exe
                                  "C:\windows\system32\ozfjw.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  PID:4348
                                • C:\windows\SysWOW64\ozfjw.exe
                                  "C:\windows\system32\ozfjw.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  PID:1392
                                • C:\windows\SysWOW64\ozfjw.exe
                                  "C:\windows\system32\ozfjw.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  PID:1780
                                • C:\windows\SysWOW64\ozfjw.exe
                                  "C:\windows\system32\ozfjw.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:232
                                • C:\windows\SysWOW64\ozfjw.exe
                                  "C:\windows\system32\ozfjw.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:5024
                                • C:\windows\SysWOW64\ozfjw.exe
                                  "C:\windows\system32\ozfjw.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:4316
                                • C:\windows\SysWOW64\ozfjw.exe
                                  "C:\windows\system32\ozfjw.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  PID:4600
                                • C:\windows\SysWOW64\ozfjw.exe
                                  "C:\windows\system32\ozfjw.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:3732
                                • C:\windows\SysWOW64\ozfjw.exe
                                  "C:\windows\system32\ozfjw.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:4596
                                • C:\windows\SysWOW64\ozfjw.exe
                                  "C:\windows\system32\ozfjw.exe"
                                  3⤵
                                    PID:1680
                                  • C:\windows\SysWOW64\ozfjw.exe
                                    "C:\windows\system32\ozfjw.exe"
                                    3⤵
                                      PID:4848
                                    • C:\windows\SysWOW64\ozfjw.exe
                                      "C:\windows\system32\ozfjw.exe"
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2660
                                    • C:\windows\SysWOW64\ozfjw.exe
                                      "C:\windows\system32\ozfjw.exe"
                                      3⤵
                                        PID:3216
                                      • C:\windows\SysWOW64\ozfjw.exe
                                        "C:\windows\system32\ozfjw.exe"
                                        3⤵
                                          PID:3076
                                        • C:\windows\SysWOW64\ozfjw.exe
                                          "C:\windows\system32\ozfjw.exe"
                                          3⤵
                                            PID:840
                                          • C:\windows\SysWOW64\ozfjw.exe
                                            "C:\windows\system32\ozfjw.exe"
                                            3⤵
                                              PID:2160
                                            • C:\windows\SysWOW64\ozfjw.exe
                                              "C:\windows\system32\ozfjw.exe"
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:5060
                                            • C:\windows\SysWOW64\ozfjw.exe
                                              "C:\windows\system32\ozfjw.exe"
                                              3⤵
                                                PID:1616
                                              • C:\windows\SysWOW64\ozfjw.exe
                                                "C:\windows\system32\ozfjw.exe"
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:5104
                                              • C:\windows\SysWOW64\ozfjw.exe
                                                "C:\windows\system32\ozfjw.exe"
                                                3⤵
                                                  PID:832
                                                • C:\windows\SysWOW64\ozfjw.exe
                                                  "C:\windows\system32\ozfjw.exe"
                                                  3⤵
                                                    PID:4884
                                                  • C:\windows\SysWOW64\ozfjw.exe
                                                    "C:\windows\system32\ozfjw.exe"
                                                    3⤵
                                                      PID:4488
                                                    • C:\windows\SysWOW64\ozfjw.exe
                                                      "C:\windows\system32\ozfjw.exe"
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4360
                                                    • C:\windows\SysWOW64\ozfjw.exe
                                                      "C:\windows\system32\ozfjw.exe"
                                                      3⤵
                                                        PID:1864
                                                      • C:\windows\SysWOW64\ozfjw.exe
                                                        "C:\windows\system32\ozfjw.exe"
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:4676
                                                      • C:\windows\SysWOW64\ozfjw.exe
                                                        "C:\windows\system32\ozfjw.exe"
                                                        3⤵
                                                          PID:3928

                                                    Network

                                                    • flag-us
                                                      DNS
                                                      g.bing.com
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      g.bing.com
                                                      IN A
                                                      Response
                                                      g.bing.com
                                                      IN CNAME
                                                      g-bing-com.dual-a-0034.a-msedge.net
                                                      g-bing-com.dual-a-0034.a-msedge.net
                                                      IN CNAME
                                                      dual-a-0034.a-msedge.net
                                                      dual-a-0034.a-msedge.net
                                                      IN A
                                                      13.107.21.237
                                                      dual-a-0034.a-msedge.net
                                                      IN A
                                                      204.79.197.237
                                                    • flag-us
                                                      GET
                                                      https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=de70e41203ba40d5b53b1d35ab959447&localId=w:58F15D5C-450D-8348-2910-A8A47129F4C2&deviceId=6825833575955334&anid=
                                                      Remote address:
                                                      13.107.21.237:443
                                                      Request
                                                      GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=de70e41203ba40d5b53b1d35ab959447&localId=w:58F15D5C-450D-8348-2910-A8A47129F4C2&deviceId=6825833575955334&anid= HTTP/2.0
                                                      host: g.bing.com
                                                      accept-encoding: gzip, deflate
                                                      user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                                                      Response
                                                      HTTP/2.0 204
                                                      cache-control: no-cache, must-revalidate
                                                      pragma: no-cache
                                                      expires: Fri, 01 Jan 1990 00:00:00 GMT
                                                      set-cookie: MUID=21EB1F8BE96267B603630B6AE8456650; domain=.bing.com; expires=Sun, 14-Sep-2025 00:18:16 GMT; path=/; SameSite=None; Secure; Priority=High;
                                                      strict-transport-security: max-age=31536000; includeSubDomains; preload
                                                      access-control-allow-origin: *
                                                      x-cache: CONFIG_NOCACHE
                                                      accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                      x-msedge-ref: Ref A: 82F952F9530D48C5A7E337AF768A73FC Ref B: LON04EDGE0721 Ref C: 2024-08-20T00:18:16Z
                                                      date: Tue, 20 Aug 2024 00:18:16 GMT
                                                    • flag-us
                                                      GET
                                                      https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=de70e41203ba40d5b53b1d35ab959447&localId=w:58F15D5C-450D-8348-2910-A8A47129F4C2&deviceId=6825833575955334&anid=
                                                      Remote address:
                                                      13.107.21.237:443
                                                      Request
                                                      GET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=de70e41203ba40d5b53b1d35ab959447&localId=w:58F15D5C-450D-8348-2910-A8A47129F4C2&deviceId=6825833575955334&anid= HTTP/2.0
                                                      host: g.bing.com
                                                      accept-encoding: gzip, deflate
                                                      user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                                                      cookie: MUID=21EB1F8BE96267B603630B6AE8456650
                                                      Response
                                                      HTTP/2.0 204
                                                      cache-control: no-cache, must-revalidate
                                                      pragma: no-cache
                                                      expires: Fri, 01 Jan 1990 00:00:00 GMT
                                                      set-cookie: MSPTC=gQn40pT2lBGo8rA2uIHj2mAbyQrHY1evp16wgqR3l1U; domain=.bing.com; expires=Sun, 14-Sep-2025 00:18:16 GMT; path=/; Partitioned; secure; SameSite=None
                                                      strict-transport-security: max-age=31536000; includeSubDomains; preload
                                                      access-control-allow-origin: *
                                                      x-cache: CONFIG_NOCACHE
                                                      accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                      x-msedge-ref: Ref A: 1DBC298340AC44608653823891A04532 Ref B: LON04EDGE0721 Ref C: 2024-08-20T00:18:16Z
                                                      date: Tue, 20 Aug 2024 00:18:16 GMT
                                                    • flag-us
                                                      GET
                                                      https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=de70e41203ba40d5b53b1d35ab959447&localId=w:58F15D5C-450D-8348-2910-A8A47129F4C2&deviceId=6825833575955334&anid=
                                                      Remote address:
                                                      13.107.21.237:443
                                                      Request
                                                      GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=de70e41203ba40d5b53b1d35ab959447&localId=w:58F15D5C-450D-8348-2910-A8A47129F4C2&deviceId=6825833575955334&anid= HTTP/2.0
                                                      host: g.bing.com
                                                      accept-encoding: gzip, deflate
                                                      user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                                                      cookie: MUID=21EB1F8BE96267B603630B6AE8456650; MSPTC=gQn40pT2lBGo8rA2uIHj2mAbyQrHY1evp16wgqR3l1U
                                                      Response
                                                      HTTP/2.0 204
                                                      cache-control: no-cache, must-revalidate
                                                      pragma: no-cache
                                                      expires: Fri, 01 Jan 1990 00:00:00 GMT
                                                      strict-transport-security: max-age=31536000; includeSubDomains; preload
                                                      access-control-allow-origin: *
                                                      x-cache: CONFIG_NOCACHE
                                                      accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                      x-msedge-ref: Ref A: 9186072923D84BB9AFA3E4BDED009943 Ref B: LON04EDGE0721 Ref C: 2024-08-20T00:18:16Z
                                                      date: Tue, 20 Aug 2024 00:18:16 GMT
                                                    • flag-us
                                                      DNS
                                                      196.249.167.52.in-addr.arpa
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      196.249.167.52.in-addr.arpa
                                                      IN PTR
                                                      Response
                                                    • flag-us
                                                      DNS
                                                      237.21.107.13.in-addr.arpa
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      237.21.107.13.in-addr.arpa
                                                      IN PTR
                                                      Response
                                                    • flag-us
                                                      DNS
                                                      20.160.190.20.in-addr.arpa
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      20.160.190.20.in-addr.arpa
                                                      IN PTR
                                                      Response
                                                    • flag-us
                                                      DNS
                                                      55.36.223.20.in-addr.arpa
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      55.36.223.20.in-addr.arpa
                                                      IN PTR
                                                      Response
                                                    • flag-us
                                                      DNS
                                                      95.221.229.192.in-addr.arpa
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      95.221.229.192.in-addr.arpa
                                                      IN PTR
                                                      Response
                                                    • flag-us
                                                      DNS
                                                      209.205.72.20.in-addr.arpa
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      209.205.72.20.in-addr.arpa
                                                      IN PTR
                                                      Response
                                                    • flag-us
                                                      DNS
                                                      217.106.137.52.in-addr.arpa
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      217.106.137.52.in-addr.arpa
                                                      IN PTR
                                                      Response
                                                    • flag-us
                                                      DNS
                                                      133.211.185.52.in-addr.arpa
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      133.211.185.52.in-addr.arpa
                                                      IN PTR
                                                      Response
                                                    • flag-us
                                                      DNS
                                                      50.23.12.20.in-addr.arpa
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      50.23.12.20.in-addr.arpa
                                                      IN PTR
                                                      Response
                                                    • flag-us
                                                      DNS
                                                      18.31.95.13.in-addr.arpa
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      18.31.95.13.in-addr.arpa
                                                      IN PTR
                                                      Response
                                                    • flag-us
                                                      DNS
                                                      172.210.232.199.in-addr.arpa
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      172.210.232.199.in-addr.arpa
                                                      IN PTR
                                                      Response
                                                    • flag-us
                                                      DNS
                                                      73.144.22.2.in-addr.arpa
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      73.144.22.2.in-addr.arpa
                                                      IN PTR
                                                      Response
                                                      73.144.22.2.in-addr.arpa
                                                      IN PTR
                                                      a2-22-144-73deploystaticakamaitechnologiescom
                                                    • flag-us
                                                      DNS
                                                      11.227.111.52.in-addr.arpa
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      11.227.111.52.in-addr.arpa
                                                      IN PTR
                                                      Response
                                                    • flag-us
                                                      DNS
                                                      tse1.mm.bing.net
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      tse1.mm.bing.net
                                                      IN A
                                                      Response
                                                      tse1.mm.bing.net
                                                      IN CNAME
                                                      mm-mm.bing.net.trafficmanager.net
                                                      mm-mm.bing.net.trafficmanager.net
                                                      IN CNAME
                                                      ax-0001.ax-msedge.net
                                                      ax-0001.ax-msedge.net
                                                      IN A
                                                      150.171.27.10
                                                      ax-0001.ax-msedge.net
                                                      IN A
                                                      150.171.28.10
                                                    • flag-us
                                                      GET
                                                      https://tse1.mm.bing.net/th?id=OADD2.10239340417880_1PRMSECURT9IUDN7Q&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
                                                      Remote address:
                                                      150.171.27.10:443
                                                      Request
                                                      GET /th?id=OADD2.10239340417880_1PRMSECURT9IUDN7Q&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
                                                      host: tse1.mm.bing.net
                                                      accept: */*
                                                      accept-encoding: gzip, deflate, br
                                                      user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                                                      Response
                                                      HTTP/2.0 200
                                                      cache-control: public, max-age=2592000
                                                      content-length: 664785
                                                      content-type: image/jpeg
                                                      x-cache: TCP_HIT
                                                      access-control-allow-origin: *
                                                      access-control-allow-headers: *
                                                      access-control-allow-methods: GET, POST, OPTIONS
                                                      timing-allow-origin: *
                                                      report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                                                      nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                                                      accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                      x-msedge-ref: Ref A: 8651616DB8604B8BAECDA2A2AE306989 Ref B: LON04EDGE0614 Ref C: 2024-08-20T00:19:55Z
                                                      date: Tue, 20 Aug 2024 00:19:55 GMT
                                                    • flag-us
                                                      GET
                                                      https://tse1.mm.bing.net/th?id=OADD2.10239360607350_1DIIHMLKOJP4KM45O&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
                                                      Remote address:
                                                      150.171.27.10:443
                                                      Request
                                                      GET /th?id=OADD2.10239360607350_1DIIHMLKOJP4KM45O&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
                                                      host: tse1.mm.bing.net
                                                      accept: */*
                                                      accept-encoding: gzip, deflate, br
                                                      user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                                                      Response
                                                      HTTP/2.0 200
                                                      cache-control: public, max-age=2592000
                                                      content-length: 502729
                                                      content-type: image/jpeg
                                                      x-cache: TCP_HIT
                                                      access-control-allow-origin: *
                                                      access-control-allow-headers: *
                                                      access-control-allow-methods: GET, POST, OPTIONS
                                                      timing-allow-origin: *
                                                      report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                                                      nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                                                      accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                      x-msedge-ref: Ref A: B5486E65F7FF4305A455D4AAFDB42678 Ref B: LON04EDGE0614 Ref C: 2024-08-20T00:19:55Z
                                                      date: Tue, 20 Aug 2024 00:19:55 GMT
                                                    • flag-us
                                                      GET
                                                      https://tse1.mm.bing.net/th?id=OADD2.10239360607351_1LWNG3EPOKCB0ST8C&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
                                                      Remote address:
                                                      150.171.27.10:443
                                                      Request
                                                      GET /th?id=OADD2.10239360607351_1LWNG3EPOKCB0ST8C&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
                                                      host: tse1.mm.bing.net
                                                      accept: */*
                                                      accept-encoding: gzip, deflate, br
                                                      user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                                                      Response
                                                      HTTP/2.0 200
                                                      cache-control: public, max-age=2592000
                                                      content-length: 542449
                                                      content-type: image/jpeg
                                                      x-cache: TCP_HIT
                                                      access-control-allow-origin: *
                                                      access-control-allow-headers: *
                                                      access-control-allow-methods: GET, POST, OPTIONS
                                                      timing-allow-origin: *
                                                      report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                                                      nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                                                      accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                      x-msedge-ref: Ref A: 071541A561FB4A5EBB275EFD184CD224 Ref B: LON04EDGE0614 Ref C: 2024-08-20T00:19:55Z
                                                      date: Tue, 20 Aug 2024 00:19:55 GMT
                                                    • flag-us
                                                      GET
                                                      https://tse1.mm.bing.net/th?id=OADD2.10239339388043_1HMYXED637CKIBU88&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
                                                      Remote address:
                                                      150.171.27.10:443
                                                      Request
                                                      GET /th?id=OADD2.10239339388043_1HMYXED637CKIBU88&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
                                                      host: tse1.mm.bing.net
                                                      accept: */*
                                                      accept-encoding: gzip, deflate, br
                                                      user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                                                      Response
                                                      HTTP/2.0 200
                                                      cache-control: public, max-age=2592000
                                                      content-length: 682955
                                                      content-type: image/jpeg
                                                      x-cache: TCP_HIT
                                                      access-control-allow-origin: *
                                                      access-control-allow-headers: *
                                                      access-control-allow-methods: GET, POST, OPTIONS
                                                      timing-allow-origin: *
                                                      report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                                                      nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                                                      accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                      x-msedge-ref: Ref A: 6D45A9891AAD4A0DB07372D3E8B050DD Ref B: LON04EDGE0614 Ref C: 2024-08-20T00:19:55Z
                                                      date: Tue, 20 Aug 2024 00:19:55 GMT
                                                    • flag-us
                                                      GET
                                                      https://tse1.mm.bing.net/th?id=OADD2.10239339388042_1APSAGRCSB9NM0S8N&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
                                                      Remote address:
                                                      150.171.27.10:443
                                                      Request
                                                      GET /th?id=OADD2.10239339388042_1APSAGRCSB9NM0S8N&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
                                                      host: tse1.mm.bing.net
                                                      accept: */*
                                                      accept-encoding: gzip, deflate, br
                                                      user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                                                      Response
                                                      HTTP/2.0 200
                                                      cache-control: public, max-age=2592000
                                                      content-length: 665915
                                                      content-type: image/jpeg
                                                      x-cache: TCP_HIT
                                                      access-control-allow-origin: *
                                                      access-control-allow-headers: *
                                                      access-control-allow-methods: GET, POST, OPTIONS
                                                      timing-allow-origin: *
                                                      report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                                                      nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                                                      accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                      x-msedge-ref: Ref A: 397597CAE57A4259B01425F9302A1CE7 Ref B: LON04EDGE0614 Ref C: 2024-08-20T00:19:55Z
                                                      date: Tue, 20 Aug 2024 00:19:55 GMT
                                                    • flag-us
                                                      GET
                                                      https://tse1.mm.bing.net/th?id=OADD2.10239340418534_1SATV94N425TECTRU&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
                                                      Remote address:
                                                      150.171.27.10:443
                                                      Request
                                                      GET /th?id=OADD2.10239340418534_1SATV94N425TECTRU&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
                                                      host: tse1.mm.bing.net
                                                      accept: */*
                                                      accept-encoding: gzip, deflate, br
                                                      user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                                                      Response
                                                      HTTP/2.0 200
                                                      cache-control: public, max-age=2592000
                                                      content-length: 473680
                                                      content-type: image/jpeg
                                                      x-cache: TCP_HIT
                                                      access-control-allow-origin: *
                                                      access-control-allow-headers: *
                                                      access-control-allow-methods: GET, POST, OPTIONS
                                                      timing-allow-origin: *
                                                      report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                                                      nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                                                      accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                      x-msedge-ref: Ref A: 85F55526695C4D2A89081B56EDCEFC29 Ref B: LON04EDGE0614 Ref C: 2024-08-20T00:19:55Z
                                                      date: Tue, 20 Aug 2024 00:19:55 GMT
                                                    • flag-us
                                                      DNS
                                                      10.27.171.150.in-addr.arpa
                                                      Remote address:
                                                      8.8.8.8:53
                                                      Request
                                                      10.27.171.150.in-addr.arpa
                                                      IN PTR
                                                      Response
                                                    • 13.107.21.237:443
                                                      https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=de70e41203ba40d5b53b1d35ab959447&localId=w:58F15D5C-450D-8348-2910-A8A47129F4C2&deviceId=6825833575955334&anid=
                                                      tls, http2
                                                      2.0kB
                                                      9.3kB
                                                      21
                                                      18

                                                      HTTP Request

                                                      GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=de70e41203ba40d5b53b1d35ab959447&localId=w:58F15D5C-450D-8348-2910-A8A47129F4C2&deviceId=6825833575955334&anid=

                                                      HTTP Response

                                                      204

                                                      HTTP Request

                                                      GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=de70e41203ba40d5b53b1d35ab959447&localId=w:58F15D5C-450D-8348-2910-A8A47129F4C2&deviceId=6825833575955334&anid=

                                                      HTTP Response

                                                      204

                                                      HTTP Request

                                                      GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=de70e41203ba40d5b53b1d35ab959447&localId=w:58F15D5C-450D-8348-2910-A8A47129F4C2&deviceId=6825833575955334&anid=

                                                      HTTP Response

                                                      204
                                                    • 150.171.27.10:443
                                                      tse1.mm.bing.net
                                                      tls, http2
                                                      1.2kB
                                                      6.9kB
                                                      15
                                                      13
                                                    • 150.171.27.10:443
                                                      tse1.mm.bing.net
                                                      tls, http2
                                                      1.2kB
                                                      6.9kB
                                                      15
                                                      13
                                                    • 150.171.27.10:443
                                                      https://tse1.mm.bing.net/th?id=OADD2.10239340418534_1SATV94N425TECTRU&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
                                                      tls, http2
                                                      127.1kB
                                                      3.7MB
                                                      2663
                                                      2657

                                                      HTTP Request

                                                      GET https://tse1.mm.bing.net/th?id=OADD2.10239340417880_1PRMSECURT9IUDN7Q&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

                                                      HTTP Request

                                                      GET https://tse1.mm.bing.net/th?id=OADD2.10239360607350_1DIIHMLKOJP4KM45O&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

                                                      HTTP Request

                                                      GET https://tse1.mm.bing.net/th?id=OADD2.10239360607351_1LWNG3EPOKCB0ST8C&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

                                                      HTTP Request

                                                      GET https://tse1.mm.bing.net/th?id=OADD2.10239339388043_1HMYXED637CKIBU88&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

                                                      HTTP Request

                                                      GET https://tse1.mm.bing.net/th?id=OADD2.10239339388042_1APSAGRCSB9NM0S8N&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

                                                      HTTP Response

                                                      200

                                                      HTTP Response

                                                      200

                                                      HTTP Response

                                                      200

                                                      HTTP Response

                                                      200

                                                      HTTP Response

                                                      200

                                                      HTTP Request

                                                      GET https://tse1.mm.bing.net/th?id=OADD2.10239340418534_1SATV94N425TECTRU&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

                                                      HTTP Response

                                                      200
                                                    • 150.171.27.10:443
                                                      tse1.mm.bing.net
                                                      tls, http2
                                                      1.2kB
                                                      6.9kB
                                                      15
                                                      13
                                                    • 150.171.27.10:443
                                                      tse1.mm.bing.net
                                                      tls, http2
                                                      1.2kB
                                                      6.9kB
                                                      15
                                                      13
                                                    • 8.8.8.8:53
                                                      g.bing.com
                                                      dns
                                                      56 B
                                                      151 B
                                                      1
                                                      1

                                                      DNS Request

                                                      g.bing.com

                                                      DNS Response

                                                      13.107.21.237
                                                      204.79.197.237

                                                    • 8.8.8.8:53
                                                      196.249.167.52.in-addr.arpa
                                                      dns
                                                      73 B
                                                      147 B
                                                      1
                                                      1

                                                      DNS Request

                                                      196.249.167.52.in-addr.arpa

                                                    • 8.8.8.8:53
                                                      237.21.107.13.in-addr.arpa
                                                      dns
                                                      72 B
                                                      158 B
                                                      1
                                                      1

                                                      DNS Request

                                                      237.21.107.13.in-addr.arpa

                                                    • 8.8.8.8:53
                                                      20.160.190.20.in-addr.arpa
                                                      dns
                                                      72 B
                                                      158 B
                                                      1
                                                      1

                                                      DNS Request

                                                      20.160.190.20.in-addr.arpa

                                                    • 8.8.8.8:53
                                                      55.36.223.20.in-addr.arpa
                                                      dns
                                                      71 B
                                                      157 B
                                                      1
                                                      1

                                                      DNS Request

                                                      55.36.223.20.in-addr.arpa

                                                    • 8.8.8.8:53
                                                      95.221.229.192.in-addr.arpa
                                                      dns
                                                      73 B
                                                      144 B
                                                      1
                                                      1

                                                      DNS Request

                                                      95.221.229.192.in-addr.arpa

                                                    • 8.8.8.8:53
                                                      209.205.72.20.in-addr.arpa
                                                      dns
                                                      72 B
                                                      158 B
                                                      1
                                                      1

                                                      DNS Request

                                                      209.205.72.20.in-addr.arpa

                                                    • 8.8.8.8:53
                                                      217.106.137.52.in-addr.arpa
                                                      dns
                                                      73 B
                                                      147 B
                                                      1
                                                      1

                                                      DNS Request

                                                      217.106.137.52.in-addr.arpa

                                                    • 8.8.8.8:53
                                                      133.211.185.52.in-addr.arpa
                                                      dns
                                                      73 B
                                                      147 B
                                                      1
                                                      1

                                                      DNS Request

                                                      133.211.185.52.in-addr.arpa

                                                    • 8.8.8.8:53
                                                      50.23.12.20.in-addr.arpa
                                                      dns
                                                      70 B
                                                      156 B
                                                      1
                                                      1

                                                      DNS Request

                                                      50.23.12.20.in-addr.arpa

                                                    • 8.8.8.8:53
                                                      18.31.95.13.in-addr.arpa
                                                      dns
                                                      70 B
                                                      144 B
                                                      1
                                                      1

                                                      DNS Request

                                                      18.31.95.13.in-addr.arpa

                                                    • 8.8.8.8:53
                                                      172.210.232.199.in-addr.arpa
                                                      dns
                                                      74 B
                                                      128 B
                                                      1
                                                      1

                                                      DNS Request

                                                      172.210.232.199.in-addr.arpa

                                                    • 8.8.8.8:53
                                                      73.144.22.2.in-addr.arpa
                                                      dns
                                                      70 B
                                                      133 B
                                                      1
                                                      1

                                                      DNS Request

                                                      73.144.22.2.in-addr.arpa

                                                    • 8.8.8.8:53
                                                      11.227.111.52.in-addr.arpa
                                                      dns
                                                      72 B
                                                      158 B
                                                      1
                                                      1

                                                      DNS Request

                                                      11.227.111.52.in-addr.arpa

                                                    • 8.8.8.8:53
                                                      tse1.mm.bing.net
                                                      dns
                                                      62 B
                                                      170 B
                                                      1
                                                      1

                                                      DNS Request

                                                      tse1.mm.bing.net

                                                      DNS Response

                                                      150.171.27.10
                                                      150.171.28.10

                                                    • 8.8.8.8:53
                                                      10.27.171.150.in-addr.arpa
                                                      dns
                                                      72 B
                                                      158 B
                                                      1
                                                      1

                                                      DNS Request

                                                      10.27.171.150.in-addr.arpa

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\Local\Temp\a3b988601ff177c9e4249033afe554d0N.exedmnko.exe_

                                                      Filesize

                                                      824KB

                                                      MD5

                                                      a3b988601ff177c9e4249033afe554d0

                                                      SHA1

                                                      5bfa70d73d1ce57fbdc4813b3da3888c27b355c1

                                                      SHA256

                                                      3b57166a2a67752c4f1f3adeea25470915cefbbb19cc515bcf7b0a5f6b48ed19

                                                      SHA512

                                                      142333f75a47b1f57143c100cece090a726aef06e643c7c5332e91898defbe5df3b74de611dbdae4c866d44325d60343884b37ccbd256729b12e4d1ffae96640

                                                    • C:\Windows\SysWOW64\ozfjw.exe

                                                      Filesize

                                                      678KB

                                                      MD5

                                                      072ed5c7b1f18c383b8ccdb0dd3edb4b

                                                      SHA1

                                                      2ed84152b9ea71e267dd4d1af22df852080a3be4

                                                      SHA256

                                                      b386b5165f88a6301eeb7637786625f8bf3f29030ebf7c827e8096a3e68ec0a0

                                                      SHA512

                                                      df673216c1eaa194adeb28c3008be0248b0e120db2d879bdd707cc680705f419f228dbf052edf7f66f6d26496cc81e0f293885e0081e4ebe696d78b7f15f1c55

                                                    • C:\Windows\SysWOW64\ozfjw.exepqneghsj.exe_

                                                      Filesize

                                                      532KB

                                                      MD5

                                                      91a28047a2f0ee1660e5b3c54288a58d

                                                      SHA1

                                                      0c291a456c547b00403849abf6d7000da9a9f6ef

                                                      SHA256

                                                      e8a4e44b78a1916b51302b44c2d5d6104596b7f6b7d04613b65ff7450f3c9948

                                                      SHA512

                                                      94fec00c45c5a095f03e9c0241f7f9414b1600db9e6d8fa1f6ab09dcee5e7a2b21ea53ed1e6a0f6a05411ea1bd65a802f1e0ab75cf98051501e46c6a503b9297

                                                    • C:\Windows\jcorgtn.exe

                                                      Filesize

                                                      727KB

                                                      MD5

                                                      d86fbbb69b1f3b8a5be4ceb3ee17759c

                                                      SHA1

                                                      fc409cfcb3e8257494d70be0c175aac38ccc556f

                                                      SHA256

                                                      8090a85de17923fb19d011be7c39edad71c694146481d808a074c2a77bc63e4a

                                                      SHA512

                                                      d5a0872ff7b76cc10d679c4cb374c8e1be3d3f51c4c2a14e0cbd3fc1c7bcd1ef89b320617e60c3e54b5752badf7b0e91b8f1f19d8f9267c7817f5f6e1a139e8c

                                                    We care about your privacy.

                                                    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.