Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/08/2024, 15:15 UTC

General

  • Target

    8ddf88965ab1fd9eadc5968e54519b6c9b41f726f285407a1af655c72fc119be.exe

  • Size

    2.0MB

  • MD5

    5b4fdb19963fce2e64fc0890df5346d4

  • SHA1

    2cc3d3e389537b5b3591d857050548e282e61000

  • SHA256

    8ddf88965ab1fd9eadc5968e54519b6c9b41f726f285407a1af655c72fc119be

  • SHA512

    f29bbee8917669cb806a68d51ff4101aa8852b05d430f15d5342dab39e496cf9f16f92df7860655189ec72529f68e57bd1cf9d5b6dde72914c9ff6f97f1bc308

  • SSDEEP

    49152:mTTFQGBE4R87o04gyxMkJZVRamAcHLx2ZfA+JqIfREQBw:mn6GO4UojgWJbX+A+b

Malware Config

Signatures

  • Meduza

    Meduza is a crypto wallet and info stealer written in C++.

  • Meduza Stealer payload 2 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ddf88965ab1fd9eadc5968e54519b6c9b41f726f285407a1af655c72fc119be.exe
    "C:\Users\Admin\AppData\Local\Temp\8ddf88965ab1fd9eadc5968e54519b6c9b41f726f285407a1af655c72fc119be.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2832
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k move Terror Terror.bat & Terror.bat & exit
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4156
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "wrsa.exe opssvc.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:672
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2580
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:376
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 554184
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4584
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "CHARMSRULINGADIDASSECONDARY" Makes
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3432
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Dome + ..\Master + ..\Gene + ..\Monday + ..\Microwave + ..\Kitchen + ..\Family + ..\Deny + ..\Distribute + ..\Carriers + ..\Mails + ..\Personal + ..\Brands + ..\Artist + ..\Advert + ..\Edges + ..\Po + ..\Handling + ..\Loans + ..\Retailers Z
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4824
      • C:\Users\Admin\AppData\Local\Temp\554184\Proof.pif
        Proof.pif Z
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4984
        • C:\Users\Admin\AppData\Local\Temp\554184\Proof.pif
          C:\Users\Admin\AppData\Local\Temp\554184\Proof.pif
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: EnumeratesProcesses
          • outlook_office_path
          • outlook_win_path
          PID:2220
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1108

Network

  • flag-us
    DNS
    28.118.140.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    28.118.140.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    240.143.123.92.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    240.143.123.92.in-addr.arpa
    IN PTR
    Response
    240.143.123.92.in-addr.arpa
    IN PTR
    a92-123-143-240deploystaticakamaitechnologiescom
  • flag-us
    DNS
    64.159.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    64.159.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    45.19.74.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    45.19.74.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    yYqkGpUWed.yYqkGpUWed
    Proof.pif
    Remote address:
    8.8.8.8:53
    Request
    yYqkGpUWed.yYqkGpUWed
    IN A
    Response
  • flag-us
    DNS
    148.40.45.147.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    148.40.45.147.in-addr.arpa
    IN PTR
    Response
    148.40.45.147.in-addr.arpa
    IN PTR
    disgusted-slipaezanetwork
  • flag-us
    DNS
    api.ipify.org
    Proof.pif
    Remote address:
    8.8.8.8:53
    Request
    api.ipify.org
    IN A
    Response
    api.ipify.org
    IN A
    104.26.13.205
    api.ipify.org
    IN A
    104.26.12.205
    api.ipify.org
    IN A
    172.67.74.152
  • flag-us
    GET
    https://api.ipify.org/
    Proof.pif
    Remote address:
    104.26.13.205:443
    Request
    GET / HTTP/1.1
    Accept: text/html; text/plain; */*
    Host: api.ipify.org
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Date: Mon, 26 Aug 2024 15:15:44 GMT
    Content-Type: text/plain
    Content-Length: 13
    Connection: keep-alive
    Vary: Origin
    CF-Cache-Status: DYNAMIC
    Server: cloudflare
    CF-RAY: 8b94c76c6e77946c-LHR
  • flag-us
    DNS
    c.pki.goog
    Proof.pif
    Remote address:
    8.8.8.8:53
    Request
    c.pki.goog
    IN A
    Response
    c.pki.goog
    IN CNAME
    pki-goog.l.google.com
    pki-goog.l.google.com
    IN A
    216.58.214.163
  • flag-fr
    GET
    http://c.pki.goog/r/gsr1.crl
    Proof.pif
    Remote address:
    216.58.214.163:80
    Request
    GET /r/gsr1.crl HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    User-Agent: Microsoft-CryptoAPI/10.0
    Host: c.pki.goog
    Response
    HTTP/1.1 200 OK
    Accept-Ranges: bytes
    Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
    Cross-Origin-Resource-Policy: cross-origin
    Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
    Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
    Content-Length: 1739
    X-Content-Type-Options: nosniff
    Server: sffe
    X-XSS-Protection: 0
    Date: Mon, 26 Aug 2024 14:50:02 GMT
    Expires: Mon, 26 Aug 2024 15:40:02 GMT
    Cache-Control: public, max-age=3000
    Age: 1542
    Last-Modified: Mon, 08 Jul 2024 07:38:00 GMT
    Content-Type: application/pkix-crl
    Vary: Accept-Encoding
  • flag-fr
    GET
    http://c.pki.goog/r/r4.crl
    Proof.pif
    Remote address:
    216.58.214.163:80
    Request
    GET /r/r4.crl HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    User-Agent: Microsoft-CryptoAPI/10.0
    Host: c.pki.goog
    Response
    HTTP/1.1 200 OK
    Accept-Ranges: bytes
    Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
    Cross-Origin-Resource-Policy: cross-origin
    Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
    Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
    Content-Length: 436
    X-Content-Type-Options: nosniff
    Server: sffe
    X-XSS-Protection: 0
    Date: Mon, 26 Aug 2024 14:50:04 GMT
    Expires: Mon, 26 Aug 2024 15:40:04 GMT
    Cache-Control: public, max-age=3000
    Age: 1540
    Last-Modified: Thu, 25 Jul 2024 14:48:00 GMT
    Content-Type: application/pkix-crl
    Vary: Accept-Encoding
  • flag-us
    DNS
    205.13.26.104.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    205.13.26.104.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    163.214.58.216.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    163.214.58.216.in-addr.arpa
    IN PTR
    Response
    163.214.58.216.in-addr.arpa
    IN PTR
    par10s42-in-f31e100net
    163.214.58.216.in-addr.arpa
    IN PTR
    mad01s26-in-f163�H
    163.214.58.216.in-addr.arpa
    IN PTR
    mad01s26-in-f3�H
  • flag-us
    DNS
    103.169.127.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    103.169.127.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    18.31.95.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    18.31.95.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    19.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    19.229.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    tse1.mm.bing.net
    Remote address:
    8.8.8.8:53
    Request
    tse1.mm.bing.net
    IN A
    Response
    tse1.mm.bing.net
    IN CNAME
    mm-mm.bing.net.trafficmanager.net
    mm-mm.bing.net.trafficmanager.net
    IN CNAME
    ax-0001.ax-msedge.net
    ax-0001.ax-msedge.net
    IN A
    150.171.28.10
    ax-0001.ax-msedge.net
    IN A
    150.171.27.10
  • flag-us
    DNS
    205.47.74.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    205.47.74.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317300976_175WPYH13KO5QTHY0&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
    Remote address:
    150.171.28.10:443
    Request
    GET /th?id=OADD2.10239317300976_175WPYH13KO5QTHY0&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 495006
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 0AB0D0FECA3943238164E43B47D5A4E1 Ref B: LON04EDGE0810 Ref C: 2024-08-26T15:16:51Z
    date: Mon, 26 Aug 2024 15:16:51 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239340418577_1YCPJO6YBYEE06VWA&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
    Remote address:
    150.171.28.10:443
    Request
    GET /th?id=OADD2.10239340418577_1YCPJO6YBYEE06VWA&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 545972
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: ED38ED9B529F44B7B05FB776D7DA5E0C Ref B: LON04EDGE0810 Ref C: 2024-08-26T15:16:51Z
    date: Mon, 26 Aug 2024 15:16:51 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301409_1O8VP6TH939POQOPO&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
    Remote address:
    150.171.28.10:443
    Request
    GET /th?id=OADD2.10239317301409_1O8VP6TH939POQOPO&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 944920
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 8A4BAB8A41F6445CAD2C63CEF1968D5C Ref B: LON04EDGE0810 Ref C: 2024-08-26T15:16:51Z
    date: Mon, 26 Aug 2024 15:16:51 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301309_1JFFGJ64L9I4K3JMP&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
    Remote address:
    150.171.28.10:443
    Request
    GET /th?id=OADD2.10239317301309_1JFFGJ64L9I4K3JMP&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 299452
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 91CE9579C22845CFA478ED60B1C24941 Ref B: LON04EDGE0810 Ref C: 2024-08-26T15:16:51Z
    date: Mon, 26 Aug 2024 15:16:51 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301718_1O49LH3F36Y9OZ53W&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
    Remote address:
    150.171.28.10:443
    Request
    GET /th?id=OADD2.10239317301718_1O49LH3F36Y9OZ53W&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 267906
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 7CF97E0080DD4704B8884183E056D0CD Ref B: LON04EDGE0810 Ref C: 2024-08-26T15:16:51Z
    date: Mon, 26 Aug 2024 15:16:51 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239340418578_1AMTWIX1RFG5EZ1V6&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
    Remote address:
    150.171.28.10:443
    Request
    GET /th?id=OADD2.10239340418578_1AMTWIX1RFG5EZ1V6&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 1061732
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 607300F2737145408A844D11605180C3 Ref B: LON04EDGE0810 Ref C: 2024-08-26T15:16:52Z
    date: Mon, 26 Aug 2024 15:16:52 GMT
  • 147.45.40.148:15666
    Proof.pif
    15.6MB
    196.7kB
    11659
    4548
  • 104.26.13.205:443
    https://api.ipify.org/
    tls, http
    Proof.pif
    1.0kB
    3.9kB
    12
    9

    HTTP Request

    GET https://api.ipify.org/

    HTTP Response

    200
  • 216.58.214.163:80
    http://c.pki.goog/r/r4.crl
    http
    Proof.pif
    556 B
    3.9kB
    7
    6

    HTTP Request

    GET http://c.pki.goog/r/gsr1.crl

    HTTP Response

    200

    HTTP Request

    GET http://c.pki.goog/r/r4.crl

    HTTP Response

    200
  • 150.171.28.10:443
    tse1.mm.bing.net
    tls, http2
    1.2kB
    6.9kB
    16
    13
  • 150.171.28.10:443
    tse1.mm.bing.net
    tls, http2
    1.2kB
    7.3kB
    16
    13
  • 150.171.28.10:443
    tse1.mm.bing.net
    tls, http2
    1.2kB
    7.3kB
    16
    13
  • 150.171.28.10:443
    tse1.mm.bing.net
    tls, http2
    1.2kB
    7.3kB
    16
    13
  • 150.171.28.10:443
    https://tse1.mm.bing.net/th?id=OADD2.10239340418578_1AMTWIX1RFG5EZ1V6&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
    tls, http2
    127.3kB
    3.8MB
    2731
    2728

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317300976_175WPYH13KO5QTHY0&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239340418577_1YCPJO6YBYEE06VWA&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301409_1O8VP6TH939POQOPO&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301309_1JFFGJ64L9I4K3JMP&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301718_1O49LH3F36Y9OZ53W&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

    HTTP Response

    200

    HTTP Response

    200

    HTTP Response

    200

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239340418578_1AMTWIX1RFG5EZ1V6&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

    HTTP Response

    200

    HTTP Response

    200

    HTTP Response

    200
  • 8.8.8.8:53
    28.118.140.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    28.118.140.52.in-addr.arpa

  • 8.8.8.8:53
    240.143.123.92.in-addr.arpa
    dns
    73 B
    139 B
    1
    1

    DNS Request

    240.143.123.92.in-addr.arpa

  • 8.8.8.8:53
    64.159.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    64.159.190.20.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    45.19.74.20.in-addr.arpa
    dns
    70 B
    156 B
    1
    1

    DNS Request

    45.19.74.20.in-addr.arpa

  • 8.8.8.8:53
    yYqkGpUWed.yYqkGpUWed
    dns
    Proof.pif
    67 B
    142 B
    1
    1

    DNS Request

    yYqkGpUWed.yYqkGpUWed

  • 8.8.8.8:53
    148.40.45.147.in-addr.arpa
    dns
    72 B
    113 B
    1
    1

    DNS Request

    148.40.45.147.in-addr.arpa

  • 8.8.8.8:53
    api.ipify.org
    dns
    Proof.pif
    59 B
    107 B
    1
    1

    DNS Request

    api.ipify.org

    DNS Response

    104.26.13.205
    104.26.12.205
    172.67.74.152

  • 8.8.8.8:53
    c.pki.goog
    dns
    Proof.pif
    56 B
    107 B
    1
    1

    DNS Request

    c.pki.goog

    DNS Response

    216.58.214.163

  • 8.8.8.8:53
    205.13.26.104.in-addr.arpa
    dns
    72 B
    134 B
    1
    1

    DNS Request

    205.13.26.104.in-addr.arpa

  • 8.8.8.8:53
    163.214.58.216.in-addr.arpa
    dns
    73 B
    171 B
    1
    1

    DNS Request

    163.214.58.216.in-addr.arpa

  • 8.8.8.8:53
    18.31.95.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    18.31.95.13.in-addr.arpa

  • 8.8.8.8:53
    103.169.127.40.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    103.169.127.40.in-addr.arpa

  • 8.8.8.8:53
    19.229.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    19.229.111.52.in-addr.arpa

  • 8.8.8.8:53
    tse1.mm.bing.net
    dns
    62 B
    170 B
    1
    1

    DNS Request

    tse1.mm.bing.net

    DNS Response

    150.171.28.10
    150.171.27.10

  • 8.8.8.8:53
    205.47.74.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    205.47.74.20.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\554184\Proof.pif

    Filesize

    1.0MB

    MD5

    c63860691927d62432750013b5a20f5f

    SHA1

    03678170aadf6bab2ac2b742f5ea2fd1b11feca3

    SHA256

    69d2f1718ea284829ddf8c1a0b39742ae59f2f21f152a664baa01940ef43e353

    SHA512

    3357cb6468c15a10d5e3f1912349d7af180f7bd4c83d7b0fd1a719a0422e90d52be34d9583c99abeccdb5337595b292a2aa025727895565f3a6432cab46148de

  • C:\Users\Admin\AppData\Local\Temp\554184\Z

    Filesize

    1.4MB

    MD5

    8638e6b92559a8ee2e530ce2a4be9318

    SHA1

    e3b77c3b91d00dc5d62d7b86b7727d89f7229bc5

    SHA256

    35f7b14e3b7b4d66fe3d1952798e73777188a1a85cb9f09704d9ccaaf78d8734

    SHA512

    bdf803b33a65151e81f349b9ccfc09cb2ca4fce7eba94c1e5d960e6a947fc15591ed53d30a0f19c7fe68775fd361235e17f5e38e82bf3a466085e95cc4a133bc

  • C:\Users\Admin\AppData\Local\Temp\Advert

    Filesize

    58KB

    MD5

    5d5658b0c2c21f8fbbe6e3d6481c5cfb

    SHA1

    efcbf14e5ef18ac17ea95ae82072efed54fb5561

    SHA256

    b03236b12fc048610dcf5a42f5793fd90a85f751f5426f043afae9bf660c92bf

    SHA512

    5abb11c433858d0632245d50438eb6cf0c5817974b2d6b333d73792cd1be4a93d0dde9c6db5655082d872307e0bf2ca44305d711ac2210378a2f6cc2ce93b175

  • C:\Users\Admin\AppData\Local\Temp\Artist

    Filesize

    61KB

    MD5

    956f7bc88f09b5203bf10fedc208bf22

    SHA1

    c65b512bbd7784be371e432a9c3f25f19f05823d

    SHA256

    9d4d32109b9c3cb87de8a6167f4f0be6357a2b5dcb36d3af294d92aa9b18af2a

    SHA512

    52feb957c0607093f8e1d405cdbe7d578f6d34441f30abe7ddd66d321f28928035cb644d49859e08f8abb5920d38c51c2ce75f6502a92c283211ed0abc6ca840

  • C:\Users\Admin\AppData\Local\Temp\Brands

    Filesize

    70KB

    MD5

    0ea4216a77f66e2810cc50b481aee91b

    SHA1

    653155247a83cafac283e0b8744ea7d8456533f8

    SHA256

    d5f81f90d26351d978b321215fceba656352f7825c1d66f8e154ca024957f379

    SHA512

    2782433bf54f4e2d680c418af92b8f2323788f9084ca9b71ca68497891a977b2371bca05578db3fbd786f6ed94e1e13a9249efd9cb3c18f09cce264fd4015ad6

  • C:\Users\Admin\AppData\Local\Temp\Carriers

    Filesize

    75KB

    MD5

    e026279c1a4274f29de25542df70b217

    SHA1

    caef48eb56c6c65b14054e9cdfe4855bda2c144c

    SHA256

    e50912c7445b5f12b6d01f547087a084532208e8291f040af0363e6068a47a79

    SHA512

    48f57bac9144707694d65f17a094662b141331814d9aa0ab03a14755114223537d41bb7f7a728a6794bdf03a6fc1029b1658f912bd71c9f5a65fdecd3fcfed88

  • C:\Users\Admin\AppData\Local\Temp\Childrens

    Filesize

    1.0MB

    MD5

    0a80c272fb3f7e5d71641f3e5c94a31b

    SHA1

    fc00fc33c4f2eb864d2ad48b83bb34e225ad6522

    SHA256

    8477011f3cf4a38c178616602c42ef70d2f5633b5846f79095290cc6b0210825

    SHA512

    19086a895f5be31eb7eeb8f8a35789da2deb104272fb07b95273c86a5f2429af2516221b05a6c5f3dbfd52e1547af563353f5b65ebf86e676fec16e6cdb27cd1

  • C:\Users\Admin\AppData\Local\Temp\Deny

    Filesize

    74KB

    MD5

    99d2a73714dce1a778cc36f8f0c93437

    SHA1

    e1921f2e7feea0be680617064ad9356eb0ef5041

    SHA256

    65d2695384c24bdc3180740bbe3316bf7ce5ff7cbd9e327c385ec0fd6bb775aa

    SHA512

    99db4001bf83372e9f7ffa6e8bc2356d4d5dfd495d79693ccfa62010136ffc0646dd3ca2c085f98650dd7a0893f02fef53bfb4bc557f1d322e4b3602972c9461

  • C:\Users\Admin\AppData\Local\Temp\Distribute

    Filesize

    91KB

    MD5

    6b6aaa26a423332345fefc8942ce7d8f

    SHA1

    335ff751f850dd76f2ece359072e6151aa45ae63

    SHA256

    e4e432ef8c1139060c3a67ff5328b106251e51b0d4973b19b8a98945d6e4fbfb

    SHA512

    1ec373fb8a174f2c3c9ee20176ba31b1893f7ebc2351b55ba694d0786a05f0bd75ed4aa2bf57fa83e0c4350b13b3bcab0307c84ff77c48784bcc8d8a50c91d53

  • C:\Users\Admin\AppData\Local\Temp\Dome

    Filesize

    71KB

    MD5

    2be0e1d531a37d1ec26494698eb0714c

    SHA1

    cee115540c3bca4120faf13e917fc2296cf2de32

    SHA256

    db1143de2eb34f125e382fe96fc098634f713cb5655946a0ea3e79037b409100

    SHA512

    72396bec85df54218402f69cf8f46d2afffa484f61fa7e208242d658ce5cc5710c16a08ea666749a705d67a8262c4750983a3180c50c9f5cdc0ff322cc8a5ba2

  • C:\Users\Admin\AppData\Local\Temp\Edges

    Filesize

    90KB

    MD5

    f178fe5a108c6303e9e964d9e9ad9471

    SHA1

    d735d2f111451a443358857cbed006c1b2fce1ac

    SHA256

    c2b5d9903c6145ab418053163bbfa7f01634134069fa7cc5f29add1b123f7d53

    SHA512

    a14e606f5ee4a6c5e2e61c01f818d0642004d7ce3b9cb3bdec0ba5febee5bc50738c55282eb06cfd8ab43b42b3a75fba871f3289c51c72e24d101c1ad206059b

  • C:\Users\Admin\AppData\Local\Temp\Family

    Filesize

    64KB

    MD5

    3c6aff12b82c00e727852f116de47575

    SHA1

    38b15db1c5c57fa439ecb280c71e3677e61d4273

    SHA256

    701bc0be23bb9ee3c1b3fb96673630381b1942654b6a8b425981a3cd179cddbf

    SHA512

    8886ed9018884e273b77c161d828adb3b50953bd3c8d5f91984cce7e24b6fd98ffd71d1688078785569af2425fee79959aaf53805a5c966018f2430b43691d5b

  • C:\Users\Admin\AppData\Local\Temp\Gene

    Filesize

    87KB

    MD5

    82aa338859bd02ea51a5fa3774f58f29

    SHA1

    2db9ef3b7480a484d6707220f417c4d033b57c6a

    SHA256

    8c4e574d5d63a452373de57ae2759de11977b18d0b9592282a96d2082ac4ae27

    SHA512

    6a9069d5689a69a9d37792a19162caa8c6fcade3458d148499e5f7150017e01305d70bbc710b1e3a511a12a61fdf15609b2497588328b9e4c73d2ea787688918

  • C:\Users\Admin\AppData\Local\Temp\Handling

    Filesize

    62KB

    MD5

    b7ea5425f57833eef75c690ea11f948a

    SHA1

    a4f6e614bbc3d016ef40336840bcc654d4679388

    SHA256

    dd177830a1f19431628a66cde9c0df210241206ad463e2c81be9b7461394b343

    SHA512

    0cf4648cd0f0ec0aaedde2610d302e18a8e9af1fbe8bf811197cf4c6feae19a2ed86e499397573b2f5cbdac9a6589e6da66992b30e8a75bf001afa354c303a81

  • C:\Users\Admin\AppData\Local\Temp\Kitchen

    Filesize

    75KB

    MD5

    d89129bc0703f6f9230ee6cca234505f

    SHA1

    e4a823354cd5cb5c553a405f3268053e33dee60b

    SHA256

    e3043f43b26478a3e2fa8afa2182302b320b3ac661169e042ad2d515dc8a867a

    SHA512

    f200c83cab5c30d1a646e55c08108451e2f4c7679329fcea1a8606233497c4e009c1dfbb94652da2bc2c3cad5b440aa4120df2a543f9f1c74480c129645b99c3

  • C:\Users\Admin\AppData\Local\Temp\Loans

    Filesize

    96KB

    MD5

    1462c6f0c06c0f2c1bcec9bbdb843b38

    SHA1

    0e13f5282067467273e03afe4c9a237a89d69e37

    SHA256

    7b7dd4abd3ab83707988b314cf7dad083d8f3b8e743a9f6c324fda53e719e0dd

    SHA512

    5c2a59dd9195462c037e7c1d3c3c5786f310896bfdecc667fe2f33d0a96791c9bb17b590a46dba9ec11348bfdac511d4ace06e7b6f9e3ab2e551068ac040412b

  • C:\Users\Admin\AppData\Local\Temp\Mails

    Filesize

    78KB

    MD5

    b5ca8b4c9b7661e44c2fb5a702c70b1b

    SHA1

    c36bc3f530436f7a8e4094bb64b7c687b7dcd28b

    SHA256

    d4d59a150678154d399daa53caebc3b6d266a332302f6ee06da12acfb3f93d39

    SHA512

    ba4567ca421831197d0e63feac988649aef40da720b8790ab8472feddb5092d6b36a56e3abcad613dca3166e1ab885d1a434dd4433cd748d5b683438ad465026

  • C:\Users\Admin\AppData\Local\Temp\Makes

    Filesize

    511B

    MD5

    b6466348bf7898587d4daa0e3fdc8619

    SHA1

    6da6ffd52d6c2b92618807e9649801969af10630

    SHA256

    0bb63f2f60ec619a63c044b3769db2c989e336e6b8e526e18daafbddca614d09

    SHA512

    39c849e85866839580727b1e585a83ac2fd46674b3900c7a15d9fe2dba1f313ee04b9f8eaafaba5311eee3d07e97722d2ce49b40af806ef6893a1ac51199336d

  • C:\Users\Admin\AppData\Local\Temp\Master

    Filesize

    59KB

    MD5

    e1e9de9fd3945c9e5d665e3bf26a11ef

    SHA1

    d46c50e85881fefd7a4b0ba0245fdf459121e696

    SHA256

    23ef794804f1690d9f6f241d59558ebf69ba13f2f490b98ec0dbd6aad7e4e602

    SHA512

    245cfccea0d9b6b5aa43f6abb86571b465d8fda143e2f11ed0921f9da1dd88cf036139455e0694c2db68ba31b8baa6e61bcf801be628a754455d53da289da2c6

  • C:\Users\Admin\AppData\Local\Temp\Microwave

    Filesize

    75KB

    MD5

    d5eeebad0f019267d2f09e70356d2dd7

    SHA1

    043d7a39118957282bbbb2848c3314105e0c58cd

    SHA256

    fda5c32afb513d9e0c21727257dc86c70e32c4aedfad0172c1265dade757ed95

    SHA512

    31201e1313dbce6b618f0209130282ac85fc8cf298de1f012e164cd8f1e1e6d59744463141d6d9199a2ada325132f349823d4ec86d5d39bf2cfad66b900833e0

  • C:\Users\Admin\AppData\Local\Temp\Monday

    Filesize

    57KB

    MD5

    cfeae124165924893b44d1a98082a867

    SHA1

    3060afbfee8ac04d182db0e684f4337f2e874218

    SHA256

    368de3c51502b83833adbda21ef6697dcf7fb47115570a7996d530d2550614c0

    SHA512

    2efd3f11033aa77e74dcb3c84a51f5c9bb4181111eedce7d590e91e77e18d12a8c9266e843afc96e45ae8ab9222a1b9c7a41d71f3a7970337ee48b47b7743678

  • C:\Users\Admin\AppData\Local\Temp\Personal

    Filesize

    55KB

    MD5

    f56db5591867954e7aa288d5c5095dfa

    SHA1

    4bd7f39d2611ed7b001ffea145de256ef43301c9

    SHA256

    fae3c73ce7915d9774c66348b169b097475f3eab9a62738c28f5a015b3e29fc4

    SHA512

    7dd06e868b7c24cfc6e273b3fe42bf349dd1da3066527b9eddf7938628c7c30d70a3d23062888b1315a2a831f5cf3aec05cde2054658ee837ce7daf0f4ee08a2

  • C:\Users\Admin\AppData\Local\Temp\Po

    Filesize

    61KB

    MD5

    7eecf87ac37c13e4516445fafaff256f

    SHA1

    79b0a108af2c5791c588d9f5334cf0d2eb8e0683

    SHA256

    1892fdf62eaa29f22bb3eb8bc62e2f3d19a5af13a6977c4914a9c97562557dde

    SHA512

    898f3a3c9a6a214359723839af8504b009f7a9fa65cd56f14d59b8bf4e34319134b49b5b65bda0d282adbb41f536c78b3403dc6ffae1d695bf7cbcf68c64a41a

  • C:\Users\Admin\AppData\Local\Temp\Retailers

    Filesize

    46KB

    MD5

    1f5e75b155de56b553f2f47f5e0e9834

    SHA1

    74af23460b9302d260a79bb7aae4fadd020c699c

    SHA256

    c7acd89ba567f3c15010e62f2aca2270e0c87c96d6c7fb3df0851259e4746a48

    SHA512

    1778f6bc56df273175d49c2fb5ebe0b0934b79720f452db5a34f9159056ff3ee3bf334f52f4a94f296791891fa488d7fe720605b8c22be9e406971ad99e6985b

  • C:\Users\Admin\AppData\Local\Temp\Terror

    Filesize

    21KB

    MD5

    16a0e2c5ebb6f94c3126876995119a37

    SHA1

    3d107045ad3804fc3cbbc8833d3b9e4e67406f8d

    SHA256

    e71d3080f7c4713443c8e5b7d47d3b4ce4e619b2a1c7117dda472d9dbeccfa4a

    SHA512

    2452a6db36e338690553fec7db38bcf49dcc7987777a73d6c0c8e99d464835dce4c583855c28e7174e38855a0158ba1d9e13f3c379c5cf92383ae2209d527cd1

  • memory/2220-54-0x000002489AD40000-0x000002489AE29000-memory.dmp

    Filesize

    932KB

  • memory/2220-55-0x000002489AD40000-0x000002489AE29000-memory.dmp

    Filesize

    932KB

  • memory/2220-57-0x000002489AD40000-0x000002489AE29000-memory.dmp

    Filesize

    932KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.